news letter jan 13

11
M p a t m A d o f c o v N t t i H s is p Market com physical a autonomo owards ac most impo At first ma data and other syst or busine complianc outside th versions o Now most o data and rends inc mproveme However t systems a s more of process ca With Letmpetition as well as us and bu ccess to p ortant feat any vendo soon the tems and ess data n ce’ to allo e plant en of protoco industrie d personn cluding da ents and this increa nd is putt f a nuisan an mean a Mak the fo A Ne s profe in indust network uilt upon p personal, ture was a ors built t automati protocols networks. ow for c nvironmen ls that wo s with con nel and to ata access advanced asing nee ting many nce than a a serious s ke Se From nd hop A Happ ewslett ession http://w try has tra and virtu proprietar data, pro access to d their own on landsc s. Parallel In early 2 communic nt. Howev orked for t ntrol syste secure th s to enab d control d for acce process c anything, safety thre curity m Janu pe and py and ter: Ja nalize t www.wix.com/ aditionally ual! Over a ry vendor cessing s data. protocols cape beca to this w 2000, vend cation bet ver, in the the purpos ems are fa hem. There ble busine exercises ess is furt control en but for m eat. y a thi uary t firm re Prosp nuary the pro /sbtyagi/iciss y driven th a decade technolog speed, and s or langu ame very was the de dors saw tween se rush to m se at hand acing man e are man ess decisi s like loop ther diluti nvironmen most indus ing to ill Dec esolve perous 2013 ofessio s he evolutio ago, mos gy and the d function uages to a proprieta evelopmen advantag curity sy market ma d but did n ny pressur ny forces p ions, vend p tuning a ng the se nts at risk. stries a lo o reme cemb that th New Y onalson of con st control e solution nality (or r allow for ary and in nt of Ethe ges to incl ystems in ny vendo not includ res to bot pushing th dor acces and alarm ecurity of . In some oss of con Cap embe ber! he com Year! ntrol syste systems ns were ge reliability) the transf ndepende ernet netw lude ‘Ethe cluding t rs built ad e security h allow ac hese oppo ss for pro m managem many of t industries ntrol over pt S B T For IC r, ming ye ems – were eared ). The fer of ent of works ernet- those d-hoc y. ccess osing ocess ment. these s this your Tyagi CISS ear

Upload: capt-sb-tyagi-coacccfismcsc

Post on 12-Nov-2014

355 views

Category:

Business


4 download

DESCRIPTION

Monthly newsletter of International Council of Security and Safety Management . The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)

TRANSCRIPT

Page 1: News letter jan 13

Mpatm Adofcov NttiHsisp

Market comphysical aautonomoowards ac

most impo

At first madata and other systfor businecompliancoutside thversions o

Now most o data andrends incmproveme

However tsystems as more of

process ca

With

Let’

mpetition

as well asus and buccess to p

ortant feat

any vendosoon the tems and ess data nce’ to alloe plant en

of protoco

industried personn

cluding daents and this increand is puttf a nuisanan mean a

Mak

the fo

A

Ne

’s profe

in indust network

uilt upon ppersonal, ture was a

ors built tautomatiprotocols

networks. ow for cnvironmenls that wo

s with connel and to ata accessadvanced

asing neeting many nce than aa serious s

ke SeFrom

nd hop

A Happ

ewslett

essionhttp://w

try has traand virtu

proprietardata, pro

access to d

their own on landsc

s. Parallel In early 2

communicnt. Howevorked for t

ntrol systesecure th

s to enabd control d for acceprocess c

anything, safety thre

curitym Janu

pe and

py and

ter: Ja

nalize twww.wix.com/

aditionallyual! Over ary vendor cessing sdata.

protocolscape beca to this w

2000, vendcation betver, in the the purpos

ems are fahem. Thereble busineexercisesess is furtcontrol enbut for meat.

y a thiuary t

firm re

Prosp

nuary

the pro/sbtyagi/iciss

y driven tha decade technolog

speed, and

s or languame very

was the dedors saw tween serush to m

se at hand

acing mane are maness decisis like loopther dilutinvironmen

most indus

ing toill Dec

esolve

perous

2013

ofessios

he evolutioago, mos

gy and thed function

uages to aproprieta

evelopmenadvantagcurity sy

market mad but did n

ny pressurny forces pions, vendp tuning ang the se

nts at risk.stries a lo

o remecemb

that th

New Y

onals…

on of const control e solutionnality (or r

allow for ary and innt of Ethe

ges to inclystems inny vendo

not includ

res to botpushing thdor accesand alarmecurity of . In some

oss of con

Cap

embeber!

