SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
Market com 
physical a 
autonomo 
owards ac 
most impo 
At first ma 
data and 
other syst 
for busine 
complianc 
outside th 
versions o 
Now most 
o data and 
rends inc 
mproveme 
However t 
systems a 
more of 
process ca 
Mpat 
m 
Adof 
c 
ov 
Ntti 
Hsi 
s 
p 
With 
Let’ 
mpetition 
as well as 
us and bu 
ccess to p 
ortant feat 
any vendo 
soon the 
tems and 
ess data n 
ce’ to allo 
e plant en 
of protoco 
industrie 
d personn 
cluding da 
ents and 
this increa 
nd is putt 
f a nuisan 
an mean a 
the fo 
ewslett 
ession 
nd hop 
A 
Mak 
Ne 
’s profe 
in indust 
network 
uilt upon p 
personal, 
ture was a 
ors built t 
automati 
protocols 
networks. 
ow for c 
nvironmen 
ls that wo 
s with con 
nel and to 
ata access 
advanced 
asing nee 
ting many 
nce than a 
serious s 
ter: Ja 
nalize t 
www.wix.com/ 
nuary 
the pro 
/sbtyagi/iciss 
aditionally 
ual! Over a 
ry vendor 
cessing s 
data. 
protocols 
cape beca 
to this w 
2000, vend 
cation bet 
ver, in the 
the purpos 
ems are fa 
hem. There 
ble busine 
exercises 
ess is furt 
control en 
but for m 
eat. 
pe and 
Happ 
py and 
ke Se 
From 
http://w 
try has tra 
and virtu 
proprietar 
data, pro 
access to d 
their own 
on landsc 
s. Parallel 
In early 2 
communic 
nt. Howev 
orked for t 
ntrol syste 
secure th 
s to enab 
d control 
d for acce 
process c 
anything, 
safety thre 
2013 
ofessio 
s 
y driven th 
decade 
technolog 
speed, and 
onals… 
he evolutio 
ago, mos 
gy and the 
d function 
s or langu 
ame very 
was the de 
dors saw 
tween se 
rush to m 
se at hand 
acing man 
e are man 
ess decisi 
s like loop 
ther diluti 
nvironmen 
most indus 
firm re 
… 
on of con 
st control 
e solution 
nality (or r 
uages to a 
proprieta 
evelopmen 
advantag 
curity sy 
market ma 
d but did n 
ny pressur 
ny forces p 
ions, vend 
p tuning a 
ng the se 
nts at risk. 
stries a lo 
esolve 
Prosp 
curity 
m Janu 
perous 
y a thi 
uary t 
ntrol syste 
systems 
ns were ge 
reliability) 
allow for 
ary and in 
nt of Ethe 
ges to incl 
ystems in 
ny vendo 
not includ 
res to bot 
pushing th 
dor acces 
and alarm 
ecurity of 
. In some 
oss of con 
that th 
the transf 
ndepende 
ernet netw 
lude ‘Ethe 
cluding t 
rs built ad 
e security 
h allow ac 
hese oppo 
ss for pro 
m managem 
many of t 
industries 
ntrol over 
pt S B T 
he com 
New Y 
ing to 
ill Dec 
Year! 
o reme 
cemb 
Cap 
ming ye 
embe 
ber! 
For IC 
r, 
ems – 
were 
eared 
). The 
fer of 
ent of 
works 
ernet-those 
d-hoc 
y. 
ccess 
osing 
ocess 
ment. 
these 
s this 
your 
Tyagi 
CISS 
ear
of data an 
systems a 
data netw 
for comm 
However, 
the purpo 
Now mos 
data and 
including 
and adva 
increasing 
putting ma 
than anyt 
safety thre 
As one n 
industry is 
dies”. Reg 
control sy 
overtime, 
confidenc 
The new 
Security. A 
that most 
downtime 
experts w 
means m 
staff to ma 
nd soon th 
and protoc 
works. In ea 
munication 
in the rus 
se at hand 
st industrie 
personnel 
data acce 
anced con 
g need for 
any proces 
hing, but f 
eat. 
noted secu 
s one such 
gardless of 
ystem will 
environm 
ce and pote 
push for c 
And the p 
t industries 
e. This mea 
who may n 
any indus 
anage & o 
The scope 
concern t 
he automat 
cols. Parall 
arly 2000, 
between s 
h to marke 
d but did no 
es with con 
and to se 
ess to enab 
ntrol exerc 
r access i 
ss control e 
for most in 
urity profe 
h that a los 
f the poten 
at least l 
mental rele 
entially the 
control sys 
ressure is 
s are ‘pus 
ans more o 
ot be phys 
tries are a 
ptimize mo 
e of the te 
this may r 
rm ‘securit 
represent 
Market 
evolutio 
virtual! 
autono 
the sol 
process 
importa 
built th 
t competit 
on of contr 
Over a 
omous and 
lutions we 
sing spee 
ant feature 
eir own pr 
cape beca 
was the de 
aw advant 
ystems inc 
endors bui 
security. 
ms are fac 
. There are 
ss decisio 
loop tuni 
diluting the 
ents at risk 
loss of co 
tion landsc 
el to this w 
vendors sa 
security sy 
et many ve 
ot include s 
ntrol system 
cure them 
ble busine 
cises like 
s further d 
environme 
ndustries a 
ssional wh 
ss of acces 
ntial harm, 
lose produ 
ase, and 
ability to s 
stems is to 
coming fro 
shing the e 
outside ‘tun 
sically at th 
automating 
ore resourc 
ion in ind 
rol system 
decade a 
built upon 
re geared 
d, and fun 
e was acc 
rotocols or 
me very p 
evelopmen 
ages to inc 
cluding tho 
lt ad-hoc v 
dustry has 
s – physic 
ago, mos 
n proprieta 
towards a 
nctionality 
ess to dat 
r language 
roprietary 
nt of Ethern 
clude ‘Ethe 
ose outsid 
versions of 
cing many 
e many for 
ns, vendo 
ing and a 
e security 
. In some i 
ontrol ove 
ho works 
ss or cont 
any indus 
uction for 
other inta 
stay in bus 
o try to ba 
om many 
envelope’ 
ning’ and b 
he site. Th 
g more con 
ces thereb 
ty’ often se 
can be ov 
y pressures 
rces pushi 
r access fo 
alarm man 
of many 
industries t 
r your proc 
for a maj 
rol over ou 
try with litt 
some time 
angibles su 
siness. 
alance the 
angles. Inc 
to run fas 
better visib 
he advanc 
ntrol of the 
y increasin 
eems vagu 
verwhelmin 
jor refinery 
ur systems 
tle or no se 
e. This ca 
uch as co 
e two oppo 
creasing m 
ster, more 
ility into pr 
ing age of 
eir assets 
ng their rel 
sheer volu 
ver, this n 
ue and the 
ng. Howev 
s tradition 
cal as well 
st control 
ary vendor 
access to 
(or reliab 
ta. At first 
es to allow 
and indep 
net networ 
ernet-comp 
de the plan 
f protocols 
ally driven 
as networ 
systems 
technology 
personal, 
ility). The 
t many ve 
for the tra 
pendent of 
rks for bus 
pliance’ to 
nt environ 
that worke 
s to both a 
ing these o 
for process 
nagement. 
of these s 
this is mor 
cess can m 
n the 
k and 
were 
y and 
data, 
most 
ndors 
ansfer 
other 
siness 
allow 
ment. 
ed for 
allow acce 
opposing t 
s improvem 
. However 
systems a 
re of a nuis 
mean a se 
y once po 
s usually m 
ecurity in a 
an translat 
ompetitive 
ess to 
rends 
ments 
r this 
and is 
sance 
erious 
ointed out, 
means som 
and around 
te into re-edge, 
osing trend 
market com 
e efficiently 
roduction f 
f the workf 
and expe 
iance on c 
ume of effo 
need not b 
, “our 
meone 
d their 
-work, 
vestor 
inv 
ds: Access 
mpetition m 
y and with 
from specia 
force in ge 
ecting the 
computers. 
s and 
means 
h less 
alized 
eneral 
same 
ort and are 
be the cas 
eas of 
se. In
looking at 
quickly be 
efforts an 
initiatives 
but in the 
Processes 
essence w 
Before be 
philosoph 
which it is 
have. 
Underpinn 
always wo 
be lost. 
introspect 
t a numbe 
eing adopte 
d initiative 
offer diffe 
e end, all 
s and Tec 
which will i 
eginning an 
y. A secur 
s created 
er of secu 
ed as a ho 
es that go f 
rent sectio 
efforts can 
chnology. 
n turn fost 
ny security 
rity philoso 
but there 
ning all ef 
ork toward 
What we 
tions’! Suc 
What are the 
ow well are 
What issues 
What require 
Where do w 
ow will we 
•W 
•Ho 
•W 
•W 
•W 
•Ho 
There is n 
far as sec 
and indus 
industry, b 
which sets 
setting th 
undertake 
Knowing w 
key first s 
security s 
gadgets, 
done with 
technolog 
maintaina 
years with 
means th 
problem! 
rity framew 
olistic and 
far beyond 
ons, headin 
n usually 
The prior 
er a secur 
y program 
ophy will so 
are some 
fforts withi 
ds creating 
e call sec 
h exercise 
e policies a 
e they imp 
s / problem 
ements ap 
e need to 
change / i 
no "standa 
curity syste 
stry itself ha 
broadcasti 
s standard 
he training 
en by ASIS 
which stan 
step in man 
standards 
security pr 
h it includin 
gy – which 
able / repa 
h on-site 
hat either 
! 
The first p 
decision m 
works or s 
effective a 
d the purch 
ngs and n 
be summe 
rity of dev 
ity culture. 
or initiative 
ound differ 
basic req 
in organiza 
and main 
curity surv 
s are requ 
and standa 
lemented? 
s do we ha 
ply to our i 
be from a s 
mprove the 
ard" standa 
ems and ga 
as failed to 
ng and me 
ds for secu 
g and edu 
S in USA. 
ndard to ch 
naging com 
establishe 
rofessiona 
ng its limita 
h is chang 
airable in a 
repair con 
you do n 
premise is 
makers, th 
standards 
approach to 
hase and d 
ames for e 
ed into thr 
veloping a 
a commo 
o security. 
deploymen 
each of the 
ree (3) fou 
security 
e your org 
rent for ea 
uirements 
ations one 
ntaining a s 
veys and 
uired to foc 
ards we cu 
? 
ave? 
industry? 
security pe 
e situation 
ard. It is no 
adgets are 
o develop i 
edia indust 
rity guards 
ucation sta 
n theme e 
. This appr 
nt of techn 
eir areas o 
undational 
philosophy 
anization m 
ch compa 
that all se 
e must firs 
strong sec 
security 
us on follo 
rrently hav 
emerges th 
roach com 
nology. Diff 
of concent 
areas: Pe 
y is need 
must first a 
ny, industr 
ecurity phi 
st have a 
urity cultur 
audits ar 
wing areas 
ve? 
erspective? 
? 
ot a cliché. 
e concerne 
its own sel 
try or the IT 
s, supervis 
andards fo 
hoose and 
mpliance. S 
ed by laws 
ls need to 
ations. The 
ing very fa 
very sho 
ndition. Th 
not unders 
quite sim 
he owners 
? 
In fact the 
ed. There a 
f-regulator 
T Educatio 
ors, pub b 
or security 
d what you 
Some indu 
s or regula 
o first unde 
e shelf life 
ast. Today 
ort time. A 
