news letter jan 13
DESCRIPTION
Monthly newsletter of International Council of Security and Safety Management . The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)TRANSCRIPT
Mpatm Adofcov NttiHsisp
Market comphysical aautonomoowards ac
most impo
At first madata and other systfor businecompliancoutside thversions o
Now most o data andrends incmproveme
However tsystems as more of
process ca
With
Let’
mpetition
as well asus and buccess to p
ortant feat
any vendosoon the tems and ess data nce’ to alloe plant en
of protoco
industried personn
cluding daents and this increand is puttf a nuisanan mean a
Mak
the fo
A
Ne
’s profe
in indust network
uilt upon ppersonal, ture was a
ors built tautomatiprotocols
networks. ow for cnvironmenls that wo
s with connel and to ata accessadvanced
asing neeting many nce than aa serious s
ke SeFrom
nd hop
A Happ
ewslett
essionhttp://w
try has traand virtu
proprietardata, pro
access to d
their own on landsc
s. Parallel In early 2
communicnt. Howevorked for t
ntrol systesecure th
s to enabd control d for acceprocess c
anything, safety thre
curitym Janu
pe and
py and
ter: Ja
nalize twww.wix.com/
aditionallyual! Over ary vendor cessing sdata.
protocolscape beca to this w
2000, vendcation betver, in the the purpos
ems are fahem. Thereble busineexercisesess is furtcontrol enbut for meat.
y a thiuary t
firm re
Prosp
nuary
the pro/sbtyagi/iciss
y driven tha decade technolog
speed, and
s or languame very
was the dedors saw tween serush to m
se at hand
acing mane are maness decisis like loopther dilutinvironmen
most indus
ing toill Dec
esolve
perous
2013
ofessios
he evolutioago, mos
gy and thed function
uages to aproprieta
evelopmenadvantagcurity sy
market mad but did n
ny pressurny forces pions, vendp tuning ang the se
nts at risk.stries a lo
o remecemb
that th
New Y
onals…
on of const control e solutionnality (or r
allow for ary and innt of Ethe
ges to inclystems inny vendo
not includ
res to botpushing thdor accesand alarmecurity of . In some
oss of con
Cap
embeber!
he com
Year!
…
ntrol systesystems
ns were gereliability)
the transfndependeernet netwlude ‘Ethecluding trs built ade security
h allow achese opposs for pro
m managemmany of tindustries
ntrol over
pt S B TFor IC
r,
ming ye
ems – were
eared ). The
fer of ent of works ernet-those d-hoc y.
ccess osing ocess ment. these s this your
Tyagi CISS
ear
of data ansystems adata netwfor commHowever, the purpo Now mosdata and including and advaincreasingputting mathan anytsafety thre As one nindustry isdies”. Regcontrol syovertime, confidenc The new Security. Athat mostdowntimeexperts wmeans mstaff to ma
The scopeconcern t
nd soon thand protoc
works. In eamunication
in the russe at hand
st industriepersonnel data acce
anced cong need forany proceshing, but feat.
noted secus one suchgardless ofystem will
environmce and pote
push for cAnd the pt industries
e. This meawho may n
any indusanage & o
e of the tethis may r
he automatcols. Parallarly 2000, between sh to marke
d but did no
es with conand to se
ess to enabntrol exercr access iss control efor most in
urity profeh that a losf the potenat least l
mental releentially the
control sysressure is s are ‘pusans more oot be phystries are aptimize mo
rm ‘securitrepresent
Marketevolutiovirtual! autonothe solprocessimportabuilt th
tion landscel to this wvendors sasecurity syet many veot include s
ntrol systemcure themble businecises like s further denvironmendustries a
ssional whss of accesntial harm, lose produase, and ability to s
stems is tocoming fro
shing the eoutside ‘tunsically at thautomatingore resourc
ty’ often secan be ov
t competiton of contr
Over a omous andlutions wesing speeant featureeir own prcape becawas the deaw advantystems incendors buisecurity.
