Addressing the weakest link: Implementing converged security

被引:14
作者
Aleem, Azeem [1 ]
Wakefield, Alison [2 ]
Button, Mark [2 ]
机构
[1] EMC Europe Ltd, RSA Secur Div EMC, Bracknell RG12 1RT, Berks, England
[2] Univ Portsmouth, Inst Criminal Justice Studies, Portsmouth PO1 2HY, Hants, England
关键词
physical security; information security; IT security; cyber security; convergence; enterprise risk management;
D O I
10.1057/sj.2013.14
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Reliance on technology presents one of the weakest links in contemporary organisational security, as certain threats can fall into the functional gaps between physical and information technology (IT) security departments. These can be described as 'converged threats' when an IT-based attack delivers an impact, such as a virus attack that halts the operation of critical infrastructure, or a physical attack on a system that compromises the security of data, such as an intruder or dishonest employee installing devices on computers to enable the stealing of electronic data. The aim of this article is to present and reflect on a converged approach to organisational security risk management as a means of addressing blended threats. We discuss this idea of converged security in the context of wider trends towards enterprise-wide approaches to risk management, and present a model demonstrating how converged security can be undertaken without a fundamental restructuring of these two key functions.
引用
收藏
页码:236 / 248
页数:13
相关论文
共 27 条
[1]  
Aleem A., 2013, CYBER SECURITY GUIDE
[2]  
Aleem A., 2013, J FINANCIAL CRIME, V20, P6, DOI [10.1108/13590791311287337, DOI 10.1108/13590791311287337]
[3]  
[Anonymous], 2007, Organised uncertainty: Designing a World of risk management, DOI DOI 10.1080/13603100802475535
[4]  
[Anonymous], 2010, STRONG BRIT AG UNC N
[5]  
[Anonymous], 2009, NEW LOSS PREVENTION
[6]  
[Anonymous], DEMONSTRATING VALUE
[7]  
[Anonymous], HDB SECURITY
[8]  
[Anonymous], COST CYB CRIM
[9]  
ASIS International, 2010, ENT SEC RISK MAN GRE
[10]  
Beck A., 2007, Security Journal: Special issue: 20th anniversary, V20, P57