inking tha 
stand the 
ply that se 
and opera 
hat is 
mbines 
ferent 
ration 
eople, 
ed in 
adopt a se 
ry and reg 
ilosophies 
security 
re or your 
re basica 
s - 
ere are no 
are no gov 
ry mechan 
n Industry 
ouncers, fr 
y personne 
ur obligatio 
ustries and 
ations. Wh 
erstand the 
of a syste 
y what is c 
system m 
at techno 
technolog 
ecurity is i 
ators of the 
ecurity 
ion in 
must 
philosophy 
momentum 
ally ‘outso 
o set stand 
verning / re 
ism as dev 
. In UK BI 
ront man e 
el. Similar 
ns are as 
d organizat 
hile buying 
e technolo 
m or gadg 
current an 
must have 
logy can 
gy or you 
mportant t 
e systems 
y and 
m will 
urced 
ards in Ind 
egulatory b 
veloped by 
SA is watc 
etc. BISA is 
r initiatives 
a result o 
tions are re 
g the secu 
ogy and als 
get is direc 
d ‘the thin 
longevity o 
solve all 
u do not u 
to the orga 
s, the supp 
dia so 
bodies 
y films 
chdog 
s also 
s are 
f that choi 
equired to 
urity system 
so what ca 
ctly related 
ng’, may n 
of at least 
l the prob 
understan 
anization. T 
port staff, t 
ce, is 
meet 
ms or 
an be 
to its 
not be 
t 6-10 
blems 
d the 
This mean 
the consul 
ns the 
tants,
vendors, 
everyone’ 
More ofte 
awarenes 
contractor 
needs to 
team mem 
your site, 
remains th 
security b 
effective 
site staff, 
’s best inte 
en than no 
ss and trie 
r and visito 
happen fo 
mbers who 
you will n 
hat your in 
breach inte 
as your le 
More ofte 
have a de 
on-going 
due to the 
changing! 
but the ne 
drives’ we 
storage ca 
using them 
only as e 
in short 
erest. This 
ot, an indu 
ed to educ 
or onsite n 
r security, 
o understa 
not succee 
nternal, trus 
entionally o 
east inform 
en than no 
efined star 
security ef 
e fact that 
! What was 
ext threat c 
ere an eme 
apacities a 
m. This wa 
effective as 
This topic 
mentioned 
install sec 
disaster re 
of those e 
need to e 
implemen 
lives are m 
find ways 
school co 
because t 
die based 
everyone 
is no differ 
ustrial facil 
cate every 
needs to ha 
and can b 
and their ro 
d in secur 
sted emplo 
or otherwis 
med emplo 
ot, many o 
rt, finish an 
fforts, but 
security c 
s a threat y 
coming wi 
erging fad. 
and require 
as not a co 
s it is curr 
c is the b 
d earlier, y 
curity progr 
ecovery pl 
efforts caus 
explain to 
nted withou 
most affect 
around th 
mputer lab 
they do no 
d on how 
The last a 
balance. 
return. In 
decide as 
to your c 
money, or 
that you w 
, understa 
rent from t 
lity has a 
yone as to 
ave safety 
be integrate 
ole and th 
ring your fa 
oyees have 
se. In othe 
loyee. 
rganization 
nd cost. Th 
true, lastin 
oncerns ar 
yesterday o 
ll not be a 
Today the 
e little or no 
oncern a fe 
rent. 
basic prem 
your weake 
rams, risk 
lan you are 
se a chang 
them why 
ut the prop 
ted? In the 
he new sys 
b where stu 
ot understa 
well your 
and perhap 
In this sen 
order for 
s an organi 
current env 
r access to 
will still hav 
ands that 
he importa 
long histo 
o why saf 
orientatio 
ed into saf 
he importa 
acility. It is 
e the great 
er words, y 
ns see se 
his may be 
ng security 
re brought 
or last wee 
as deterred 
ey are sold 
o knowled 
ew years a 
mise on w 
est link and 
managem 
e well on y 
ge in the da 
y these ch 
per awaren 
ese cases i 
stems you 
udents are 
and or care 
employee 
ps most im 
nse the ba 
your organ 
ization wha 
vironment 
o your data 
ve some so 
keeping y 
ance place 
ory of alwa 
fety is imp 
n and upd 
fety progra 
nce of the 
s a harsh r 
test opport 
your secu 
curity prog 
e the case 
y is an on-t 
about by 
ek may be 
d. Less tha 
d more che 
ge of spec 
ago. Unfor 
which your 
d biggest t 
ment proces 
your way t 
ay-to-day b 
hanges are 
ness traini 
it is only a 
u just put in 
e some of t 
e about se 
es receive 
mportant th 
alance is b 
nization to 
at level of 
towards s 
a. And no m 
ort of incide 
your facilit 
ed on safety 
ays trying 
portant. Ev 
ated each 
ams. Witho 
eir actions 
reality but 
tunity to ca 
urity progr 
grams or i 
e for a part 
-going initia 
technolog 
fixed by yo 
an 5 years 
eaply than 
cialized ap 
tunately y 
r security 
threat is yo 
sses and a 
o securing 
business fl 
e necessa 
ng and ed 
short time 
n place thu 
the most c 
ecurity. Yo 
e and embr 
ing a prop 
between ris 
o move tow 
risk you a 
security is 
matter how 
ent at som 
ty secure 
y. 
to raise s 
very empl 
year. This 
out rank an 
(or inactio 
the simple 
ause or cre 
ram is on 
nitiatives a 
ticular com 
ative. This 
y - and tec 
our curren 
ago USB 
ever, are c 
pplications 
your secur 
philosoph 
our least e 
healthy b 
g your envi 
ow for you 
ary. Too m 
ducation fo 
before the 
us negatin 
reative peo 
our securi 
race it. 
per security 
sk and rew 
ward a pro 
re willing t 
going to 
w you do p 
e point in t 
as projects 
mponent of 
s is quite s 
chnology k 
t security p 
keys or ‘t 
capable of 
or program 
rity progra 
hy needs 
educated e 
business co 
ironment. 
ur employe 
many times 
or the peop 
e day-to-da 
ng your eff 
ople at byp 
ity program 
y philosoph 
ward as w 
per securi 
o live with 
cost some 
roceed, the 
time. 
to be buil 
employee. 
ontinuity pl 
However, 
ees then yo 
s are prog 
ple whose 
ay users st 
forts. Think 
passing se 
m will live 
hy needs i 
well as betw 
ty program 
. Every ch 
ething whe 
ere is a ve 
s the attitu 
ween effor 
m you mus 
ange you 
ether it is 
ery good ch 
is in 
safety 
oyee, 
s also 
nd file 
on) at 
e fact 
eate a 
nly as 
s that 
f your 
simply 
keeps 
plans, 
humb 
huge 
ms for 
am is 
lt. As 
If you 
lan or 
if any 
ou will 
grams 
daily 
tart to 
k of a 
ecurity 
e and 
ude of 
rt and 
st first 
make 
time, 
hance
A security 
inappropr 
in how we 
benefit fro 
y incident 
riate acces 
ell containe 
om it. 
The day 
prepared 
Every bus 
win out o 
organizati 
can be c 
ss to data o 
ed the inc 
will come 
to deal wit 
siness has 
over secu 
ion to: 
derstand t 
ocument the 
ake and do 
riodically r 
d whether 
well-defin 
that fall ou 
 Un 
 Do 
 Ma 
 Pe 
and 
Having a 
situations 
Hand you 
them – to 
Business 
their syst 
authentica 
common p 
such as c 
approved 
Remembe 
of the org 
procedura 
same proc 
come to 
standard. 
If your org 
the proce 
complianc 
Auditors h 
Washingto 
well to ins 
catastroph 
or an IO ro 
ident is, ho 
e when a 
th this situa 
s different 
rity best p 
ic system 
oom. The t 
ow quickly 
business 
ation will sa 
needs and 
practices. 
the risks be 
ese risks a 
ocument an 
review acc 
the risk is 
ned proces 
utside of th 
ur business 
prop up th 
unit folks w 
tems and 
ation to pr 
platform” is 
criteria for d 
security so 
er, policies 
ganization. 
al docume 
cedural an 
the same 
failure, a 
true meas 
y you recov 
need con 
ave time, m 
d tolerance 
You need 
eing taken 
and their m 
n informed 
cepted risk 
still accept 
ss to hand 
hose antici 
s manage 
he short leg 
want secu 
premises 
rotect critic 
s not helpf 
deciding w 
olutions sp 
s are not in 
. Specific 
nts. The k 
nd policy d 
conclusio 
ganization 
ess of deve 
ce, and the 
have the s 
on or your 
sure that yo 
accident in 
ure of you 
ver, and if 
nflicts with 
money and 
e for risk. A 
d to have 
mitigating fa 
decision a 
ks to dete 
table 
dle excepti 
pated whe 
rs a copy 
g on the ta 
rity folks to 
s secure. 
cal inform 
ul. You ne 
whether info 
pecifically t 
nstruction m 
information 
ey here is 
ocuments 
ons as to 
has an In 
eloping me 
eir experie 
structured 
state capi 
our measu 
n process 
ur security 
f you choo 
h a securi 
d aggravati 
At some po 
e a proces 
actors 
as to wheth 
rmine whe 
area or s 
program w 
ose to learn 
ity best p 
ion. 
oint, busin 
ss in plac 
her to acce 
ether new 
ons will a 
en the polic 
of typical 
able in the 
o provide t 
Telling a 
ation" or t 
ed to prov 
ormation / 
tied to polic 
manuals. P 
n as to ho 
s clarity an 
in front of 
the secu 
ternal Aud 
easurable 
nce in othe 
approach 
tal dictate 
urements w 
subtle 
will be 
n and 
practices. B 
Being 
ess needs 
ce to allow 
ept a risk 
mitigation 
s may 
w the 
ns are ava 
organizati 
written. 
llow your 
cies were w 
standards 
break room 
hem with s 
business 
to tell them 
ide your us 
facility is c 
cies. 
Policies are 
ow to impl 
d consiste 
everyone 
rity measu 
dit departm 
actions. A 
er types of 
h needed t 
your exter 
will hold up 
s and they 
m. 
specific ins 
unit man 
m to “use 
sers with o 
critical or n 
ailable 
on to dea 
y'll probabl 
y end up 
structions o 
nager to 
ACS alon 
organizatio 
not, and lis 
e high-leve 
lement po 
ency. You 
in your org 
ures that 
ment, these 
After all, th 
f audits an 
to put this 
rnal standa 
in court. 
l with 
using 
on how to 
"use two-f 
ng with ID 
on-specific 
ts of tested 
el stateme 
licy should 
should be 
ganization 
are neede 
e are good 
hey will be 
nd standard 
s practice 
ards, get yo 
make 
factor 
DS on 
tools, 
d and 
nts of the 
d be laid o 
able to pu 
and have 
ed to mee 
people to 
e doing th 
ds is a val 
to work. I 
our legal fo 
intent 
out in 
ut the 
them 
et the 
o get involv 
e measuri 
uable reso 
f our frien 
olks involv 
ved in 
ing of 