ms are fac. There aress decisioloop tuni
diluting theents at riska loss of co
ho works ss or contany indus
uction forother inta
stay in bus
o try to baom many envelope’ ning’ and bhe site. Thg more conces thereb
eems vaguverwhelmin
ion in indrol systemdecade a
built uponre geared d, and fun
e was accrotocols orme very pevelopmenages to inccluding tholt ad-hoc v
cing manye many forns, vendoing and ae security . In some iontrol ove
for a majrol over outry with littsome time
angibles susiness.
alance theangles. Incto run fas
better visibhe advancntrol of they increasin
ue and the ng. Howev
dustry hass – physicago, mos
n proprietatowards a
nctionality ess to dat
r languageroprietary
nt of Ethernclude ‘Etheose outsidversions of
y pressuresrces pushir access foalarm man
of many industries tr your proc
jor refineryur systemstle or no see. This cauch as co
e two oppocreasing mster, moreility into pring age ofeir assets ng their rel
sheer voluver, this n
s traditioncal as well st control ary vendor access to (or reliab
ta. At firstes to allow
and indepnet networernet-comp
de the planf protocols
s to both aing these ofor processnagement.of these sthis is morcess can m
y once pos usually mecurity in aan translatompetitive
osing trendmarket come efficientlyroduction ff the workfand expe
iance on c
ume of effoneed not b
ally drivenas networsystems technologypersonal, ility). The t many vefor the tra
pendent of rks for buspliance’ to nt environthat worke
allow acceopposing ts improvem. Howeversystems are of a nuismean a se
ointed out,means somand aroundte into re-edge, inv
ds: Accessmpetition my and withfrom speciaforce in ge
ecting the computers.
ort and arebe the cas
n the k and were
y and data, most
ndors ansfer other
siness allow ment. ed for
ess to rends ments r this
and is sance erious
, “our meone d their -work, vestor
s and means h less alized eneral same
eas of se. In
looking atquickly beefforts aninitiatives but in theProcessesessence w Before bephilosophwhich it ishave. Underpinnalways wobe lost. introspect
•W•Ho•W•W•W•Ho
There is nfar as secand indusindustry, bwhich setssetting thundertake
Knowing wkey first ssecurity sgadgets, done withtechnologmaintainayears withmeans thproblem!
The first pdecision m
t a numbeeing adopted initiativeoffer diffe
e end, all s and Tecwhich will i
eginning any. A securs created
ning all efork towardWhat we
tions’! Suc
What are theow well are
What issuesWhat requireWhere do w
ow will we
no "standacurity systestry itself habroadcastis standard
he trainingen by ASIS
which stanstep in manstandards security pr
h it includingy – whichable / repah on-site hat either !
premise ismakers, th
er of secued as a ho
es that go frent sectioefforts canchnology. n turn fost
ny securityrity philosobut there
fforts withids creatinge call sech exercise
e policies ae they imps / problemements ape need to change / i
ard" standaems and gaas failed tong and me
ds for secug and eduS in USA.
ndard to chnaging comestablisherofessiona
ng its limitah is changairable in arepair conyou do n
quite simhe owners
rity framewolistic and far beyondons, headinn usually The prior
er a secur
y program ophy will soare some
in organiza and maincurity survs are requ
and standalemented?s do we haply to our ibe from a smprove the
ard. It is noadgets areo develop iedia industrity guards
ucation sta
hoose andmpliance. Sed by lawsls need to
ations. Theing very fa
a very shondition. Thnot unders
ply that seand opera
works or seffective a
d the purchngs and nbe summerity of devity culture.
or initiativeound differbasic req
ations onentaining a sveys and
uired to foc
ards we cu? ave? industry?security pee situation
ot a cliché.e concerneits own seltry or the ITs, supervisandards fo
d what youSome indus or regulao first undee shelf life ast. Today
ort time. A inking thastand the
ecurity is iators of the
standards approach tohase and dames for eed into thrveloping a
e your orgrent for eauirements
e must firsstrong sec
security us on follo
rrently hav
erspective??
