LEADER 05009nam a2200409Ii 4500 001 991003247539707536 006 m d 007 cr cn||||||||| 008 070806s2005 ne a sb 001 0 eng d 020 $a9781555583279 020 $a155558327X 035 $ab13654986-39ule_inst 037 $a107881:107920$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS 049 $aTEFA 082 04$a004/.068/4$222 100 1 $aErbschloe, Michael,$d1951-$0627523 245 10$aPhysical security for IT$h[electronic resource] /$cMichael Erbschloe. 260 $aAmsterdam ;$aBoston :$bElsevier Digital Press,$cc2005. 300 $axix, 231 p. :$bill. ;$c23 cm. 504 $aIncludes bibliographical references and index. 505 0 $aThe physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. -- Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets. 520 $aThe physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets. * Expert advice on identifying physical security needs * Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems * Explanation of the processes for establishing a physical IT security function * Step-by-step instructions on how to accomplish physical security objectives * Illustrations of the major elements of a physical IT security plan * Specific guidance on how to develop and document physical security methods and procedures. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aComputer networks$xSecurity measures. 650 0$aElectronic data processing departments$xSecurity measures. 655 7$aElectronic books.$2local 776 1 $cOriginal$z155558327X$z9781555583279$w(DLC) 2004023167$w(OCoLC)56671950 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781555583279$zAn electronic book accessible through the World Wide Web; click for information 856 41$zTable of contents only$uhttp://www.loc.gov/catdir/toc/ecip051/2004023167.html 856 42$zPublisher description$uhttp://catdir.loc.gov/catdir/enhancements/fy0617/2004023167-d.html 907 $a.b13654986$b24-02-22$c24-01-08 912 $a991003247539707536 994 $aC0$bTEF 996 $aPhysical security for IT$91212816 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gne $h0$i0