ource. 
nds in 
ed as
Industry s 
legislators 
managem 
procedure 
standards f 
s and indu 
ment and se 
es. 
Education 
profession 
environme 
journalism 
officers to 
This prob 
meet the 
that most 
employers 
institution 
review the 
that allow 
down train 
for security 
ustry group 
ecurity pro 
n remains 
nals with 
ent and pre 
m graduate 
o plan and 
blem arises 
ever-chan 
t security 
s and gro 
s of the ne 
e effective 
w business 
ning standa 
Security is 
productive 
are issues 
budget is 
misconce 
atmosphe 
conducted 
there are 
inside the 
higher pr 
y are not a 
ps can tell 
ofessionals 
an area 
army or 
emises. O 
e to write w 
execute go 
s from a n 
nging techn 
profession 
oups like I 
eed for can 
security p 
to be cond 
ards for se 
s treated in 
e systems 
s such as 
allocated t 
ption. It i 
ere where 
d smoothly 
chances o 
e premises 
rofit! 
At giant c 
Protecting 
with expe 
and live b 
center wit 
There are 
designing 
that secur 
ineffectua 
cure all – 
us a lot a 
s in our org 
of conce 
police se 
ne comme 
with appro 
ood securi 
number of 
nology lan 
nals rank 
CISS / IS 
ndidates w 
lans as pe 
ducted with 
ecurity pers 
n most bus 
and plans 
insurance 
to security 
is good s 
all produ 
y without f 
of attack by 
s or at wor 
companies 
g them is a 
ertise in ph 
backups in 
th a pocket 
e plenty of 
a secure 
rity for the 
al afterthou 
and this 
about best 
ganizations 
ern for sec 
ervices ar 
ent seemed 
opriate gra 
ty measure 
challenge 
dscape. S 
low on th 
SSM / IPS 
who are we 
er changing 
h assuranc 
sonnle but 
siness and 
. Security 
, legal com 
departmen 
security th 
uction, ope 
fear or dan 
y miscrean 
rk-floor are 
, data cen 
job for se 
hysical sec 
n the world 
t knife, a c 
f complicat 
data cente 
new data 
ught? 
is a good 
practices 
s to come u 
curity prof 
re inadequ 
d to resona 
ammar, wh 
es?” 
es, particul 
Security is 
heir hierarc 
SA / CAPS 
ell trained i 
g needs of 
ce. PSAR A 
fall short o 
d organizat 
is also see 
mpliances, 
nt. Mostly s 
hat guara 
eration an 
nger. No o 
nts, theft o 
eas. Good 
nters don't 
ecurity offic 
curity and 
d are a wa 
amera pho 
ted docum 
er-But wha 
center is 
thing on th 
and goals 
up with the 
fessionals. 
uately pre 
ate with ma 
y can’t we 
he whole. W 
s, it is up t 
e processe 
. The per 
epared to 
any: “If it’s 
e expect e 
arly the ne 
also an “e 
chy of inte 
SI / SAFE 
n how to p 
f varied org 
Act 2005 a 
of desired 
tions as ‘co 
en as burd 
pressure 
security pro 
ntees sec 
nd mainte 
one can w 
of costly inv 
d security 
just hold 
cers, of co 
business 
aste of mo 
one and ba 
ments that 
at should b 
built into t 
While 
to the 
s and 
rception is 
create s 
s fair to exp 
ex-army / p 
eed to adj 
eat your ve 
erests. Th 
E Code to 
plan, exec 
ganizations 
attampts ve 
details. 
ost center’ 
en which i 
from stake 
ofessionals 
cured, has 
nance or 
ork; forget 
ventory or 
y means g 
the crown 
ourse. But j 
continuity 
oney if som 
ad intention 
can guide 
be the CSO 
the design 
s that 
ecure 
pect a 
police 
just curricu 
egetables” 
e onus fa 
inform tra 
ute and re 
s and indu 
ery feebly 
needing b 
is evil yet e 
eholders e 
s are to be 
ssle-free c 
marketing 
t the best 
law-and – 
good prod 
jewels; th 
just as imp 
. That's be 
meone can 
ns. 
companie 
O's high-le 
s, instead 
ula to 
topic 
alls to 
aining 
evise / 
stries 
to lay 
budgets for 
essential. T 
etc. that me 
e blamed fo 
congenial 
g activities 
performan 
order prob 
duction, m 
hey are the 
portant, it's 
ecause all 
n walk righ 
r non- 
There 
eager 
or this 
work 
s are 
nce, if 
blems 
means 
e crown je 
s a job for 
the encry 
ht into the 
es through 
evel goals f 
of being a 
ewels. 
those 
yption 
e data 
the proce 
for making 
an expensi 
ess of 
g sure 
ive or
Read below to find out how a data center is designed to withstand everything from corporate 
espionage to terrorists to natural disasters. Sure, the extra precautions can be expensive. But 
they're simply part of the cost of building a secure facility that also can keep humming through 
disasters. 
Build on the right spot. Be sure the building is some distance from headquarters (20 miles is 
typical) and at least 100 feet from the main road. Bad neighbors: airports, chemical facilities, 
power plants. Bad news: earthquake fault lines and areas prone to hurricanes and floods. And 
scrap the "data center" sign. 
Have redundant utilities. Data centers need two sources for utilities, such as electricity, water, 
voice and data. Trace electricity sources back to two separate substations and water back to 
two different main lines. Lines should be underground and should come into different areas of 
the building, with water separate from other utilities. Use the data center's anticipated power 
usage as leverage for getting the electric company to accommodate the building's special 
needs. 
Pay attention to walls. Foot-thick concrete is a cheap and effective barrier against the 
elements and explosive devices. 
Avoid windows. Think warehouse, not office building! If you must have windows, limit them to 
the break room or administrative area, and use bomb-resistant laminated glass. 
Use landscaping for protection. Trees, boulders and gulley can hide the building from passing 
cars, obscure security devices (like fences), and also help keep vehicles from getting too close. 
Use retractable crash barriers at vehicle entry points. Control access to the parking lot and 
loading dock with a staffed guard station. Use a raised gate and a green light as visual cues that 
the bollards are down and the driver can go forward. In situations when extra security is needed, 
have the barriers lift-up by default, and lowered only when someone has permission to pass 
through. 
Plan for bomb detection. For data centers that are especially sensitive or likely targets, have 
guards use mirrors to check underneath vehicles for explosives, or provide portable bomb-sniffing 
devices. You can respond to a raised threat by increasing the number of vehicles you 
check—perhaps by checking employee vehicles as well as visitors and delivery trucks. 
Limit entry points. Control access to the building by establishing one main entrance, plus a 
back one for the loading dock. This keeps costs down too. Make fire doors exit only. For exits 
required by fire codes, install doors that don't have handles on the outside. When any of these 
doors is opened, a loud alarm should sound and trigger a response from the security command 
center. Use plenty of cameras. Surveillance cameras should be installed around the perimeter 
of the building, at all entrances and exits, and at every access point throughout the building. A 
combination of motion-detection devices, low-light cameras, pan-tilt-zoom cameras and 
standard fixed cameras is ideal. Footage should be digitally recorded and stored offsite. 
Protect the building's machinery. Keep the mechanical area of the building, which houses 
environmental systems and uninterruptible power supplies, strictly off limits. If generators are 
outside, use concrete walls to secure the area. For both areas, make sure all contractors and 
repair crews are accompanied by an employee at all times.
Plan for s 
can be se 
people an 
spreading 
chemical, 
Ensure n 
sure inter 
housed. A 
Use two-sensitive 
less invas 
expensive 
Harden th 
will have b 
secure air 
et to re circ 
nd equipme 
g from a n 
biological 
nothing ca 
rnal walls r 
Also make 
-factor au 
areas of d 
sive than 
e access ca 
he core w 
been authe 
the outer 
visitors to 
the inner 
neral empl 
the entra 
nter. Typic 
ictest "p 
ggybacking 
ve two opt 
the door t 
om. This is 
ainframes 
cated. Prov 
possible in 
he exits to 
areas of t 
h building 
area where 
rest room 
t have acce 
 At 
for 
 At 
gen 
 At 
cen 
stri 
pig 
hav 
 At 
roo 
ma 
loc 
as 
Watch th 
sensitive 
helps with 
common a 
Visitor’s 
who don't 
r-handling 
culate air r 
ent if there 
nearby fire 
or radiolog 
an hide in 
run from th 
sure drop-uthenticati 
g. Make su 
rather than 
e were som 
. For adde 
gical conta 
the walls 
he slab ce 
-down ceili 
on. Biome 
rs, with ha 
anning. In 
data center 
retinal sca 
ards. 
ith securit 
enticated a 
door. Don 
buzz the f 
r door. Se 
loyee area 
ance to th 
cally, this 
positive 
g allowed. 
ions: 
to an indiv 
s for the r 
or other 
vide access 
n order to c 
oo. Monito 
he facility 
evacuation 
e people c 
ms. Make s 
ess to the s 
ure the hea 
n drawing i 
me kind of 
ed security 
aminant. 
and ceilin 
iling all the 
ings don't p 
etric ident 
and geome 
other are 
ty layers. 
at least thre 
n't forget y 
front desk. 
eparates v 
. 
e "data" 
is the lay 
control," 
For impl 
vidual com 
oom wher 
critical I 
s only on a 
control and 
or entrance 
as well. It 
n if there's 
an eat with 
sure to incl 
secure par 
As 
att 
yo 
Str 
ating, vent 
n air from 
biological 
y, put dev 
tilating and 
the outsid 
or chemic 
ices in pla 
ngs. In sec 
e way to s 
provide hid 
ification is 
etry or finge 
as, you m 
Anyone en 
ee times, i 
you'll need 
visitor are 