In fact theed. There af-regulator
T Educatioors, pub bor security
ur obligatioustries andations. Wherstand theof a syste
y what is csystem m
at technotechnolog
mportant te systems
a commoo security.deploymeneach of theree (3) fou
security
anization mch compathat all se
st have a urity culturaudits ar
wing areas
ve?
?
ere are noare no govry mechann Industryouncers, fry personne
ns are as d organizathile buyinge technolom or gadgcurrent an
must have logy can gy or you
to the orgas, the supp
n theme e. This apprnt of techneir areas oundational philosophy
must first any, industrecurity phi
security re or your re basicas -
o set standverning / reism as dev. In UK BIront man eel. Similar
a result otions are reg the secuogy and alsget is direcd ‘the thinlongevity osolve all
u do not u
anization. Tport staff, t
emerges throach comnology. Diffof concentareas: Pe
y is need
adopt a sery and regilosophies
philosophymomentum
ally ‘outso
ards in Indegulatory bveloped bySA is watc
etc. BISA isr initiatives
f that choiequired to
urity systemso what ca
ctly related ng’, may nof at leastl the probunderstan
This meanthe consul
hat is mbines
ferent ration eople, ed in
ecurity ion in must
y and m will urced
dia so bodies y films chdog s also s are
ce, is meet
ms or an be to its
not be t 6-10 blems d the
ns the tants,
vendors, everyone’
More ofteawarenescontractorneeds to team memyour site, remains thsecurity beffective
More oftehave a deon-going due to thechanging!but the nedrives’ westorage causing themonly as e
This topicmentionedinstall secdisaster reof those eneed to eimplemenlives are mfind waysschool cobecause tdie based
The last abalance. return. In decide asto your cmoney, orthat you w
site staff,’s best inte
en than noss and trier and visitohappen fombers whoyou will n
hat your inbreach inteas your le
en than noefined starsecurity efe fact that ! What wasext threat cere an emeapacities am. This wa
effective as
c is the bd earlier, ycurity progrecovery pl
efforts causexplain to nted withoumost affect around thmputer labthey do nod on how
and perhapIn this senorder for
s an organicurrent envr access to
will still hav
in short erest. This
ot, an indued to educor onsite nr security, o understanot succeenternal, trusentionally oeast inform
ot, many ort, finish anfforts, but security c
s a threat ycoming wierging fad. and requireas not a cos it is curr
basic premyour weakerams, risk lan you arese a changthem why
ut the propted? In thehe new sysb where stuot understawell your
ps most imnse the bayour organization whavironment o your datave some so
everyoneis no differ
ustrial facilcate every
needs to haand can b
and their rod in secursted emploor otherwismed emplo
rganizationnd cost. Thtrue, lastinoncerns aryesterday oll not be aToday the
e little or nooncern a ferent.
mise on west link andmanageme well on yge in the day these chper awarenese cases istems youudents areand or careemployee
mportant thalance is bnization toat level of towards s
a. And no mort of incide
, understarent from t
lity has a yone as toave safety be integrateole and thring your faoyees havese. In otheloyee.
ns see sehis may beng securityre broughtor last wee
as deterredey are soldo knowled
ew years a
which yourd biggest t
ment procesyour way tay-to-day bhanges areness trainiit is only a
u just put ine some of te about se
es receive
ing a propbetween riso move tow
risk you asecurity is matter howent at som
ands that he importa
long histoo why saforientatio
ed into safhe importaacility. It ise the greater words, y
curity proge the casey is an on-t about by ek may be d. Less thad more chege of spec
ago. Unfor
r security threat is yosses and ao securingbusiness fle necessang and edshort timen place thuthe most cecurity. Yo
e and embr
per securitysk and rew
ward a prore willing tgoing to
w you do pe point in t
keeping yance place
ory of alwafety is impn and updfety progrance of thes a harsh rtest opportyour secu
grams or ie for a part-going initiatechnologfixed by yo
an 5 years eaply than cialized aptunately y
philosophour least ea healthy bg your enviow for you
ary. Too mducation fo before theus negatinreative peo
our securirace it.
y philosophward as wper securio live withcost someroceed, thetime.