he com

Year!

ntrol systesystems

ns were gereliability)

the transfndependeernet netwlude ‘Ethecluding trs built ade security

h allow achese opposs for pro

m managemmany of tindustries

ntrol over

pt S B TFor IC

r,

ming ye

ems – were

eared ). The

fer of ent of works ernet-those d-hoc y.

ccess osing ocess ment. these s this your

Tyagi CISS

ear

Page 2: News letter jan 13

of data ansystems adata netwfor commHowever, the purpo Now mosdata and including and advaincreasingputting mathan anytsafety thre As one nindustry isdies”. Regcontrol syovertime, confidenc The new Security. Athat mostdowntimeexperts wmeans mstaff to ma

The scopeconcern t

nd soon thand protoc

works. In eamunication

in the russe at hand

st industriepersonnel data acce

anced cong need forany proceshing, but feat.

noted secus one suchgardless ofystem will

environmce and pote

push for cAnd the pt industries

e. This meawho may n

any indusanage & o

e of the tethis may r

he automatcols. Parallarly 2000, between sh to marke

d but did no

es with conand to se

ess to enabntrol exercr access iss control efor most in

urity profeh that a losf the potenat least l

mental releentially the

control sysressure is s are ‘pusans more oot be phystries are aptimize mo

rm ‘securitrepresent

Marketevolutiovirtual! autonothe solprocessimportabuilt th

tion landscel to this wvendors sasecurity syet many veot include s

ntrol systemcure themble businecises like s further denvironmendustries a

ssional whss of accesntial harm, lose produase, and ability to s

stems is tocoming fro

shing the eoutside ‘tunsically at thautomatingore resourc

ty’ often secan be ov

t competiton of contr

Over a omous andlutions wesing speeant featureeir own prcape becawas the deaw advantystems incendors buisecurity.

ms are fac. There aress decisioloop tuni

diluting theents at riska loss of co

ho works ss or contany indus

uction forother inta

stay in bus

o try to baom many envelope’ ning’ and bhe site. Thg more conces thereb

eems vaguverwhelmin

ion in indrol systemdecade a

built uponre geared d, and fun

e was accrotocols orme very pevelopmenages to inccluding tholt ad-hoc v

cing manye many forns, vendoing and ae security . In some iontrol ove

for a majrol over outry with littsome time

angibles susiness.

alance theangles. Incto run fas

better visibhe advancntrol of they increasin

ue and the ng. Howev

dustry hass – physicago, mos

n proprietatowards a

nctionality ess to dat

r languageroprietary

nt of Ethernclude ‘Etheose outsidversions of

y pressuresrces pushir access foalarm man

of many industries tr your proc

jor refineryur systemstle or no see. This cauch as co

e two oppocreasing mster, moreility into pring age ofeir assets ng their rel

sheer voluver, this n

s traditioncal as well st control ary vendor access to (or reliab

ta. At firstes to allow

and indepnet networernet-comp

de the planf protocols

s to both aing these ofor processnagement.of these sthis is morcess can m

y once pos usually mecurity in aan translatompetitive

osing trendmarket come efficientlyroduction ff the workfand expe

iance on c

ume of effoneed not b

ally drivenas networsystems technologypersonal, ility). The t many vefor the tra

pendent of rks for buspliance’ to nt environthat worke

allow acceopposing ts improvem. Howeversystems are of a nuismean a se

ointed out,means somand aroundte into re-edge, inv

ds: Accessmpetition my and withfrom speciaforce in ge

ecting the computers.

ort and arebe the cas

n the k and were

y and data, most

ndors ansfer other

siness allow ment. ed for

ess to rends ments r this

and is sance erious

, “our meone d their -work, vestor

s and means h less alized eneral same

eas of se. In

Page 3: News letter jan 13

looking atquickly beefforts aninitiatives but in theProcessesessence w Before bephilosophwhich it ishave. Underpinnalways wobe lost. introspect

•W•Ho•W•W•W•Ho

There is nfar as secand indusindustry, bwhich setssetting thundertake

Knowing wkey first ssecurity sgadgets, done withtechnologmaintainayears withmeans thproblem!

