logical security


Also found in: Wikipedia.

logical security

[′läj·ə·kəl sə′kyu̇r·əd·ē]
(computer science)
Mechanisms internal to a computing system that are used to protect against internal misuse of computing time and unauthorized access to data.
References in periodicals archive ?
However, logical security devices are not adequate for the physical monitoring of the facility.
Unfortunately, modern threats tend to favour logical security breaches rather than physical penetration of a government entity meaning that new strategies are required to cope.
Contract notice: Assign services for system support and logical security perimeter - february 2015 / january 2021.
Freedom brings cyber security protection to access control, reduces the cost of deployment and long term ownership, and provides a future-proof platform for unifying physical and logical security applications.
ISO 14298 brings together a wide variety of controls including logical security, physical security, quality assurance and financial security to guarantee maximum security throughout the entire printing process.
The data centre provides round-the-clock support and has multiple levels of physical and logical security, including compliance with the Verizon Security Management Program.
in the UK, for example, many hospitals are now waking up to the benefits of using smart cards to control physical access to their buildings and add logical security to the IT networks that house confidential patient data.
The logical security model coincides with the physical security model and a perimeter separates trusted (owned, local) from untrusted (other, remote).
First, physical and logical security surveillance systems must be thought of holistically and no longer distinct or separate.
Until recently, physical and logical security systems have been separate.
IdentityDefender by Lenel Systems International of Rochester, New York, automates the processes required to issue and manage smart-card credentials for use in physical and logical security.
Many companies consider integrating physical and logical security to be a technical effort.