Cargando…

Security technology convergence insights /

Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems. As the pace of information tec...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Bernard, Ray (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam, Netherlands : Security Executive Council, 2015.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • ""Front Cover""; ""Security Technology Convergence Insights""; ""Copyright""; ""Contents""; ""Foreword""; ""Preface""; ""Acknowledgments""; ""About the Author""; ""Introduction""; ""Chapter 1: What Is Security Convergence?""; ""Two Types of Convergence""; ""Security Convergence Collaboration""; ""The Introduction of the Term �aȶConvergence�a�?""; ""Four Categories of Convergence""; ""Mastering Convergence""; ""Integration of Physical Security and Logical Security""; ""Why Convergence Didn�a�?t Really Disappear""; ""Convergence �aȶDisappears�a�? in the IT Domain""
  • ""Chapter 2: Convergence Trends""""The Value of Technology""; ""Coopetition and Open Standards""; ""Technological Value""; ""The Security Industry World Has Changed""; ""Video System Attack""; ""Access Control System Attack""; ""The New World""; ""IP-Based Card Readers Compromised""; ""Why Don�a�?t Many Manufacturers Care?""; ""An IT Perspective""; ""Commitment to Customers�a�? Interests""; ""Some Companies Do Care""; ""Convergence in Design: Virtual Construction""; ""Building Information Modeling""; ""Traditional Design and Construction""; ""Virtual Design and Construction""; ""Visualization""
  • Security Design and BIMAcknowledgments
  • Chapter 3: Physical Security and Information Technology Collaboration
  • Collaboration between Physical Security and Information Technology
  • How IT Can Help with Physical Security System Planning
  • The Scope of Security Systems Integration
  • Convergence Roles and Responsibilities
  • Service-Level Agreements
  • Security Video Requires Convergence Collaboration
  • Data Security for Corporate Security Departments
  • Financial Impact of Cyber Risk
  • Protecting Information in Human Memory
  • Network Protection for Security SystemsPhysical Security for Computing Systems
  • Developing a Plan for the Physical Protection of IT Systems
  • Understanding Computing Systems Attacks and Defenses
  • Policy and Procedure Convergence
  • Let IT Be Your Force Multiplier
  • Security Patrols for Desktop Security
  • IT Policies
  • Security Officer Patrols
  • Desktop Inspections
  • Exceptions
  • Results
  • Chapter 4: Education Training
  • Return on Investment for Convergence Education and Training
  • Certifications Relevant to Convergence
  • Knowledge Gap: Customers and Security IntegratorsLearning About Internet Protocol-Based Systems
  • Maximizing Your Progress in the New Year
  • ASIS Annual Seminars Sessions
  • ASIS Webinars
  • ASIS Member Council Participation
  • Chapter 5: Security Planning
  • Convergence Initiatives: Timing Can Be Critical
  • Convergence and Layers of Security
  • Security Layers
  • Security Functions by Layer
  • Levels of Security
  • Multimodal Devices
  • Multimodal Security Design
  • Layers and Levels
  • Security Functions
  • Why Do I Need a Technology Roadmap?