The first pdecision m

t a numbeeing adopted initiativeoffer diffe

e end, all s and Tecwhich will i

eginning any. A securs created

ning all efork towardWhat we

tions’! Suc

What are theow well are

What issuesWhat requireWhere do w

ow will we

no "standacurity systestry itself habroadcastis standard

he trainingen by ASIS

which stanstep in manstandards security pr

h it includingy – whichable / repah on-site hat either !

premise ismakers, th

er of secued as a ho

es that go frent sectioefforts canchnology. n turn fost

ny securityrity philosobut there

fforts withids creatinge call sech exercise

e policies ae they imps / problemements ape need to change / i

ard" standaems and gaas failed tong and me

ds for secug and eduS in USA.

ndard to chnaging comestablisherofessiona

ng its limitah is changairable in arepair conyou do n

quite simhe owners

rity framewolistic and far beyondons, headinn usually The prior

er a secur

y program ophy will soare some

in organiza and maincurity survs are requ

and standalemented?s do we haply to our ibe from a smprove the

ard. It is noadgets areo develop iedia industrity guards

ucation sta

hoose andmpliance. Sed by lawsls need to

ations. Theing very fa

a very shondition. Thnot unders

ply that seand opera

works or seffective a

d the purchngs and nbe summerity of devity culture.

or initiativeound differbasic req

ations onentaining a sveys and

uired to foc

ards we cu? ave? industry?security pee situation

ot a cliché.e concerneits own seltry or the ITs, supervisandards fo

d what youSome indus or regulao first undee shelf life ast. Today

ort time. A inking thastand the

ecurity is iators of the

standards approach tohase and dames for eed into thrveloping a

e your orgrent for eauirements

e must firsstrong sec

security us on follo

rrently hav

erspective??

In fact theed. There af-regulator

T Educatioors, pub bor security

ur obligatioustries andations. Wherstand theof a syste

y what is csystem m

at technotechnolog

mportant te systems

a commoo security.deploymeneach of theree (3) fou

security

anization mch compathat all se

st have a urity culturaudits ar

wing areas

ve?

?

ere are noare no govry mechann Industryouncers, fry personne

ns are as d organizathile buyinge technolom or gadgcurrent an

must have logy can gy or you

to the orgas, the supp

n theme e. This apprnt of techneir areas oundational philosophy

must first any, industrecurity phi

security re or your re basicas -

o set standverning / reism as dev. In UK BIront man eel. Similar

a result otions are reg the secuogy and alsget is direcd ‘the thinlongevity osolve all

u do not u

anization. Tport staff, t

emerges throach comnology. Diffof concentareas: Pe

y is need

adopt a sery and regilosophies

philosophymomentum

ally ‘outso

ards in Indegulatory bveloped bySA is watc

etc. BISA isr initiatives

f that choiequired to

urity systemso what ca

ctly related ng’, may nof at leastl the probunderstan

This meanthe consul

hat is mbines

ferent ration eople, ed in

ecurity ion in must

y and m will urced

dia so bodies y films chdog s also s are

ce, is meet

ms or an be to its

not be t 6-10 blems d the

ns the tants,

Page 4: News letter jan 13

vendors, everyone’

More ofteawarenescontractorneeds to team memyour site, remains thsecurity beffective

More oftehave a deon-going due to thechanging!but the nedrives’ westorage causing themonly as e

This topicmentionedinstall secdisaster reof those eneed to eimplemenlives are mfind waysschool cobecause tdie based

The last abalance. return. In decide asto your cmoney, orthat you w

site staff,’s best inte

en than noss and trier and visitohappen fombers whoyou will n

hat your inbreach inteas your le

en than noefined starsecurity efe fact that ! What wasext threat cere an emeapacities am. This wa

effective as

c is the bd earlier, ycurity progrecovery pl

efforts causexplain to nted withoumost affect around thmputer labthey do nod on how

and perhapIn this senorder for

s an organicurrent envr access to

will still hav

in short erest. This

ot, an indued to educor onsite nr security, o understanot succeenternal, trusentionally oeast inform

ot, many ort, finish anfforts, but security c

s a threat ycoming wierging fad. and requireas not a cos it is curr

basic premyour weakerams, risk lan you arese a changthem why

ut the propted? In thehe new sysb where stuot understawell your

ps most imnse the bayour organization whavironment o your datave some so

everyoneis no differ

ustrial facilcate every

needs to haand can b

and their rod in secursted emploor otherwismed emplo

rganizationnd cost. Thtrue, lastinoncerns aryesterday oll not be aToday the

e little or nooncern a ferent.

