Skip to main content
Log in

Addressing the weakest link: Implementing converged security

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

Reliance on technology presents one of the weakest links in contemporary organisational security, as certain threats can fall into the functional gaps between physical and information technology (IT) security departments. These can be described as ‘converged threats’ when an IT-based attack delivers an impact, such as a virus attack that halts the operation of critical infrastructure, or a physical attack on a system that compromises the security of data, such as an intruder or dishonest employee installing devices on computers to enable the stealing of electronic data. The aim of this article is to present and reflect on a converged approach to organisational security risk management as a means of addressing blended threats. We discuss this idea of converged security in the context of wider trends towards enterprise-wide approaches to risk management, and present a model demonstrating how converged security can be undertaken without a fundamental restructuring of these two key functions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Figure 1
Figure 2

Similar content being viewed by others

References

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Aleem, A., Wakefield, A. & Button, M. Addressing the weakest link: Implementing converged security. Secur J 26, 236–248 (2013). https://doi.org/10.1057/sj.2013.14

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/sj.2013.14

Keywords

Navigation