Read more
Informationen zum Autor Macaulay, Tyson Klappentext Information and Communication technology (ICT) networks differ from IT networks because they mingle data assets with assets such as voice, entertainment, media, physical security, and more. IP convergence represents both a new business imperative and a fundamentally new security paradigm. The ongoing shift in market terminology from IT to ICT indicates the conclusive acceleration of IP convergence. Securing Converged IP Networks explores this adoption of ICT terminology by large organizations and introduces ICT security as an independent concept. This book attempts to facilitate the start of a larger discussion that centers around how ICT impacts the field of technology security and assurance. Zusammenfassung Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more. Due to this convergence of content, IP networks are emerging as extremely vital infrastructure components, requiring greater awareness and better security and management. Offering diverse perspectives from the world's leading experts on convergence, Securing Converged IP Networks illustrates how to maintain content integrity and network assurance. This book discusses the convergence market and the business drivers of convergence, details how to measure the sensitivity and assurance requirements of different data assets and discusses a wide range of ICT security threats and vulnerabilities. Later chapters discuss controls and safeguards in terms of management, as well as, technical, and operational tools that can reduce the likelihood of wide range of risks. It also provides recommendations for managing the assurance, implementation and operation of converged ICT network infrastructures and examines the future of ICT security and assurance under IP convergence. Inhaltsverzeichnis Understanding Internet Protocol (IP) Convergence. Converged Sensitivity and Enterprise Risk Management. Information and Communications Technology (ICT) Threats and Vulnerabilities in the All-IP World. Controls and Safeguards in the AII-IP World. Managing Assurance. What Comes Next?...
Summary
Illustrates how to maintain content integrity and network assurance. This book discusses the convergence market and the business drivers of convergence, details how to measure the sensitivity and assurance requirements of different data assets and discusses a range of ICT security threats and vulnerabilities.