mise on west link andmanageme well on yge in the day these chper awarenese cases istems youudents areand or careemployee

mportant thalance is bnization toat level of towards s

a. And no mort of incide

, understarent from t

lity has a yone as toave safety be integrateole and thring your faoyees havese. In otheloyee.

ns see sehis may beng securityre broughtor last wee

as deterredey are soldo knowled

ew years a

which yourd biggest t

ment procesyour way tay-to-day bhanges areness trainiit is only a

u just put ine some of te about se

es receive

ing a propbetween riso move tow

risk you asecurity is matter howent at som

ands that he importa

long histoo why saforientatio

ed into safhe importaacility. It ise the greater words, y

curity proge the casey is an on-t about by ek may be d. Less thad more chege of spec

ago. Unfor

r security threat is yosses and ao securingbusiness fle necessang and edshort timen place thuthe most cecurity. Yo

e and embr

per securitysk and rew

ward a prore willing tgoing to

w you do pe point in t

keeping yance place

ory of alwafety is impn and updfety progrance of thes a harsh rtest opportyour secu

grams or ie for a part-going initiatechnologfixed by yo

an 5 years eaply than cialized aptunately y

philosophour least ea healthy bg your enviow for you

ary. Too mducation fo before theus negatinreative peo

our securirace it.

y philosophward as wper securio live withcost someroceed, thetime.

your facilited on safety

ays trying portant. Evated each

ams. Withoeir actions reality but tunity to caurity progr

nitiatives aticular comative. Thisy - and tecour currenago USB

ever, are cpplications your secur

hy needs educated ebusiness coironment.

ur employemany timesor the peope day-to-dang your effople at bypity program

hy needs iwell as betw

ty program. Every chething wheere is a ve

ty secure y.

to raise svery emplyear. This

out rank an(or inactiothe simple

ause or creram is on

as projectsmponent ofs is quite schnology kt security pkeys or ‘t

capable of or programrity progra

to be builemployee. ontinuity plHowever,

ees then yos are progple whoseay users stforts. Thinkpassing sem will live

s the attituween efform you musange you ether it is

ery good ch

is in

safety oyee, s also nd file on) at e fact eate a nly as

s that f your simply keeps plans, humb huge

ms for am is

lt. As If you lan or if any

ou will grams daily tart to k of a

ecurity e and

ude of rt and st first make time,

hance

Page 5: News letter jan 13

A securityinapproprin how webenefit fro

The day prepared

Every buswin out oorganizati

Un Do Ma Pe

and

Having a situations

Hand youthem – to

Business their systauthenticacommon psuch as capproved

Remembeof the orgprocedurasame proccome to standard.

If your orgthe procecompliancAuditors hWashingtowell to ins

y incident riate accesell containeom it.

will cometo deal wit

siness hasover secuion to:

derstand tocument theake and doriodically rd whether

well-definthat fall ou

ur businessprop up th

unit folks wtems and ation to prplatform” is

criteria for dsecurity so

er, policiesganization.al documecedural anthe same

ganization ess of devece, and thehave the son or your sure that yo

can be css to data oed the inc

e when a th this situa

s different rity best p

the risks beese risks a

ocument anreview accthe risk is

ned procesutside of th

s managehe short leg

want secupremises

rotect critics not helpfdeciding wolutions sp

s are not in. Specific nts. The k

nd policy d conclusio

has an Ineloping meeir experiestructured state capi

our measu

catastrophor an IO roident is, ho

business ation will sa

needs andpractices.

eing taken and their mn informed cepted riskstill accept

ss to handhose antici

rs a copy g on the ta

rity folks tos secure. cal informul. You ne

whether infopecifically t

nstruction minformationey here isocuments ons as to

ternal Audeasurable nce in otheapproach

tal dictate urements w

ic system oom. The tow quickly

need conave time, m

d toleranceYou need

mitigating fa

decision aks to detetable

dle exceptipated whe

of typical able in the

o provide tTelling a ation" or ted to provormation / tied to polic

manuals. Pn as to ho

s clarity anin front of the secu

dit departmactions. A

er types ofh needed t

your exterwill hold up

failure, atrue meas

y you recov

nflicts withmoney and

e for risk. Ad to have

actors as to whethrmine whe

ons will aen the polic

standardsbreak room

hem with sbusiness

to tell themide your usfacility is ccies.