part of th 
yer that h 
d air-condi 
de. This co 
cal attack o 
ace to mo 
cure areas 
sub flooring 
dden acces 
becoming 
erprint sca 
may be abl 
ntering the 
ncluding: 
a way 
a from 
he data 
has the 
g no 
on, you 
cessing 
servers, 
ment is 
ded basis, 
cess. 
t—not only 
u keep tra 
rohibit food 
g food on c 
ooms for u 
building. 
meaning 
lementatio 
mputer proc 
re actual s 
T equipm 
an as-need 
d track acc 
e and exit 
'll help you 
s a fire. Pr 
hout gettin 
lude bathro 
rts of the b 
s soon 
tack an 
our in 
rategist 
n as t 
nd des 
nterests 
the fe 
stroy it 
s! - 
tioning sys 
uld help p 
or heavy s 
nitor the a 
s of the da 
g where w 
ss points. 
g standard 
anners usu 
le to get a 
most secu 
stems 
rotect 
moke 
air for 
ta center, 
wiring is typ 
make 
pically 
d for acce 
ually consid 
away with 
ure part of 
and segm 
ess to 
dered 
less-center 
f the data c 
ment these 
y for the m 
ck of who 
d in the co 
computer e 
use by visit 
rooms as 
main facilit 
was wher 
omputer ro 
equipment 
tors and de 
ear ap 
. Secu 
Chana 
much 
more 
t also 
vide a 
ty but for 
re when. It 
ooms. Prov 
t. 
elivery peo 
proach 
re you 
kya, t 
ople 
hes ne 
u must, 
the G 
ear, 
, all 
reat
easy way 
requireme 
consumer 
services f 
(ITU), mo 
on their h 
subscribe 
Messages 
offensive, 
Problem 
It is rare f 
of a text 
standard 
mobiles th 
users are 
communic 
revenue f 
operators 
providers 
the spam 
[Source: B 
Another c 
400 in ex 
messages 
70,000 pe 
Mobile Ne 
businesse 
viruses sp 
the phone 
Corporate 
fail to che 
suspicious 
security s 
y of stayi 
ent for kee 
rs put the 
fall short 
ore than 80 
handset at 
er into cal 
s are com 
but all hav 
ms 
for a mobile 
message 
to have sp 
hat feature 
e complete 
cations. Th 
from the sp 
around t 
with their 
m is to swi 
Bloomberg 
concern for 
xistence to 
s to 6% ov 
er day onl 
etwork Vir 
es as they 
pread in a 
es of peopl 
e phones a 
eck their p 
s increase 
software in 
Those int 
can India 
problems 
Rapidly e 
billion mo 
Mobile Su 
as India, 
communic 
access to 
uch. Whils 
networks 
reliability 
ations. Acc 
bile phone 
nt. The hid 
emium rat 
ot commer 
ng in comm 
ing in tou 
eping their 
eir trust in 
of expecta 
0% of mob 
some poin 
ling a pre 
mmonly no 
ve one thin 
e user not 
(SMS), p 
pam filters 
e Internet a 
ly depend 
he conflict 
pam, whic 
he world 
users' mob 
tch to ope 
g.net, Augu 
r mobile op 
oday. One 
ver the las 
ly 1 year 
rus Attack 
y move ea 
similar wa 
le who acc 
are particul 
phone bill, 
es in call ch 
nstalled [So 
trusive and 
an mobile 
d unwelco 
operators 
expanding 
obile subs 
ubscriber]. 
, where m 
cation, as 
o landline 
st this is 
clear of s 
and acce 
cording to 
users wor 
dden motiv 
te number 
rcially foc 
mon: they a 
to have re 
picture me 
on emails 
and email a 
ent on the 
t here is t 
ch impacts 
actively e 
bile phone 
erator. In 
ust 1st, 200 
perators is 
e mobile o 
st 12 mont 
ago [Sour 
s (online). 
asily betwe 
ay to PC vi 
cept the SM 
larly vulne 
, sending 
harges. To 
ource: 200 
me mobile 
do? Chec 
mobile pho 
scribers w 
This is la 
mobile ph 
s many pe 
telephony, 
very pos 
pam and v 
essibility, a 
o the Inter 
ldwide hav 
ve behind 
r to buy a 
used, and 
are intrusiv 
eceived an 
essage (M 
s when usi 
access are 
eir mobile 
that in mo 
on their d 
ncourage 
e numbers 
India som 
08 (online) 
s the sharp 
operator h 
ths, averag 
rce: Adapt 
. Mobile v 
een hands 
ruses, goin 
MS or MMS 
rable to th 
the charg 
o add to th 
08 online w 
viruses a 
ck out the 
one indust 
worldwide 
rgely cont 
hones are 
eople are 
and mob 
itive for o 
viruses is 
and are o 
rnational T 
ve received 
such mes 
unsolicite 
MS), or v 
ng a home 
e extremely 
network o 
ost cases, 
desire to p 
spam by 
and the on 
e operato 
], even afte 
p rise in mo 
as noted 
ging 100,0 
tiveMobile] 
viruses are 
ets and in 
ng straight 
S. 
e threat po 
es straigh 
is worry, 8 
well-being 
and spam-e 
solutions 
try has alre 
[Source: 
tributed by 
e the prev 
unable t 
biles provid 
operators' 
absolutely 
often left f 
Telecommu 
d an unso 
ssages is o 
or enter 
e cases ca 
welcome. 
product 
d in some 
ve and unw 
d mobile s 
video mes 
e compute 
y vulnerabl 
perator to 
the opera 
rotect the 
supplying 
nly way for 
rs face sp 
er protocol 
obile phon 
a rise in 
000 virus i 
. It sees S 
e also fast 
nfect share 
t to the add 
-What 
s and 
eady over 
ABI Rese 
y countries 
valent for 
o gain re 
de a cheap 
revenues 
y paramoun 
frustrated 
unication U 
licited mes 
often to lur 
a compe 
an be dee 
spam mess 
ssage (VM 
er, persona 
le to mobil 
manage t 
rator is ga 
subscribe 
g content 
r a subscri 
pam levels 
l-level filte 
ne viruses, 
attacks fro 
ncidents p 
Sharp Ris 
t becoming 
ed address 
dress book 
osed by vir 
t to accou 
86% of mo 
survey, F-e 
three 
earch: 
such 
rm of 
eliable 
p and 
s, the 
nt, as 
when 
Union 
ssage 
re the 
etition. 
emed 
sage in the 
MS). Whilst 
al and corp 
e spam. In 
these unwa 
aining exte 
r. Some m 
and applic 
iber to get 
s of about 
ring. 
with a rep 
om 0.6% 
per day-up 
e in Volum 
g a mena 
s books. T 
k and infilt 
ruses as m 
untants, an 
obile phone 
-Secure C 
e form 
t it is 
porate 
n fact, 
anted 
ensive 
mobile 
cation 
rid of 
30% 
ported 
of all 
p from 
me of 
ace to 
These 
rating 
most emplo 
nd won't n 
e users hav 
orporation 
oyees 
notice 
ve no 
]. We
know from our own data that subscribers whose phone do get infected can lose up to 100 Euros 
a day from MMS being sent from their phone by the virus. 
Solutions 
To prevent mobile spam and viruses becoming a problem for their subscribers, Indian network 
operators must ensure they don't solicit spam. Operators also need to take a leading role in the 
development of built-in network security to protect mobile phones, and prioritize customer 
satisfaction above potential ready-money revenue generated as a result of spam and viruses. 
To ensure protection from mobile spam and viruses, operators must also secure their network. 
This way, not only known viruses, but also anomalies within the network can be detected, 
isolated, and disinfected, enabling network immunization. Having security on the network also 
means that employee-specific policies can be set. For example, an employee may not be 
allowed to download content which can be considered out of line from their business pursuits, 
while others may be prohibited from accessing the mobile Internet altogether-a similar approach 
to the one some organizations are already using for their PC infrastructure. 
The constant evolution of spammers' techniques, combined with the continually growing mobile 
telephony industry, means that the battle for consumer trust is only just beginning-and mobile 
operators have to make sure they are competing effectively. 
A new walk-through airport lie-detector made in Israel may prove to be the toughest challenge 
yet for potential hijackers or drugs smugglers. Tested in Russia, the two-stage GK-1 voice 
analyzer requires that passengers don headphones at a console and answer: ”Yes" or "No" into 
a microphone to questions about whether they are planning something illicit. 
The software will almost always pick up uncontrollable tremors in the voice that give away liars 
or those with something to hide, say its designers at Israeli firm Nemesysco. "In our trial, 500 
passengers went through the test, and then each was subjected to full traditional searches," 
said chief executive officer Amir Liberman. "The one person found to be planning something 
illegal was the one who failed our test." The GK-1 is expected to cost between $10,000 to - 
$30,000 when marketed. A spokesman for Moscow's Domodyedevo Airport, which is using a 
prototype, said "the tester (lie detector) has proved to be effective and we are in principle ready 
to use it". The September 11, 2001 hijacking attacks have led to a slew of innovations designed 
to boost airline security. Lieberman said several countries had expressed interest in the GK-l. 
"Unlike conventional lie detectors .such as the polygraph, this is minimally invasive, requiring 
hardly any physical contact," Lieberman said, adding that the first stage of the test takes 
between 30-75 seconds. Those that fail are taken aside for more intensive questioning and, if 
necessary, are searched. Lieberman said around 12 percent of passengers tend to show stress 
even when they have nothing to hide. "Some may feel nervous because they have used drugs, 
while having no intention to smuggle drugs," he said. "The whole thing is performed in a low-key 
manner to avoid causing anxiety." Reuters
For more 
e detail ple 
Managing 
Lipata, Mi 
T: 0063-2 
E-mail: po 
Web: www 
g Director, 
inglanilla, C 
260-05-57 
olly.secreta 
w.pcstcons 
Ever had 
haven't h 
days like 
had a com 
ggestions 
Sug 
ease conta 
act – 
PCS Train 
Cebu, Phil 
ning Consu 
ippines, 60 
0063-9064 
consultant. 
m 
M: 
aria@pcstc 
sultant.com 
these??? 
puter long 
& feedbac 
ultant 
046 
4116749 
.com, 
? If not, yo 
g enough. 
ck may be 
ou 
. 
e sent to us on e-mail: sbtyagi1958@gmail.com

