2019
DOI: 10.2495/safe-v9-n2-137-156
|View full text |Cite
|
Sign up to set email alerts
|

Towards a conceptual foundation for physical security: Case study of an IT department

Abstract: Protecting physical data, networks, and systems has become difficult, increasingly costly, and tougher to manage as technology and environments become more complex and dynamic. This paper presents a theoretical foundation for physical information technology (IT) security by developing a logical description based on a flow-based model. Within this model, a security machine is defined as a sequence of stages in which flow is identified and blocked in a multilevel blockage machine. The main focusses of the paper … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(15 citation statements)
references
References 6 publications
0
14
0
1
Order By: Relevance
“…Section 2 reviews the TM that was previously used in several published papers (Al-Fedaghi, 2019a-c;Al-Fedaghi and Makdessi, 2019;Al-Fedaghi and Alsumait, 2019;Al-Fedaghi and Al-Fadhli, 2019;Al-Fedaghi and BehBehani, 2018;Al-Fedaghi and Haidar, 2019;Al-Fedaghi and Al-Otaibi, 2019). The remaining sections describe applying TM to document an actual computer network in the case study.…”
Section: Overview Of the Papermentioning
confidence: 99%
“…Section 2 reviews the TM that was previously used in several published papers (Al-Fedaghi, 2019a-c;Al-Fedaghi and Makdessi, 2019;Al-Fedaghi and Alsumait, 2019;Al-Fedaghi and Al-Fadhli, 2019;Al-Fedaghi and BehBehani, 2018;Al-Fedaghi and Haidar, 2019;Al-Fedaghi and Al-Otaibi, 2019). The remaining sections describe applying TM to document an actual computer network in the case study.…”
Section: Overview Of the Papermentioning
confidence: 99%
“…Dari penelitian yang telah dilakukan, serangan pada perangkat keras merupakan serangan yang cukup sulit dilakukan karena penyerang harus memiliki akses fisik ke komputer yang akan di serang. Maka langkah yang dapat dilakukan untuk memitigasi serangan ini adalah dengan memberikan pengamanan fisik di ruang server / data center (AL-FEDAGHI & Alsumait, 2019). Pengamanan fisik mulai dari akses kontrol terhadap ruang data center, akses kontrol terhadap server rack dan akses kontrol terhadap fisik server.…”
Section: Mitigasi Serangan Pada Perangkat Kerasunclassified
“…• The top value is sent to the storage system (16). In the storage system, the top value is used (17) to retrieve the top item in the stack (18) and to output it (19).…”
Section: A Static Tm Representationmentioning
confidence: 99%