Policies areow to impld consisteeveryone rity measu

ment, theseAfter all, thf audits anto put thisrnal standain court.

accident inure of youver, and if

h a securid aggravati

At some poe a proces

her to acceether new

llow your cies were w

s and theym.

specific insunit man

m to “use sers with ocritical or n

e high-levelement po

ency. You in your org

ures that

e are good hey will bend standards practice ards, get yo

n process ur security f you choo

ity best pion.

oint, businss in plac

ept a risk mitigation

organizatiwritten.

y'll probabl

structions onager to

ACS alonorganizationot, and lis

el statemelicy shouldshould be ganization are neede

people toe doing thds is a valto work. Iour legal fo

area or sprogram w

ose to learn

practices. B

ess needsce to allow

ns are ava

on to dea

y end up

on how to "use two-fng with ID

on-specific ts of tested

nts of the d be laid oable to puand have

ed to mee

o get involve measuriuable resof our frienolks involv

subtle will be n and

Being

s may w the

ailable

l with

using

make factor

DS on tools, d and

intent out in ut the them

et the

ved in ing of ource. nds in ed as

Page 6: News letter jan 13

Industry slegislatorsmanagemprocedure

Educationprofessionenvironmejournalismofficers to

This probmeet the that mostemployersinstitutionreview thethat allow down train

Security isproductiveare issuesbudget is misconceatmospheconductedthere are inside thehigher pr

At giant cProtectingwith expeand live bcenter wit There aredesigningthat securineffectua

standards fs and indu

ment and sees.

n remains nals with ent and pre

m graduateo plan and

blem arisesever-chan

t security s and gros of the nee effective

w business ning standa

s treated ine systems s such as allocated tption. It i

ere where d smoothlychances o

e premisesrofit!

companiesg them is aertise in phbackups inth a pocket

e plenty of a secure rity for the

al afterthou

for securityustry groupecurity pro

an area army or

emises. Oe to write wexecute go

s from a nnging techn

professionoups like Ieed for cansecurity pto be condards for se

n most busand plansinsuranceto security is good s

all produy without fof attack bys or at wor

, data cena job for sehysical secn the worldt knife, a c

f complicatdata cente new data

ught?

y are not aps can tell ofessionals

of concepolice se

ne commewith approood securi

number of nology lannals rank CISS / ISndidates wlans as pe

ducted withecurity pers

siness and. Security , legal comdepartmen

security thuction, opefear or dany miscreanrk-floor are

nters don't ecurity officcurity and d are a waamera pho

ted documer-But wha center is

a cure all –us a lot a

s in our org

ern for secervices arent seemedopriate graty measure

challengedscape. Slow on th

SSM / IPSwho are weer changingh assurancsonnle but

d organizatis also see

mpliances,nt. Mostly shat guaraeration annger. No onts, theft oeas. Good

just hold cers, of cobusiness

aste of moone and ba

ments that at should bbuilt into t

– and this about best ganizations

curity profre inadequd to resona

ammar, whes?”

es, particulSecurity is heir hierarcSA / CAPSell trained ig needs ofce. PSAR Afall short o

tions as ‘coen as burd pressure

security prontees secnd mainteone can wof costly invd security

the crownourse. But j

continuityoney if somad intention

can guide be the CSOthe design

is a good practices

s to come u

fessionals.uately preate with may can’t we

arly the nealso an “echy of inteSI / SAFEn how to p

f varied orgAct 2005 aof desired

ost center’ en which ifrom stake

ofessionalscured, hasnance or ork; forgetventory or

y means g

jewels; thjust as imp. That's bemeone canns.

companieO's high-les, instead

thing on thand goals

up with the

. The perepared to any: “If it’se expect e

eed to adjeat your veerests. Th

E Code to plan, execganizationsattampts vedetails.