Mais conteúdo relacionado

Semelhante a News letter jan 13

Engica ptw-electronic-permit-to-work-step-change-
Engica ptw-electronic-permit-to-work-step-change-Engica ptw-electronic-permit-to-work-step-change-
Engica ptw-electronic-permit-to-work-step-change-Risman BizNet
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docxvickeryr87
 
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskStrategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskMighty Guides, Inc.
 
Weathering the Storm of IT Security Compliance
Weathering the Storm of IT Security ComplianceWeathering the Storm of IT Security Compliance
Weathering the Storm of IT Security ComplianceCondition Zebra (CONZebra)
 
Chief Procurement Officer Summit 2023 - Jag Lamba News Release.pdf
Chief Procurement Officer Summit 2023 - Jag Lamba News Release.pdfChief Procurement Officer Summit 2023 - Jag Lamba News Release.pdf
Chief Procurement Officer Summit 2023 - Jag Lamba News Release.pdfmarcus evans Network
 
What Trends and Changes CPOs Need to Prepare For - Jag Lamba-Certa
What Trends and Changes CPOs Need to Prepare For - Jag Lamba-CertaWhat Trends and Changes CPOs Need to Prepare For - Jag Lamba-Certa
What Trends and Changes CPOs Need to Prepare For - Jag Lamba-CertaFinance Network marcus evans
 
1 p 14-0714 wearable technology part 2 blue paper
1 p 14-0714 wearable technology part 2 blue paper1 p 14-0714 wearable technology part 2 blue paper
1 p 14-0714 wearable technology part 2 blue paper4imprint
 
ft_mckinsey digital oil and gas
ft_mckinsey digital oil and gasft_mckinsey digital oil and gas
ft_mckinsey digital oil and gasTor Jakob Ramsøy
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
Ulf mattsson the standardization of tokenization and moving beyond pci
Ulf mattsson   the standardization of tokenization and moving beyond pciUlf mattsson   the standardization of tokenization and moving beyond pci
Ulf mattsson the standardization of tokenization and moving beyond pciUlf Mattsson
 
Advice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityAdvice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityMighty Guides, Inc.
 
Automation's Perfect Storm! These Changes Aren't Coming, They're Here!
Automation's Perfect Storm! These Changes Aren't Coming, They're Here!Automation's Perfect Storm! These Changes Aren't Coming, They're Here!
Automation's Perfect Storm! These Changes Aren't Coming, They're Here!Walt Boyes
 
Organizational Behavior Question#3
Organizational Behavior Question#3Organizational Behavior Question#3
Organizational Behavior Question#3Waseem Saeed
 

Semelhante a News letter jan 13 (20)

Digitization
DigitizationDigitization
Digitization
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
Engica ptw-electronic-permit-to-work-step-change-
Engica ptw-electronic-permit-to-work-step-change-Engica ptw-electronic-permit-to-work-step-change-
Engica ptw-electronic-permit-to-work-step-change-
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
 
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskStrategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity Risk
 
Weathering the Storm of IT Security Compliance
Weathering the Storm of IT Security ComplianceWeathering the Storm of IT Security Compliance
Weathering the Storm of IT Security Compliance
 
Chief Procurement Officer Summit 2023 - Jag Lamba News Release.pdf
Chief Procurement Officer Summit 2023 - Jag Lamba News Release.pdfChief Procurement Officer Summit 2023 - Jag Lamba News Release.pdf
Chief Procurement Officer Summit 2023 - Jag Lamba News Release.pdf
 
What Trends and Changes CPOs Need to Prepare For - Jag Lamba-Certa
What Trends and Changes CPOs Need to Prepare For - Jag Lamba-CertaWhat Trends and Changes CPOs Need to Prepare For - Jag Lamba-Certa
What Trends and Changes CPOs Need to Prepare For - Jag Lamba-Certa
 
1 p 14-0714 wearable technology part 2 blue paper
1 p 14-0714 wearable technology part 2 blue paper1 p 14-0714 wearable technology part 2 blue paper
1 p 14-0714 wearable technology part 2 blue paper
 
News letter jan.14
News letter jan.14News letter jan.14
News letter jan.14
 
ft_mckinsey digital oil and gas
ft_mckinsey digital oil and gasft_mckinsey digital oil and gas
ft_mckinsey digital oil and gas
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
FINAL VER - 2015_09
FINAL VER - 2015_09FINAL VER - 2015_09
FINAL VER - 2015_09
 
Ulf mattsson the standardization of tokenization and moving beyond pci
Ulf mattsson   the standardization of tokenization and moving beyond pciUlf mattsson   the standardization of tokenization and moving beyond pci
Ulf mattsson the standardization of tokenization and moving beyond pci
 
Advice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityAdvice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT Cybersecurity
 
Automation's Perfect Storm! These Changes Aren't Coming, They're Here!
Automation's Perfect Storm! These Changes Aren't Coming, They're Here!Automation's Perfect Storm! These Changes Aren't Coming, They're Here!
Automation's Perfect Storm! These Changes Aren't Coming, They're Here!
 
Organizational Behavior Question#3
Organizational Behavior Question#3Organizational Behavior Question#3
Organizational Behavior Question#3
 
Software By Cloud
Software By CloudSoftware By Cloud
Software By Cloud
 
Analysis and Design of Information Systems
Analysis and Design of Information SystemsAnalysis and Design of Information Systems
Analysis and Design of Information Systems
 

Mais de Capt SB Tyagi, COAC'CC*,FISM,CSC, (20)

14 aug
14 aug14 aug
14 aug
 
14 july
14 july14 july
14 july
 
14 june
14 june14 june
14 june
 
14 may
14 may14 may
14 may
 
ICISS Newsletter Oct14
ICISS Newsletter Oct14ICISS Newsletter Oct14
ICISS Newsletter Oct14
 
14 nov
14 nov14 nov
14 nov
 
ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
 
ICISS Newsletter March 14
ICISS Newsletter March 14ICISS Newsletter March 14
ICISS Newsletter March 14
 
ICISS Newsletter Feb 14
ICISS Newsletter Feb 14ICISS Newsletter Feb 14
ICISS Newsletter Feb 14
 
News letter dec.03
News letter dec.03News letter dec.03
News letter dec.03
 
News letter oct 13
News letter oct 13News letter oct 13
News letter oct 13
 
News letter sept 13
News letter sept 13News letter sept 13
News letter sept 13
 
News letter aug 13
News letter aug 13News letter aug 13
News letter aug 13
 
News letter july 13
News letter july 13News letter july 13
News letter july 13
 
News letter june 13
News letter june 13News letter june 13
News letter june 13
 
News letter april 13
News letter april 13News letter april 13
News letter april 13
 
News letter march 13
News letter march 13News letter march 13
News letter march 13
 
News letter feb 13
News letter feb 13News letter feb 13
News letter feb 13
 
Saw security awareness part v
Saw   security awareness part vSaw   security awareness part v
Saw security awareness part v
 
