9. Physical Intrusion Detection for IT
Many organizations have desires to integrate components, curb redundant functionality, and stop data isolation. It is strange to see organizations consider only traditional IT department systems, components, and processes as candidates for these lofty goals. Sometimes, integration opportunities lie outside the borders of IT. For example, if I were to describe a “team of security professionals responsible for 24x7 monitoring of security violations and attacks, supported by networked systems of security sensors, and responsible for maintaining a security audit trail,” your first thought might be that I was referring to the IT security team or a Network/Security Operations Center (NOC/SOC). Truthfully, I didn’t ...
Get Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.