needing bis evil yet eeholders es are to bessle-free c

marketingt the best law-and –

good prod

hey are theportant, it'secause alln walk righ

es throughevel goals f

of being a

he whole. Ws, it is up te processe

rception iscreate s

s fair to expex-army / p

just curricuegetables” e onus fainform tra

ute and res and induery feebly

budgets foressential. Tetc. that mee blamed focongenial g activitiesperforman

–order probduction, m

e crown jes a job for the encryht into the

the procefor makingan expensi

While to the s and

s that ecure pect a police

ula to topic

alls to aining

evise / stries to lay

r non-There eager or this

work s are nce, if blems

means

ewels. those yption e data

ess of g sure ive or

Page 7: News letter jan 13

Read below to find out how a data center is designed to withstand everything from corporate espionage to terrorists to natural disasters. Sure, the extra precautions can be expensive. But they're simply part of the cost of building a secure facility that also can keep humming through disasters. Build on the right spot. Be sure the building is some distance from headquarters (20 miles is typical) and at least 100 feet from the main road. Bad neighbors: airports, chemical facilities, power plants. Bad news: earthquake fault lines and areas prone to hurricanes and floods. And scrap the "data center" sign. Have redundant utilities. Data centers need two sources for utilities, such as electricity, water, voice and data. Trace electricity sources back to two separate substations and water back to two different main lines. Lines should be underground and should come into different areas of the building, with water separate from other utilities. Use the data center's anticipated power usage as leverage for getting the electric company to accommodate the building's special needs. Pay attention to walls. Foot-thick concrete is a cheap and effective barrier against the elements and explosive devices. Avoid windows. Think warehouse, not office building! If you must have windows, limit them to the break room or administrative area, and use bomb-resistant laminated glass. Use landscaping for protection. Trees, boulders and gulley can hide the building from passing cars, obscure security devices (like fences), and also help keep vehicles from getting too close. Use retractable crash barriers at vehicle entry points. Control access to the parking lot and loading dock with a staffed guard station. Use a raised gate and a green light as visual cues that the bollards are down and the driver can go forward. In situations when extra security is needed, have the barriers lift-up by default, and lowered only when someone has permission to pass through. Plan for bomb detection. For data centers that are especially sensitive or likely targets, have guards use mirrors to check underneath vehicles for explosives, or provide portable bomb-sniffing devices. You can respond to a raised threat by increasing the number of vehicles you check—perhaps by checking employee vehicles as well as visitors and delivery trucks. Limit entry points. Control access to the building by establishing one main entrance, plus a back one for the loading dock. This keeps costs down too. Make fire doors exit only. For exits required by fire codes, install doors that don't have handles on the outside. When any of these doors is opened, a loud alarm should sound and trigger a response from the security command center. Use plenty of cameras. Surveillance cameras should be installed around the perimeter of the building, at all entrances and exits, and at every access point throughout the building. A combination of motion-detection devices, low-light cameras, pan-tilt-zoom cameras and standard fixed cameras is ideal. Footage should be digitally recorded and stored offsite. Protect the building's machinery. Keep the mechanical area of the building, which houses environmental systems and uninterruptible power supplies, strictly off limits. If generators are outside, use concrete walls to secure the area. For both areas, make sure all contractors and repair crews are accompanied by an employee at all times.

Page 8: News letter jan 13

Plan for scan be sepeople anspreadingchemical, Ensure nsure interhoused. A Use two-sensitive less invasexpensive Harden thwill have b

At for

At gen

At censtripighav

At roomalocas

Watch thsensitive helps withcommon a Visitor’s who don't

secure airet to re circnd equipmeg from a n

biological

nothing carnal walls rAlso make

-factor auareas of dsive than e access ca

he core wbeen authe

the outer visitors to the inner

neral emplthe entra

nter. Typicictest "p

ggybackingve two optthe door t

om. This isainframes cated. Prov

possible in

he exits toareas of t

h building area where

rest roomt have acce

r-handlingculate air rent if there

nearby fireor radiolog

an hide in run from thsure drop-

uthenticatidata centerretinal scaards.

ith securitenticated a

door. Donbuzz the f

r door. Seloyee area

ance to thcally, this positive g allowed. ions: to an indivs for the ror other

vide accessn order to c

oo. Monitohe facility evacuatione people c

ms. Make sess to the s

AsattyoStr

g. Make surather thane were som. For addegical conta

the walls he slab ce-down ceili

on. Biomers, with haanning. In

ty layers. at least thre

n't forget yfront desk. eparates v. e "data" is the laycontrol," For impl

vidual comoom wher

critical Is only on acontrol and

or entranceas well. It

n if there'san eat with

sure to inclsecure par

s soontack an

our inrategist

ure the hean drawing ime kind of ed securityaminant.

