TITLE

My Turn: Assembling a System

AUTHOR(S)
Fellores, Erin J.
PUB. DATE
December 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Dec2006, Vol. 43 Issue 12, p72
SOURCE TYPE
Trade Publication
DOC. TYPE
Interview
ABSTRACT
The article presents an interview with Nicholas Kowal, corporate director of security at Resurrection Health Care's facilities, and Michael Casey, executive at Initial Electronics. Both these executive are working to better the hospital's access control system. In response to a question on revamping the access system, Kowal mentioned that theft and property crimes compelled to revamp the system. While talking about the upgraded system Casey said that the entire version resided on the network. INSET: Productive Partnering: Resurrection Health….
ACCESSION #
23394226

 

Related Articles

  • Discretionary Access Control List.  // Network Dictionary;2007, p154 

    A definition of the term "Discretionary Access Control List" is presented. This refers to the most common type of access control list. It is used to control access to computer and network resources.

  • Context-Based Access Control.  // Network Dictionary;2007, p121 

    A definition of the term "Context-Based Access Control" (CBAC) is presented. It refers to a feature of firewall that monitors the activity behind a firewall. It specifies what traffic needs to be let in and what traffic needs to be let out by using access lists. It also provides internal users...

  • MAC Address.  // Network Dictionary;2007, p297 

    A definition of the term "MAC Address" in computer networking is presented. The Media Access Control address is defined as a unique identifier attached to most forms of networking equipment. It is 48 bits long and is commonly written as a sequence of 12 hexadecimal digits as follows:...

  • Cryptanalysis of a Password-based Group Key Exchange Protocol Using Secret Sharing. Olimid, Ruxandra F. // Applied Mathematics & Information Sciences;Jul2013, Vol. 7 Issue 4, p1585 

    Yuan et al. recently introduced a password-based group key transfer protocol that uses secret sharing, which they claim to be efficient and secure [9]. We remark its resemblance to the construction of Harn and Lin [1], which Nam et al. proved vulnerable to a replay attack [3]. It is...

  • PROVISIONING 2.0. GAMBY, RANDALL // Information Security;Nov2010, Vol. 12 Issue 9, p25 

    The article discusses how an automated provisioning system can be redeveloped to improve access management. It was mentioned that most provisioning systems are focused on granting access to an individual but fails to place emphasis on the deprovisioning of off-boarding services for individuals...

  • Group test: network access control.  // SC Magazine: For IT Security Professionals (UK Edition);Oct/Nov2009, p52 

    The article discusses the selection of network access control (NAC) products that suits an existing security infrastructure. The NAC should have a policy manager that is easy to install and be able to gather information from list of users like the Active Directory. It should also have grain...

  • System Access Control List.  // Network Dictionary;2007, p474 

    A definition of the term "System Access Control List" is presented. It refers to a type of access control list that is utilized for auditing securable objects.

  • Execs express top security concerns. Cooney, Michael // Network World;6/5/2006, Vol. 23 Issue 22, p19 

    The article discusses issues pertaining to computer network security. According to a survey of 54 security executives done by Courion and Executive Alliance consultancy that was released during the recently concluded Converge '06 conference, the following are the top security concerns: (1)...

  • Centrally Managed Network Security: Hope or Reality? Don't wait for the standards to evolve. Thomsen, Dan // Database & Network Journal;Feb2003, Vol. 33 Issue 1, p10 

    Discusses the added benefits of centrally managed network security solution that protects enterprise-wide networks while allowing for centralized management standards. Availability of security standards; Security issues and management problems facing the information technology sector; Use of...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics