首页> 外文期刊>Information Week >Security On All Fronts
【24h】

Security On All Fronts

机译:全方位安全

获取原文
获取原文并翻译 | 示例
           

摘要

Much attention in the past few months has focused on how airports and airlines can use IT to improve security in terminals and on planes. Fingerprint-identification technology can be paired with a smart card to confirm a passenger's identity before issuing a boarding pass; radio-frequency identification tags can be affixed to suspicious checked luggage to pinpoint bags that must be searched before they're put on a plane; and digitally stored fingerprints of job candidates can be submitted to authorities before someone is hired for a position that requires access to secure areas. But businesses also say they see value in using IT to help protect physical property. For example, some companies are looking at using smart access cards that authenticate network users to also restrict access to data centers, executive suites, or other potential terrorist targets on campus. As part of these efforts, companies also want to foster closer communications between IT-and facilities-security experts, who operate independently in most companies. That connection will pay off as terrorists and other criminals plot new kinds of attacks. "We're going to see more sophisticated cyber and physical attacks," warns Harry De-Maio, director of enterprise risk services at Deloitte & Touche. "A group may launch a denial-of-service attack, or even a highly targeted virus, to attempt to disrupt communications the very moment it launches a physical attack." An acceleration of attempted attacks on a company's system that emanates from a particular geographic area may be the first clue a business has that it's targeted for worse things, and only quick communication between IT-and physical-security staff will help prevent damage to people and property.
机译:在过去的几个月中,很多注意力都集中在机场和航空公司如何使用IT来改善终端和飞机的安全性上。指纹识别技术可以与智能卡配合使用,以在签发登机牌之前确认乘客的身份;射频识别标签可以贴在可疑的托运行李上,以查明在将其放在飞机上之前必须进行搜索的袋子;并可以在候选人被聘用到需要进入安全区域的职位之前,将数字化存储的求职者指纹提交给当局。但是企业也表示,他们认为使用IT来保护物理财产具有价值。例如,一些公司正在考虑使用对网络用户进行身份验证的智能访问卡来限制对数据中心,执行套件或校园中其他潜在恐怖分子目标的访问。作为这些努力的一部分,公司还希望在大多数公司中独立运作的IT和设施安全专家之间建立更紧密的沟通。随着恐怖分子和其他罪犯策划新的袭击,这种联系将得到回报。 Deloitte&Touche企业风险服务主管Harry De-Maio警告说:“我们将看到更加复杂的网络和物理攻击。” “一个团体可能会发起拒绝服务攻击,甚至是针对性很强的病毒,以在发起物理攻击的那一刻试图破坏通信。”从特定地理区域发出的对公司系统的未遂攻击的加速可能是企业针对更坏情况的目标的第一个线索,并且只有IT和物理安全人员之间的快速通信才能帮助防止人员伤害和属性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号