Managing digital keys
โ Scribed by Helen Meyer
- Book ID
- 104297938
- Publisher
- Elsevier Science
- Year
- 1998
- Tongue
- English
- Weight
- 122 KB
- Volume
- 17
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
โฆ Synopsis
Abstracts of Recent Arficles and Literature
when those avenues have been successfully closed, spies will turn to technology. As eavesdropping technology improves and becomes more accessible, security professionals must be on the look out for any hint that the company's proprietary information is being electronically slipped out the door. A technical surveillance counter-measure (TCSM) sweep can help. Unfortunately, no central US authority certifies TSCM technicians for the commercial world. Anyone can set up shop and claim to have the skills and equipment to conduct a counter-measure sweep. The TSCM sweep is designed to detect the presence of technical surveillance devices. It should also identify security hazards or weaknesses that could leave the company vulnerable to industrial espionage. The inspection includes three main elements: visual, electronic and physical. Telephone lines and other telecommunication equipment will be searched for listening devices. The TSCM should be only one of the measures management uses to protect the company against industrial espionage. Equally important is awareness training. In addition, the security manager should keep in close contact with supervisors in the information systems and telecommunications departments. It is important for the security manager to know, for example, if an executive has been given remote access to the company's system that could leave it open to hackers.
๐ SIMILAR VOLUMES
## Abstract Digital rights management (DRM) constitutes the technological measures by which information providers control user access to electronic products to prevent the downloading or printing of online content in amounts that could substitute for product subscriptions or purchases. DRM limitati