Physical security for IT

The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple a...

Πλήρης περιγραφή

Κύριος συγγραφέας: Erbschloe, Michael, 1951-
Μορφή: Ηλεκτρονική πηγή
Γλώσσα: English
Στοιχεία έκδοσης: Amsterdam ; Boston : Elsevier Digital Press, c2005.
Θέματα:
Διαθέσιμο Online: http://www.sciencedirect.com/science/book/9781555583279
Ετικέτες: Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
LEADER 03553nam a2200313 a 4500
001 1/45157
008 140729s2005 ne 001 0 eng
020 |a 9781555583279 
020 |a 155558327X 
020 |a 0080495907 (electronic bk.) 
020 |a 9780080495903 (electronic bk.) 
035 |l 48115 
040 |a OPELS  |b eng  |c OPELS  |d OKU  |d OCLCQ  |d NTG  |d MERUC  |d UBY  |d E7B  |d IDEBK  |d B24X7  |d DEBBG  |d N$T  |d YDXCP  |d OCLCQ  |d OCLCF  |d GR-PeUP 
100 1 |a Erbschloe, Michael,  |d 1951- 
245 1 0 |a Physical security for IT  |h [electronic resource] /  |c Michael Erbschloe. 
260 |a Amsterdam ;  |a Boston :  |b Elsevier Digital Press,  |c c2005. 
300 |a 1 online resource (xix, 231 p.) :  |b ill. 
504 |a Includes bibliographical references and index. 
505 0 |a Physical security overview -- Establishing a physical IT security function -- Developing an IT physical security plan -- Major elements of a physical IT security plan -- Developing and documenting methods and procedures -- Auditing and testing procedures -- The role of the incident response team -- Model training program for organization staff -- The future of physical security for IT assets. 
520 |a The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets. * Expert advice on identifying physical security needs * Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems * Explanation of the processes for establishing a physical IT security function * Step-by-step instructions on how to accomplish physical security objectives * Illustrations of the major elements of a physical IT security plan * Specific guidance on how to develop and document physical security methods and procedures. 
650 4 |a Computer networks  |x Security measures. 
650 4 |a Electronic data processing departments  |x Security measures. 
655 4 |a Electronic books. 
852 |a INST  |b UNIPILB  |c EBOOKS  |e 20100625  |p 00b48115  |q 00b48115  |t ONLINE  |y 0 
856 4 0 |3 ScienceDirect  |u http://www.sciencedirect.com/science/book/9781555583279 
856 4 |d /webopac/covers/03/48115_9781555583279.jpg 
856 4 |d /webopac/covers/03/48115_155558327X.jpg 
856 4 |d /webopac/covers/03/48115_0080495907.jpg  |z (electronic bk.) 
856 4 |d /webopac/covers/03/48115_9780080495903.jpg  |z (electronic bk.)