• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

Physical security and IT convergence: Managing the cyber-related risks.

作者信息

McCreight Tim, Leece Doug

出版信息

J Bus Contin Emer Plan. 2016;10(1):18-30.

PMID:27729098
Abstract

The convergence of physical security devices into the corporate network is increasing, due to the perceived economic benefits and efficiencies gained from using one enterprise network. Bringing these two networks together is not without risk. Physical devices like closed circuit television cameras (CCTV), card access readers, and heating, ventilation and air conditioning controllers (HVAC) are typically not secured to the standards we expect for corporate computer networks. These devices can pose significant risks to the corporate network by creating new avenues to exploit vulnerabilities in less-than-secure implementations of physical systems. The ASIS Information Technology Security Council (ITSC) developed a white paper describing steps organisations can take to reduce the risks this convergence can pose, and presented these concepts at the 2015 ASIS/ISC2 Congress in Anaheim, California. This paper expands upon the six characteristics described by ITSC, and provides business continuity planners with information on how to apply these recommendations to physical security devices that use the corporate network.

摘要

相似文献

1
Physical security and IT convergence: Managing the cyber-related risks.
J Bus Contin Emer Plan. 2016;10(1):18-30.
2
Digital security technology simplified.简化的数字安全技术。
J Healthc Prot Manage. 2007;23(2):51-60.
3
Cyber crime: can a standard risk analysis help in the challenges facing business continuity managers?网络犯罪:标准风险分析能否帮助应对业务连续性管理人员面临的挑战?
J Bus Contin Emer Plan. 2013;7(2):126-37.
4
Breaking down silos between business continuity and cyber security.打破业务连续性与网络安全之间的壁垒。
J Bus Contin Emer Plan. 2019 Jan 1;12(3):224-232.
5
Enhancing infrastructure resilience through business continuity planning.通过业务连续性规划提高基础设施恢复力。
J Bus Contin Emer Plan. 2017 Jan 1;11(2):163-73.
6
Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.网络安全:对面临网络攻击风险的组织在信息共享与数据敏感性问题方面的批判性审视。
J Bus Contin Emer Plan. 2013;7(2):103-11.
7
Airline business continuity and IT disaster recovery sites.航空公司业务连续性和信息技术灾难恢复站点。
J Bus Contin Emer Plan. 2016 Spring;9(3):228-38.
8
Mitigating risks by integrating business continuity and security.通过整合业务连续性与安全性来降低风险。
J Bus Contin Emer Plan. 2010 Nov;4(4):329-37.
9
Building resilience: The role of enterprise security risk management in developing a resilient organisation.建立弹性:企业安全风险管理在培养有弹性的组织中的作用。
J Bus Contin Emer Plan. 2024 Jan 1;17(4):363-374.
10
Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.构建组织的网络弹性:基于战略知识的网络安全管理视角
J Bus Contin Emer Plan. 2015;9(2):185-95.