๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Managing digital keys

โœ Scribed by Helen Meyer


Book ID
104297938
Publisher
Elsevier Science
Year
1998
Tongue
English
Weight
122 KB
Volume
17
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

โœฆ Synopsis


Abstracts of Recent Arficles and Literature

when those avenues have been successfully closed, spies will turn to technology. As eavesdropping technology improves and becomes more accessible, security professionals must be on the look out for any hint that the company's proprietary information is being electronically slipped out the door. A technical surveillance counter-measure (TCSM) sweep can help. Unfortunately, no central US authority certifies TSCM technicians for the commercial world. Anyone can set up shop and claim to have the skills and equipment to conduct a counter-measure sweep. The TSCM sweep is designed to detect the presence of technical surveillance devices. It should also identify security hazards or weaknesses that could leave the company vulnerable to industrial espionage. The inspection includes three main elements: visual, electronic and physical. Telephone lines and other telecommunication equipment will be searched for listening devices. The TSCM should be only one of the measures management uses to protect the company against industrial espionage. Equally important is awareness training. In addition, the security manager should keep in close contact with supervisors in the information systems and telecommunications departments. It is important for the security manager to know, for example, if an executive has been given remote access to the company's system that could leave it open to hackers.


๐Ÿ“œ SIMILAR VOLUMES


Managing digital images
โœ Michael L. Swartz ๐Ÿ“‚ Article ๐Ÿ“… 2000 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 55 KB
Managing digital design at BMW
โœ Thomke, Stefan ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› Wiley (Blackwell Publishing) โš– 929 KB
DRM: Digital rights management or digita
โœ Kevin L. Smith; Bill Burger; Joshua Gay; Kristin Eschenfelder; Rafal Kasprowski ๐Ÿ“‚ Article ๐Ÿ“… 2009 ๐Ÿ› Wiley (John Wiley & Sons) ๐ŸŒ English โš– 19 KB

## Abstract Digital rights management (DRM) constitutes the technological measures by which information providers control user access to electronic products to prevent the downloading or printing of online content in amounts that could substitute for product subscriptions or purchases. DRM limitati