Security Awareness Part II - women security tips
Security Awareness Part II - women security tipsSecurity Awareness Part II - women security tips
Security Awareness Part II - women security tips
 

Último

Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 

Último (20)

Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 

News letter jan 13

  • 1. Market com physical a autonomo owards ac most impo At first ma data and other syst for busine complianc outside th versions o Now most o data and rends inc mproveme However t systems a more of process ca Mpat m Adof c ov Ntti Hsi s p With Let’ mpetition as well as us and bu ccess to p ortant feat any vendo soon the tems and ess data n ce’ to allo e plant en of protoco industrie d personn cluding da ents and this increa nd is putt f a nuisan an mean a the fo ewslett ession nd hop A Mak Ne ’s profe in indust network uilt upon p personal, ture was a ors built t automati protocols networks. ow for c nvironmen ls that wo s with con nel and to ata access advanced asing nee ting many nce than a serious s ter: Ja nalize t www.wix.com/ nuary the pro /sbtyagi/iciss aditionally ual! Over a ry vendor cessing s data. protocols cape beca to this w 2000, vend cation bet ver, in the the purpos ems are fa hem. There ble busine exercises ess is furt control en but for m eat. pe and Happ py and ke Se From http://w try has tra and virtu proprietar data, pro access to d their own on landsc s. Parallel In early 2 communic nt. Howev orked for t ntrol syste secure th s to enab d control d for acce process c anything, safety thre 2013 ofessio s y driven th decade technolog speed, and onals… he evolutio ago, mos gy and the d function s or langu ame very was the de dors saw tween se rush to m se at hand acing man e are man ess decisi s like loop ther diluti nvironmen most indus firm re … on of con st control e solution nality (or r uages to a proprieta evelopmen advantag curity sy market ma d but did n ny pressur ny forces p ions, vend p tuning a ng the se nts at risk. stries a lo esolve Prosp curity m Janu perous y a thi uary t ntrol syste systems ns were ge reliability) allow for ary and in nt of Ethe ges to incl ystems in ny vendo not includ res to bot pushing th dor acces and alarm ecurity of . In some oss of con that th the transf ndepende ernet netw lude ‘Ethe cluding t rs built ad e security h allow ac hese oppo ss for pro m managem many of t industries ntrol over pt S B T he com New Y ing to ill Dec Year! o reme cemb Cap ming ye embe ber! For IC r, ems – were eared ). The fer of ent of works ernet-those d-hoc y. ccess osing ocess ment. these s this your Tyagi CISS ear
  • 2. of data an systems a data netw for comm However, the purpo Now mos data and including and adva increasing putting ma than anyt safety thre As one n industry is dies”. Reg control sy overtime, confidenc The new Security. A that most downtime experts w means m staff to ma nd soon th and protoc works. In ea munication in the rus se at hand st industrie personnel data acce anced con g need for any proces hing, but f eat. noted secu s one such gardless of ystem will environm ce and pote push for c And the p t industries e. This mea who may n any indus anage & o The scope concern t he automat cols. Parall arly 2000, between s h to marke d but did no es with con and to se ess to enab ntrol exerc r access i ss control e for most in urity profe h that a los f the poten at least l mental rele entially the control sys ressure is s are ‘pus ans more o ot be phys tries are a ptimize mo e of the te this may r rm ‘securit represent Market evolutio virtual! autono the sol process importa built th t competit on of contr Over a omous and lutions we sing spee ant feature eir own pr cape beca was the de aw advant ystems inc endors bui security. ms are fac . There are ss decisio loop tuni diluting the ents at risk loss of co tion landsc el to this w vendors sa security sy et many ve ot include s ntrol system cure them ble busine cises like s further d environme ndustries a ssional wh ss of acces ntial harm, lose produ ase, and ability to s stems is to coming fro shing the e outside ‘tun sically at th automating ore resourc ion in ind rol system decade a built upon re geared d, and fun e was acc rotocols or me very p evelopmen ages to inc cluding tho lt ad-hoc v dustry has s – physic ago, mos n proprieta towards a nctionality ess to dat r language roprietary nt of Ethern clude ‘Ethe ose outsid versions of cing many e many for ns, vendo ing and a e security . In some i ontrol ove ho works ss or cont any indus uction for other inta stay in bus o try to ba om many envelope’ ning’ and b he site. Th g more con ces thereb ty’ often se can be ov y pressures rces pushi r access fo alarm man of many industries t r your proc for a maj rol over ou try with litt some time angibles su siness. alance the angles. Inc to run fas better visib he advanc ntrol of the y increasin eems vagu verwhelmin jor refinery ur systems tle or no se e. This ca uch as co e two oppo creasing m ster, more ility into pr ing age of eir assets ng their rel sheer volu ver, this n ue and the ng. Howev s tradition cal as well st control ary vendor access to (or reliab ta. At first es to allow and indep net networ ernet-comp de the plan f protocols ally driven as networ systems technology personal, ility). The t many ve for the tra pendent of rks for bus pliance’ to nt environ that worke s to both a ing these o for process nagement. of these s this is mor cess can m n the k and were y and data, most ndors ansfer other siness allow ment. ed for allow acce opposing t s improvem . However systems a re of a nuis mean a se y once po s usually m ecurity in a an translat ompetitive ess to rends ments r this and is sance erious ointed out, means som and around te into re-edge, osing trend market com e efficiently roduction f f the workf and expe iance on c ume of effo need not b , “our meone d their -work, vestor inv ds: Access mpetition m y and with from specia force in ge ecting the computers. s and means h less alized eneral same ort and are be the cas eas of se. In
  • 3. looking at quickly be efforts an initiatives but in the Processes essence w Before be philosoph which it is have. Underpinn always wo be lost. introspect t a numbe eing adopte d initiative offer diffe e end, all s and Tec which will i eginning an y. A secur s created er of secu ed as a ho es that go f rent sectio efforts can chnology. n turn fost ny security rity philoso but there ning all ef ork toward What we tions’! Suc What are the ow well are What issues What require Where do w ow will we •W •Ho •W •W •W •Ho There is n far as sec and indus industry, b which sets setting th undertake Knowing w key first s security s gadgets, done with technolog maintaina years with means th problem! rity framew olistic and far beyond ons, headin n usually The prior er a secur y program ophy will so are some fforts withi ds creating e call sec h exercise e policies a e they imp s / problem ements ap e need to change / i no "standa curity syste stry itself ha broadcasti s standard he training en by ASIS which stan step in man standards security pr h it includin gy – which able / repa h on-site hat either ! The first p decision m works or s effective a d the purch ngs and n be summe rity of dev ity culture. or initiative ound differ basic req in organiza and main curity surv s are requ and standa lemented? s do we ha ply to our i be from a s mprove the ard" standa ems and ga as failed to ng and me ds for secu g and edu S in USA. ndard to ch naging com establishe rofessiona ng its limita h is chang airable in a repair con you do n premise is makers, th standards approach to hase and d ames for e ed into thr veloping a a commo o security. deploymen each of the ree (3) fou security e your org rent for ea uirements ations one ntaining a s veys and uired to foc ards we cu ? ave? industry? security pe e situation ard. It is no adgets are o develop i edia indust rity guards ucation sta n theme e . This appr nt of techn eir areas o undational philosophy anization m ch compa that all se e must firs strong sec security us on follo rrently hav emerges th roach com nology. Diff of concent areas: Pe y is need must first a ny, industr ecurity phi st have a urity cultur audits ar wing areas ve? erspective? ? ot a cliché. e concerne its own sel try or the IT s, supervis andards fo hoose and mpliance. S ed by laws ls need to ations. The ing very fa very sho ndition. Th not unders quite sim he owners ? In fact the ed. There a f-regulator T Educatio ors, pub b or security d what you Some indu s or regula o first unde e shelf life ast. Today ort time. A inking tha stand the ply that se and opera hat is mbines ferent ration eople, ed in adopt a se ry and reg ilosophies security re or your re basica s - ere are no are no gov ry mechan n Industry ouncers, fr y personne ur obligatio ustries and ations. Wh erstand the of a syste y what is c system m at techno technolog ecurity is i ators of the ecurity ion in must philosophy momentum ally ‘outso o set stand verning / re ism as dev . In UK BI ront man e el. Similar ns are as d organizat hile buying e technolo m or gadg current an must have logy can gy or you mportant t e systems y and m will urced ards in Ind egulatory b veloped by SA is watc etc. BISA is r initiatives a result o tions are re g the secu ogy and als get is direc d ‘the thin longevity o solve all u do not u to the orga s, the supp dia so bodies y films chdog s also s are f that choi equired to urity system so what ca ctly related ng’, may n of at least l the prob understan anization. T port staff, t ce, is meet ms or an be to its not be t 6-10 blems d the This mean the consul ns the tants,
