My Turn: Assembling a System

Fellores, Erin J.
December 2006
Security: Solutions for Enterprise Security Leaders;Dec2006, Vol. 43 Issue 12, p72
Trade Publication
The article presents an interview with Nicholas Kowal, corporate director of security at Resurrection Health Care's facilities, and Michael Casey, executive at Initial Electronics. Both these executive are working to better the hospital's access control system. In response to a question on revamping the access system, Kowal mentioned that theft and property crimes compelled to revamp the system. While talking about the upgraded system Casey said that the entire version resided on the network. INSET: Productive Partnering: Resurrection Health….


Related Articles

  • Discretionary Access Control List.  // Network Dictionary;2007, p154 

    A definition of the term "Discretionary Access Control List" is presented. This refers to the most common type of access control list. It is used to control access to computer and network resources.

  • Context-Based Access Control.  // Network Dictionary;2007, p121 

    A definition of the term "Context-Based Access Control" (CBAC) is presented. It refers to a feature of firewall that monitors the activity behind a firewall. It specifies what traffic needs to be let in and what traffic needs to be let out by using access lists. It also provides internal users...

  • MAC Address.  // Network Dictionary;2007, p297 

    A definition of the term "MAC Address" in computer networking is presented. The Media Access Control address is defined as a unique identifier attached to most forms of networking equipment. It is 48 bits long and is commonly written as a sequence of 12 hexadecimal digits as follows:...

  • Cryptanalysis of a Password-based Group Key Exchange Protocol Using Secret Sharing. Olimid, Ruxandra F. // Applied Mathematics & Information Sciences;Jul2013, Vol. 7 Issue 4, p1585 

    Yuan et al. recently introduced a password-based group key transfer protocol that uses secret sharing, which they claim to be efficient and secure [9]. We remark its resemblance to the construction of Harn and Lin [1], which Nam et al. proved vulnerable to a replay attack [3]. It is...

  • PROVISIONING 2.0. GAMBY, RANDALL // Information Security;Nov2010, Vol. 12 Issue 9, p25 

    The article discusses how an automated provisioning system can be redeveloped to improve access management. It was mentioned that most provisioning systems are focused on granting access to an individual but fails to place emphasis on the deprovisioning of off-boarding services for individuals...

  • Group test: network access control.  // SC Magazine: For IT Security Professionals (UK Edition);Oct/Nov2009, p52 

    The article discusses the selection of network access control (NAC) products that suits an existing security infrastructure. The NAC should have a policy manager that is easy to install and be able to gather information from list of users like the Active Directory. It should also have grain...

  • System Access Control List.  // Network Dictionary;2007, p474 

    A definition of the term "System Access Control List" is presented. It refers to a type of access control list that is utilized for auditing securable objects.

  • Execs express top security concerns. Cooney, Michael // Network World;6/5/2006, Vol. 23 Issue 22, p19 

    The article discusses issues pertaining to computer network security. According to a survey of 54 security executives done by Courion and Executive Alliance consultancy that was released during the recently concluded Converge '06 conference, the following are the top security concerns: (1)...

  • Passed Words.  // CIO Insight;Sep2005, Issue 57, p20 

    This article presents the findings of a survey on the use of passwords in logging into a company's systems. Majority of businesses admitted that they grant customers or partners password protected access to their systems. Almost all businesses admitted on their lack of effective way in ensuring...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics