Security technology convergence insights /
Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems. As the pace of information tec...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam, Netherlands :
Security Executive Council,
2015.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- ""Front Cover""; ""Security Technology Convergence Insights""; ""Copyright""; ""Contents""; ""Foreword""; ""Preface""; ""Acknowledgments""; ""About the Author""; ""Introduction""; ""Chapter 1: What Is Security Convergence?""; ""Two Types of Convergence""; ""Security Convergence Collaboration""; ""The Introduction of the Term �aȶConvergence�a�?""; ""Four Categories of Convergence""; ""Mastering Convergence""; ""Integration of Physical Security and Logical Security""; ""Why Convergence Didn�a�?t Really Disappear""; ""Convergence �aȶDisappears�a�? in the IT Domain""
- ""Chapter 2: Convergence Trends""""The Value of Technology""; ""Coopetition and Open Standards""; ""Technological Value""; ""The Security Industry World Has Changed""; ""Video System Attack""; ""Access Control System Attack""; ""The New World""; ""IP-Based Card Readers Compromised""; ""Why Don�a�?t Many Manufacturers Care?""; ""An IT Perspective""; ""Commitment to Customers�a�? Interests""; ""Some Companies Do Care""; ""Convergence in Design: Virtual Construction""; ""Building Information Modeling""; ""Traditional Design and Construction""; ""Virtual Design and Construction""; ""Visualization""
- Security Design and BIMAcknowledgments
- Chapter 3: Physical Security and Information Technology Collaboration
- Collaboration between Physical Security and Information Technology
- How IT Can Help with Physical Security System Planning
- The Scope of Security Systems Integration
- Convergence Roles and Responsibilities
- Service-Level Agreements
- Security Video Requires Convergence Collaboration
- Data Security for Corporate Security Departments
- Financial Impact of Cyber Risk
- Protecting Information in Human Memory
- Network Protection for Security SystemsPhysical Security for Computing Systems
- Developing a Plan for the Physical Protection of IT Systems
- Understanding Computing Systems Attacks and Defenses
- Policy and Procedure Convergence
- Let IT Be Your Force Multiplier
- Security Patrols for Desktop Security
- IT Policies
- Security Officer Patrols
- Desktop Inspections
- Exceptions
- Results
- Chapter 4: Education Training
- Return on Investment for Convergence Education and Training
- Certifications Relevant to Convergence
- Knowledge Gap: Customers and Security IntegratorsLearning About Internet Protocol-Based Systems
- Maximizing Your Progress in the New Year
- ASIS Annual Seminars Sessions
- ASIS Webinars
- ASIS Member Council Participation
- Chapter 5: Security Planning
- Convergence Initiatives: Timing Can Be Critical
- Convergence and Layers of Security
- Security Layers
- Security Functions by Layer
- Levels of Security
- Multimodal Devices
- Multimodal Security Design
- Layers and Levels
- Security Functions
- Why Do I Need a Technology Roadmap?