  • 4. vendors, everyone’ More ofte awarenes contractor needs to team mem your site, remains th security b effective site staff, ’s best inte en than no ss and trie r and visito happen fo mbers who you will n hat your in breach inte as your le More ofte have a de on-going due to the changing! but the ne drives’ we storage ca using them only as e in short erest. This ot, an indu ed to educ or onsite n r security, o understa not succee nternal, trus entionally o east inform en than no efined star security ef e fact that ! What was ext threat c ere an eme apacities a m. This wa effective as This topic mentioned install sec disaster re of those e need to e implemen lives are m find ways school co because t die based everyone is no differ ustrial facil cate every needs to ha and can b and their ro d in secur sted emplo or otherwis med emplo ot, many o rt, finish an fforts, but security c s a threat y coming wi erging fad. and require as not a co s it is curr c is the b d earlier, y curity progr ecovery pl efforts caus explain to nted withou most affect around th mputer lab they do no d on how The last a balance. return. In decide as to your c money, or that you w , understa rent from t lity has a yone as to ave safety be integrate ole and th ring your fa oyees have se. In othe loyee. rganization nd cost. Th true, lastin oncerns ar yesterday o ll not be a Today the e little or no oncern a fe rent. basic prem your weake rams, risk lan you are se a chang them why ut the prop ted? In the he new sys b where stu ot understa well your and perhap In this sen order for s an organi current env r access to will still hav ands that he importa long histo o why saf orientatio ed into saf he importa acility. It is e the great er words, y ns see se his may be ng security re brought or last wee as deterred ey are sold o knowled ew years a mise on w est link and managem e well on y ge in the da y these ch per awaren ese cases i stems you udents are and or care employee ps most im nse the ba your organ ization wha vironment o your data ve some so keeping y ance place ory of alwa fety is imp n and upd fety progra nce of the s a harsh r test opport your secu curity prog e the case y is an on-t about by ek may be d. Less tha d more che ge of spec ago. Unfor which your d biggest t ment proces your way t ay-to-day b hanges are ness traini it is only a u just put in e some of t e about se es receive mportant th alance is b nization to at level of towards s a. And no m ort of incide your facilit ed on safety ays trying portant. Ev ated each ams. Witho eir actions reality but tunity to ca urity progr grams or i e for a part -going initia technolog fixed by yo an 5 years eaply than cialized ap tunately y r security threat is yo sses and a o securing business fl e necessa ng and ed short time n place thu the most c ecurity. Yo e and embr ing a prop between ris o move tow risk you a security is matter how ent at som ty secure y. to raise s very empl year. This out rank an (or inactio the simple ause or cre ram is on nitiatives a ticular com ative. This y - and tec our curren ago USB ever, are c pplications your secur philosoph our least e healthy b g your envi ow for you ary. Too m ducation fo before the us negatin reative peo our securi race it. per security sk and rew ward a pro re willing t going to w you do p e point in t as projects mponent of s is quite s chnology k t security p keys or ‘t capable of or program rity progra hy needs educated e business co ironment. ur employe many times or the peop e day-to-da ng your eff ople at byp ity program y philosoph ward as w per securi o live with cost some roceed, the time. to be buil employee. ontinuity pl However, ees then yo s are prog ple whose ay users st forts. Think passing se m will live hy needs i well as betw ty program . Every ch ething whe ere is a ve s the attitu ween effor m you mus ange you ether it is ery good ch is in safety oyee, s also nd file on) at e fact eate a nly as s that f your simply keeps plans, humb huge ms for am is lt. As If you lan or if any ou will grams daily tart to k of a ecurity e and ude of rt and st first make time, hance
  • 5. A security inappropr in how we benefit fro y incident riate acces ell containe om it. The day prepared Every bus win out o organizati can be c ss to data o ed the inc will come to deal wit siness has over secu ion to: derstand t ocument the ake and do riodically r d whether well-defin that fall ou  Un  Do  Ma  Pe and Having a situations Hand you them – to Business their syst authentica common p such as c approved Remembe of the org procedura same proc come to standard. If your org the proce complianc Auditors h Washingto well to ins catastroph or an IO ro ident is, ho e when a th this situa s different rity best p ic system oom. The t ow quickly business ation will sa needs and practices. the risks be ese risks a ocument an review acc the risk is ned proces utside of th ur business prop up th unit folks w tems and ation to pr platform” is criteria for d security so er, policies ganization. al docume cedural an the same failure, a true meas y you recov need con ave time, m d tolerance You need eing taken and their m n informed cepted risk still accept ss to hand hose antici s manage he short leg want secu premises rotect critic s not helpf deciding w olutions sp s are not in . Specific nts. The k nd policy d conclusio ganization ess of deve ce, and the have the s on or your sure that yo accident in ure of you ver, and if nflicts with money and e for risk. A d to have mitigating fa decision a ks to dete table dle excepti pated whe rs a copy g on the ta rity folks to s secure. cal inform ul. You ne whether info pecifically t nstruction m information ey here is ocuments ons as to has an In eloping me eir experie structured state capi our measu n process ur security f you choo h a securi d aggravati At some po e a proces actors as to wheth rmine whe area or s program w ose to learn ity best p ion. oint, busin ss in plac her to acce ether new ons will a en the polic of typical able in the o provide t Telling a ation" or t ed to prov ormation / tied to polic manuals. P n as to ho s clarity an in front of the secu ternal Aud easurable nce in othe approach tal dictate urements w subtle will be n and practices. B Being ess needs ce to allow ept a risk mitigation s may w the ns are ava organizati written. llow your cies were w standards break room hem with s business to tell them ide your us facility is c cies. Policies are ow to impl d consiste everyone rity measu dit departm actions. A er types of h needed t your exter will hold up s and they m. specific ins unit man m to “use sers with o critical or n ailable on to dea y'll probabl y end up structions o nager to ACS alon organizatio not, and lis e high-leve lement po ency. You in your org ures that ment, these After all, th f audits an to put this rnal standa in court. l with using on how to "use two-f ng with ID on-specific ts of tested el stateme licy should should be ganization are neede e are good hey will be nd standard s practice ards, get yo make factor DS on tools, d and nts of the d be laid o able to pu and have ed to mee people to e doing th ds is a val to work. I our legal fo intent out in ut the them et the o get involv e measuri uable reso f our frien olks involv ved in ing of ource. nds in ed as
  • 6. Industry s legislators managem procedure standards f s and indu ment and se es. Education profession environme journalism officers to This prob meet the that most employers institution review the that allow down train for security ustry group ecurity pro n remains nals with ent and pre m graduate o plan and blem arises ever-chan t security s and gro s of the ne e effective w business ning standa Security is productive are issues budget is misconce atmosphe conducted there are inside the higher pr y are not a ps can tell ofessionals an area army or emises. O e to write w execute go s from a n nging techn profession oups like I eed for can security p to be cond ards for se s treated in e systems s such as allocated t ption. It i ere where d smoothly chances o e premises rofit! At giant c Protecting with expe and live b center wit There are designing that secur ineffectua cure all – us a lot a s in our org of conce police se ne comme with appro ood securi number of nology lan nals rank CISS / IS ndidates w lans as pe ducted with ecurity pers n most bus and plans insurance to security is good s all produ y without f of attack by s or at wor companies g them is a ertise in ph backups in th a pocket e plenty of a secure rity for the al afterthou and this about best ganizations ern for sec ervices ar ent seemed opriate gra ty measure challenge dscape. S low on th SSM / IPS who are we er changing h assuranc sonnle but siness and . Security , legal com departmen security th uction, ope fear or dan y miscrean rk-floor are , data cen job for se hysical sec n the world t knife, a c f complicat data cente new data ught? is a good practices s to come u curity prof re inadequ d to resona ammar, wh es?” es, particul Security is heir hierarc SA / CAPS ell trained i g needs of ce. PSAR A fall short o d organizat is also see mpliances, nt. Mostly s hat guara eration an nger. No o nts, theft o eas. Good nters don't ecurity offic curity and d are a wa amera pho ted docum er-But wha center is thing on th and goals up with the fessionals. uately pre ate with ma y can’t we he whole. W s, it is up t e processe . The per epared to any: “If it’s e expect e arly the ne also an “e chy of inte SI / SAFE n how to p f varied org Act 2005 a of desired tions as ‘co en as burd pressure security pro ntees sec nd mainte one can w of costly inv d security just hold cers, of co business aste of mo one and ba ments that at should b built into t While to the s and rception is create s s fair to exp ex-army / p eed to adj eat your ve erests. Th E Code to plan, exec ganizations attampts ve details. ost center’ en which i from stake ofessionals cured, has nance or ork; forget ventory or y means g the crown ourse. But j continuity oney if som ad intention can guide be the CSO the design s that ecure pect a police just curricu egetables” e onus fa inform tra ute and re s and indu ery feebly needing b is evil yet e eholders e s are to be ssle-free c marketing t the best law-and – good prod jewels; th just as imp . That's be meone can ns. companie O's high-le s, instead ula to topic alls to aining evise / stries to lay budgets for essential. T etc. that me e blamed fo congenial g activities performan order prob duction, m hey are the portant, it's ecause all n walk righ r non- There eager or this work s are nce, if blems means e crown je s a job for the encry ht into the es through evel goals f of being a ewels. those yption e data the proce for making an expensi ess of g sure ive or
  • 7. Read below to find out how a data center is designed to withstand everything from corporate espionage to terrorists to natural disasters. Sure, the extra precautions can be expensive. But they're simply part of the cost of building a secure facility that also can keep humming through disasters. Build on the right spot. Be sure the building is some distance from headquarters (20 miles is typical) and at least 100 feet from the main road. Bad neighbors: airports, chemical facilities, power plants. Bad news: earthquake fault lines and areas prone to hurricanes and floods. And scrap the "data center" sign. Have redundant utilities. Data centers need two sources for utilities, such as electricity, water, voice and data. Trace electricity sources back to two separate substations and water back to two different main lines. Lines should be underground and should come into different areas of the building, with water separate from other utilities. Use the data center's anticipated power usage as leverage for getting the electric company to accommodate the building's special needs. Pay attention to walls. Foot-thick concrete is a cheap and effective barrier against the elements and explosive devices. Avoid windows. Think warehouse, not office building! If you must have windows, limit them to the break room or administrative area, and use bomb-resistant laminated glass. Use landscaping for protection. Trees, boulders and gulley can hide the building from passing cars, obscure security devices (like fences), and also help keep vehicles from getting too close. Use retractable crash barriers at vehicle entry points. Control access to the parking lot and loading dock with a staffed guard station. Use a raised gate and a green light as visual cues that the bollards are down and the driver can go forward. In situations when extra security is needed, have the barriers lift-up by default, and lowered only when someone has permission to pass through. Plan for bomb detection. For data centers that are especially sensitive or likely targets, have guards use mirrors to check underneath vehicles for explosives, or provide portable bomb-sniffing devices. You can respond to a raised threat by increasing the number of vehicles you check—perhaps by checking employee vehicles as well as visitors and delivery trucks. Limit entry points. Control access to the building by establishing one main entrance, plus a back one for the loading dock. This keeps costs down too. Make fire doors exit only. For exits required by fire codes, install doors that don't have handles on the outside. When any of these doors is opened, a loud alarm should sound and trigger a response from the security command center. Use plenty of cameras. Surveillance cameras should be installed around the perimeter of the building, at all entrances and exits, and at every access point throughout the building. A combination of motion-detection devices, low-light cameras, pan-tilt-zoom cameras and standard fixed cameras is ideal. Footage should be digitally recorded and stored offsite. Protect the building's machinery. Keep the mechanical area of the building, which houses environmental systems and uninterruptible power supplies, strictly off limits. If generators are outside, use concrete walls to secure the area. For both areas, make sure all contractors and repair crews are accompanied by an employee at all times.