and ceiliniling all theings don't p

etric identand geome

other are

Anyone enee times, i

you'll need visitor are

part of thyer that h

meaninglementatio

mputer procre actual sT equipm

an as-needd track acc

e and exit'll help you

s a fire. Prhout gettin

lude bathrorts of the b

n as tnd desnterests

ating, ventn air from biological

y, put dev

ngs. In sece way to sprovide hid

ification isetry or fingeas, you m

ntering thencluding:

a way

a from

he data has the g no

on, you

cessing servers, ment is ded basis, cess.

t—not onlyu keep trarohibit foodg food on c

ooms for ubuilding.

the festroy its! -

tilating andthe outsidor chemicices in pla

cure areassub flooringdden acces

becomingerprint sca

may be abl

most secu

and segm

y for the mck of who d in the cocomputer e

use by visit

ear ap. SecuChana

d air-condide. This cocal attack oace to mo

s of the dag where wss points.

g standardanners usule to get a

ure part of

ment these

main facilitwas wher

omputer roequipment

tors and de

proachre youkya, t

tioning sysuld help por heavy snitor the a

ta center, wiring is typ

d for acceually considaway with

f the data c

rooms as

ty but for re when. It

ooms. Provt.

elivery peo

hes neu must,the G

stems rotect moke air for

make pically

ess to dered less-

center

much

more t also vide a

ople

ear, , all reat

Page 9: News letter jan 13

easy wayrequiremeconsumerservices f(ITU), moon their hsubscribeMessagesoffensive,

Problem

It is rare fof a text standard mobiles thusers arecommunicrevenue foperators providers the spam[Source: B Another c400 in exmessages70,000 peMobile Nebusinesseviruses spthe phone Corporatefail to chesuspicioussecurity s

y of stayient for keers put thefall short

ore than 80handset at er into cals are com but all hav

ms

for a mobilemessage

to have sphat feature

e completecations. Thfrom the sp

around twith their

m is to swiBloomberg

concern forxistence tos to 6% over day onletwork Vires as theypread in a es of peopl

e phones aeck their ps increase

software in

ing in toueping their eir trust in of expecta

0% of mobsome poinling a pre

mmonly nove one thin

e user not (SMS), p

pam filters e Internet aly dependhe conflictpam, whiche world users' mobtch to ope

g.net, Augu

r mobile opoday. Onever the lasly 1 year rus Attacky move easimilar wale who acc

are particulphone bill,

es in call chnstalled [So

Those intcan Indiaproblems

Rapidly ebillion moMobile Suas India,communicaccess to

uch. Whilsnetworks reliability

ations. Accbile phone nt. The hidemium ratot commerng in comm

to have repicture meon emails

and email aent on thet here is t

ch impacts actively ebile phoneerator. In ust 1st, 200

perators ise mobile ost 12 montago [Sours (online).

asily betweay to PC vicept the SM

larly vulne, sending harges. Toource: 200

trusive andan mobile

expanding obile subsubscriber]., where mcation, aso landline st this is clear of sand acce

cording tousers wordden motivte numberrcially foc

mon: they a

eceived anessage (Ms when usiaccess areeir mobile that in moon their d

ncourage e numbers India som08 (online)

s the sharpoperator hths, averagrce: Adapt. Mobile veen handsruses, goin

MS or MMS

rable to ththe charg

o add to th08 online w

d unwelcooperators

mobile phoscribers w This is lamobile ph

s many petelephony,very pos

pam and vessibility, ao the Interldwide havve behind r to buy aused, andare intrusiv

unsoliciteMS), or vng a home

e extremelynetwork oost cases,desire to p

spam by and the one operato], even afte

p rise in moas noted ging 100,0tiveMobile]viruses areets and inng straightS.

