Title
The Evolution of IT Security Convergence
Abstract
Progress in furthering IT security is not linear. Effective implementation will logically lag behind the introduction of new technology and functional requirements. Often there are intermittent spasms of chaos, confusion, and inertia before technology is transformed into IT system solutions. Before attempting to assess actual progress in a nation's IT security posture, it is important to look upon IT security as being no different from any other product offered to IT users. There are three criteria which must be satisfied before any product is developed, adopted, or effectively used in the marketplace. The first requisite for customers' adoption of any product is that the underlying technology must be understandable, user-friendly, and affordable. The second requirement is that users must be committed to using the product. And, the third prerequisite for broad, effective product use, is the availability of appropriate rules and regulations that will engender and guide the proper use of such products. In the course of users' adjustment to new technology, each of these requirements must be satisfied if the technology is to be applied and technological progression continued. This paper looks more closely at the factors that are critical to an TT security product's effective use and commercial viability.
Year
Venue
Keywords
1993
SEC
it security convergence,it security
Field
DocType
Volume
Convergence (routing),Security convergence,Network security policy,Computer security,Computer science,Security analysis,Computer security model
Conference
37
ISSN
ISBN
Citations 
0926-5473
0-444-81748-4
0
PageRank 
References 
Authors
0.34
1
2
Name
Order
Citations
PageRank
Patrick R. Gallagher, Jr.191.17
r patrick200.34