  • 8. Plan for s can be se people an spreading chemical, Ensure n sure inter housed. A Use two-sensitive less invas expensive Harden th will have b secure air et to re circ nd equipme g from a n biological nothing ca rnal walls r Also make -factor au areas of d sive than e access ca he core w been authe the outer visitors to the inner neral empl the entra nter. Typic ictest "p ggybacking ve two opt the door t om. This is ainframes cated. Prov possible in he exits to areas of t h building area where rest room t have acce  At for  At gen  At cen stri pig hav  At roo ma loc as Watch th sensitive helps with common a Visitor’s who don't r-handling culate air r ent if there nearby fire or radiolog an hide in run from th sure drop-uthenticati g. Make su rather than e were som . For adde gical conta the walls he slab ce -down ceili on. Biome rs, with ha anning. In data center retinal sca ards. ith securit enticated a door. Don buzz the f r door. Se loyee area ance to th cally, this positive g allowed. ions: to an indiv s for the r or other vide access n order to c oo. Monito he facility evacuation e people c ms. Make s ess to the s ure the hea n drawing i me kind of ed security aminant. and ceilin iling all the ings don't p etric ident and geome other are ty layers. at least thre n't forget y front desk. eparates v . e "data" is the lay control," For impl vidual com oom wher critical I s only on a control and or entrance as well. It n if there's an eat with sure to incl secure par As att yo Str ating, vent n air from biological y, put dev tilating and the outsid or chemic ices in pla ngs. In sec e way to s provide hid ification is etry or finge as, you m Anyone en ee times, i you'll need visitor are part of th yer that h d air-condi de. This co cal attack o ace to mo cure areas sub flooring dden acces becoming erprint sca may be abl ntering the ncluding: a way a from he data has the g no on, you cessing servers, ment is ded basis, cess. t—not only u keep tra rohibit food g food on c ooms for u building. meaning lementatio mputer proc re actual s T equipm an as-need d track acc e and exit 'll help you s a fire. Pr hout gettin lude bathro rts of the b s soon tack an our in rategist n as t nd des nterests the fe stroy it s! - tioning sys uld help p or heavy s nitor the a s of the da g where w ss points. g standard anners usu le to get a most secu stems rotect moke air for ta center, wiring is typ make pically d for acce ually consid away with ure part of and segm ess to dered less-center f the data c ment these y for the m ck of who d in the co computer e use by visit rooms as main facilit was wher omputer ro equipment tors and de ear ap . Secu Chana much more t also vide a ty but for re when. It ooms. Prov t. elivery peo proach re you kya, t ople hes ne u must, the G ear, , all reat
  • 9. easy way requireme consumer services f (ITU), mo on their h subscribe Messages offensive, Problem It is rare f of a text standard mobiles th users are communic revenue f operators providers the spam [Source: B Another c 400 in ex messages 70,000 pe Mobile Ne businesse viruses sp the phone Corporate fail to che suspicious security s y of stayi ent for kee rs put the fall short ore than 80 handset at er into cal s are com but all hav ms for a mobile message to have sp hat feature e complete cations. Th from the sp around t with their m is to swi Bloomberg concern for xistence to s to 6% ov er day onl etwork Vir es as they pread in a es of peopl e phones a eck their p s increase software in Those int can India problems Rapidly e billion mo Mobile Su as India, communic access to uch. Whils networks reliability ations. Acc bile phone nt. The hid emium rat ot commer ng in comm ing in tou eping their eir trust in of expecta 0% of mob some poin ling a pre mmonly no ve one thin e user not (SMS), p pam filters e Internet a ly depend he conflict pam, whic he world users' mob tch to ope g.net, Augu r mobile op oday. One ver the las ly 1 year rus Attack y move ea similar wa le who acc are particul phone bill, es in call ch nstalled [So trusive and an mobile d unwelco operators expanding obile subs ubscriber]. , where m cation, as o landline st this is clear of s and acce cording to users wor dden motiv te number rcially foc mon: they a to have re picture me on emails and email a ent on the t here is t ch impacts actively e bile phone erator. In ust 1st, 200 perators is e mobile o st 12 mont ago [Sour s (online). asily betwe ay to PC vi cept the SM larly vulne , sending harges. To ource: 200 me mobile do? Chec mobile pho scribers w This is la mobile ph s many pe telephony, very pos pam and v essibility, a o the Inter ldwide hav ve behind r to buy a used, and are intrusiv eceived an essage (M s when usi access are eir mobile that in mo on their d ncourage e numbers India som 08 (online) s the sharp operator h ths, averag rce: Adapt . Mobile v een hands ruses, goin MS or MMS rable to th the charg o add to th 08 online w viruses a ck out the one indust worldwide rgely cont hones are eople are and mob itive for o viruses is and are o rnational T ve received such mes unsolicite MS), or v ng a home e extremely network o ost cases, desire to p spam by and the on e operato ], even afte p rise in mo as noted ging 100,0 tiveMobile] viruses are ets and in ng straight S. e threat po es straigh is worry, 8 well-being and spam-e solutions try has alre [Source: tributed by e the prev unable t biles provid operators' absolutely often left f Telecommu d an unso ssages is o or enter e cases ca welcome. product d in some ve and unw d mobile s video mes e compute y vulnerabl perator to the opera rotect the supplying nly way for rs face sp er protocol obile phon a rise in 000 virus i . It sees S e also fast nfect share t to the add -What s and eady over ABI Rese y countries valent for o gain re de a cheap revenues y paramoun frustrated unication U licited mes often to lur a compe an be dee spam mess ssage (VM er, persona le to mobil manage t rator is ga subscribe g content r a subscri pam levels l-level filte ne viruses, attacks fro ncidents p Sharp Ris t becoming ed address dress book osed by vir t to accou 86% of mo survey, F-e three earch: such rm of eliable p and s, the nt, as when Union ssage re the etition. emed sage in the MS). Whilst al and corp e spam. In these unwa aining exte r. Some m and applic iber to get s of about ring. with a rep om 0.6% per day-up e in Volum g a mena s books. T k and infilt ruses as m untants, an obile phone -Secure C e form t it is porate n fact, anted ensive mobile cation rid of 30% ported of all p from me of ace to These rating most emplo nd won't n e users hav orporation oyees notice ve no ]. We
  • 10. know from our own data that subscribers whose phone do get infected can lose up to 100 Euros a day from MMS being sent from their phone by the virus. Solutions To prevent mobile spam and viruses becoming a problem for their subscribers, Indian network operators must ensure they don't solicit spam. Operators also need to take a leading role in the development of built-in network security to protect mobile phones, and prioritize customer satisfaction above potential ready-money revenue generated as a result of spam and viruses. To ensure protection from mobile spam and viruses, operators must also secure their network. This way, not only known viruses, but also anomalies within the network can be detected, isolated, and disinfected, enabling network immunization. Having security on the network also means that employee-specific policies can be set. For example, an employee may not be allowed to download content which can be considered out of line from their business pursuits, while others may be prohibited from accessing the mobile Internet altogether-a similar approach to the one some organizations are already using for their PC infrastructure. The constant evolution of spammers' techniques, combined with the continually growing mobile telephony industry, means that the battle for consumer trust is only just beginning-and mobile operators have to make sure they are competing effectively. A new walk-through airport lie-detector made in Israel may prove to be the toughest challenge yet for potential hijackers or drugs smugglers. Tested in Russia, the two-stage GK-1 voice analyzer requires that passengers don headphones at a console and answer: ”Yes" or "No" into a microphone to questions about whether they are planning something illicit. The software will almost always pick up uncontrollable tremors in the voice that give away liars or those with something to hide, say its designers at Israeli firm Nemesysco. "In our trial, 500 passengers went through the test, and then each was subjected to full traditional searches," said chief executive officer Amir Liberman. "The one person found to be planning something illegal was the one who failed our test." The GK-1 is expected to cost between $10,000 to - $30,000 when marketed. A spokesman for Moscow's Domodyedevo Airport, which is using a prototype, said "the tester (lie detector) has proved to be effective and we are in principle ready to use it". The September 11, 2001 hijacking attacks have led to a slew of innovations designed to boost airline security. Lieberman said several countries had expressed interest in the GK-l. "Unlike conventional lie detectors .such as the polygraph, this is minimally invasive, requiring hardly any physical contact," Lieberman said, adding that the first stage of the test takes between 30-75 seconds. Those that fail are taken aside for more intensive questioning and, if necessary, are searched. Lieberman said around 12 percent of passengers tend to show stress even when they have nothing to hide. "Some may feel nervous because they have used drugs, while having no intention to smuggle drugs," he said. "The whole thing is performed in a low-key manner to avoid causing anxiety." Reuters
  • 11. For more e detail ple Managing Lipata, Mi T: 0063-2 E-mail: po Web: www g Director, inglanilla, C 260-05-57 olly.secreta w.pcstcons Ever had haven't h days like had a com ggestions Sug ease conta act – PCS Train Cebu, Phil ning Consu ippines, 60 0063-9064 consultant. m M: aria@pcstc sultant.com these??? puter long & feedbac ultant 046 4116749 .com, ? If not, yo g enough. ck may be ou . e sent to us on e-mail: sbtyagi1958@gmail.com