e threat poes straighis worry, 8

well-being

me mobiledo? Chec

one industworldwide rgely cont

hones areeople are and mobitive for oviruses is and are ornational Tve receivedsuch mesa product d in someve and unw

d mobile svideo mese computey vulnerablperator to the operarotect the supplying

nly way forrs face sper protocol

obile phona rise in

000 virus i. It sees S

e also fastnfect sharet to the add

osed by virt to accou

86% of mosurvey, F-

e viruses ack out the

try has alre[Source:

tributed bye the prev

unable tbiles providoperators' absolutely

often left fTelecommud an unso

ssages is oor enter

e cases cawelcome.

spam messssage (VMer, personale to mobilmanage t

rator is gasubscribe

g content r a subscripam levelsl-level filte

ne viruses, attacks froncidents pSharp Rist becominged addressdress book

ruses as muntants, an

obile phone-Secure C

and spam-e solutions

eady over ABI Rese

y countries valent foro gain re

de a cheaprevenues

y paramounfrustrated unication Ulicited mes

often to lura compe

an be dee

sage in theMS). Whilstal and corpe spam. In

these unwaaining exter. Some mand appliciber to get s of about ring.

with a repom 0.6% per day-upe in Volumg a menas books. Tk and infilt

most emplond won't ne users havorporation

-What s and

three earch:

such rm of eliable p and s, the nt, as when Union ssage re the

etition. emed

e form t it is porate n fact, anted

ensive mobile cation rid of 30%

ported of all

p from me of ace to These rating

oyees notice ve no ]. We

Page 10: News letter jan 13

know from our own data that subscribers whose phone do get infected can lose up to 100 Euros a day from MMS being sent from their phone by the virus.

Solutions

To prevent mobile spam and viruses becoming a problem for their subscribers, Indian network operators must ensure they don't solicit spam. Operators also need to take a leading role in the development of built-in network security to protect mobile phones, and prioritize customer satisfaction above potential ready-money revenue generated as a result of spam and viruses.

To ensure protection from mobile spam and viruses, operators must also secure their network. This way, not only known viruses, but also anomalies within the network can be detected, isolated, and disinfected, enabling network immunization. Having security on the network also means that employee-specific policies can be set. For example, an employee may not be allowed to download content which can be considered out of line from their business pursuits, while others may be prohibited from accessing the mobile Internet altogether-a similar approach to the one some organizations are already using for their PC infrastructure.

The constant evolution of spammers' techniques, combined with the continually growing mobile telephony industry, means that the battle for consumer trust is only just beginning-and mobile operators have to make sure they are competing effectively. A new walk-through airport lie-detector made in Israel may prove to be the toughest challenge yet for potential hijackers or drugs smugglers. Tested in Russia, the two-stage GK-1 voice analyzer requires that passengers don headphones at a console and answer: ”Yes" or "No" into a microphone to questions about whether they are planning something illicit. The software will almost always pick up uncontrollable tremors in the voice that give away liars or those with something to hide, say its designers at Israeli firm Nemesysco. "In our trial, 500 passengers went through the test, and then each was subjected to full traditional searches," said chief executive officer Amir Liberman. "The one person found to be planning something illegal was the one who failed our test." The GK-1 is expected to cost between $10,000 to -$30,000 when marketed. A spokesman for Moscow's Domodyedevo Airport, which is using a prototype, said "the tester (lie detector) has proved to be effective and we are in principle ready to use it". The September 11, 2001 hijacking attacks have led to a slew of innovations designed to boost airline security. Lieberman said several countries had expressed interest in the GK-l. "Unlike conventional lie detectors .such as the polygraph, this is minimally invasive, requiring hardly any physical contact," Lieberman said, adding that the first stage of the test takes between 30-75 seconds. Those that fail are taken aside for more intensive questioning and, if necessary, are searched. Lieberman said around 12 percent of passengers tend to show stress even when they have nothing to hide. "Some may feel nervous because they have used drugs, while having no intention to smuggle drugs," he said. "The whole thing is performed in a low-key manner to avoid causing anxiety." Reuters

Page 11: News letter jan 13

For more

ManagingLipata, MiT: 0063-2E-mail: poWeb: www

Ever had haven't h

Sug

e detail ple

g Director, inglanilla, C260-05-57 olly.secretaw.pcstcons

days likehad a com

ggestions

ease conta

PCS TrainCebu, Phil M:

[email protected]

these???puter long

& feedbac

act –

ning Consuippines, 600063-9064

consultant.m

? If not, yog enough.

ck may be

ultant 046 4116749 .com,

ou .

e sent to u

us on e-maail: [email protected]