your facilited on safety
ays trying portant. Evated each
ams. Withoeir actions reality but tunity to caurity progr
nitiatives aticular comative. Thisy - and tecour currenago USB
ever, are cpplications your secur
hy needs educated ebusiness coironment.
ur employemany timesor the peope day-to-dang your effople at bypity program
hy needs iwell as betw
ty program. Every chething wheere is a ve
ty secure y.
to raise svery emplyear. This
out rank an(or inactiothe simple
ause or creram is on
as projectsmponent ofs is quite schnology kt security pkeys or ‘t
capable of or programrity progra
to be builemployee. ontinuity plHowever,
ees then yos are progple whoseay users stforts. Thinkpassing sem will live
s the attituween efform you musange you ether it is
ery good ch
is in
safety oyee, s also nd file on) at e fact eate a nly as
s that f your simply keeps plans, humb huge
ms for am is
lt. As If you lan or if any
ou will grams daily tart to k of a
ecurity e and
ude of rt and st first make time,
hance
A securityinapproprin how webenefit fro
The day prepared
Every buswin out oorganizati
Un Do Ma Pe
and
Having a situations
Hand youthem – to
Business their systauthenticacommon psuch as capproved
Remembeof the orgprocedurasame proccome to standard.
If your orgthe procecompliancAuditors hWashingtowell to ins
y incident riate accesell containeom it.
will cometo deal wit
siness hasover secuion to:
derstand tocument theake and doriodically rd whether
well-definthat fall ou
ur businessprop up th
unit folks wtems and ation to prplatform” is
criteria for dsecurity so
er, policiesganization.al documecedural anthe same
ganization ess of devece, and thehave the son or your sure that yo
can be css to data oed the inc
e when a th this situa
s different rity best p
the risks beese risks a
ocument anreview accthe risk is
ned procesutside of th
s managehe short leg
want secupremises
rotect critics not helpfdeciding wolutions sp
s are not in. Specific nts. The k
nd policy d conclusio
has an Ineloping meeir experiestructured state capi
our measu
catastrophor an IO roident is, ho
business ation will sa
needs andpractices.
eing taken and their mn informed cepted riskstill accept
ss to handhose antici
rs a copy g on the ta
rity folks tos secure. cal informul. You ne
whether infopecifically t
nstruction minformationey here isocuments ons as to
ternal Audeasurable nce in otheapproach
tal dictate urements w
ic system oom. The tow quickly
need conave time, m
d toleranceYou need
mitigating fa
decision aks to detetable
dle exceptipated whe
of typical able in the
o provide tTelling a ation" or ted to provormation / tied to polic
manuals. Pn as to ho
s clarity anin front of the secu
dit departmactions. A
er types ofh needed t
your exterwill hold up
failure, atrue meas
y you recov
nflicts withmoney and
e for risk. Ad to have
actors as to whethrmine whe
ons will aen the polic
standardsbreak room
hem with sbusiness
to tell themide your usfacility is ccies.
Policies areow to impld consisteeveryone rity measu
ment, theseAfter all, thf audits anto put thisrnal standain court.
accident inure of youver, and if
h a securid aggravati
At some poe a proces
her to acceether new
llow your cies were w
s and theym.
specific insunit man
m to “use sers with ocritical or n
e high-levelement po
ency. You in your org
ures that
e are good hey will bend standards practice ards, get yo
n process ur security f you choo
ity best pion.
oint, businss in plac
ept a risk mitigation
organizatiwritten.
y'll probabl
structions onager to
ACS alonorganizationot, and lis
el statemelicy shouldshould be ganization are neede
people toe doing thds is a valto work. Iour legal fo
area or sprogram w
ose to learn
practices. B
ess needsce to allow
ns are ava
on to dea
y end up
on how to "use two-fng with ID
on-specific ts of tested
nts of the d be laid oable to puand have
ed to mee
o get involve measuriuable resof our frienolks involv
subtle will be n and
Being
s may w the
ailable
l with
using
make factor
DS on tools, d and
intent out in ut the them
et the
ved in ing of ource. nds in ed as
Industry slegislatorsmanagemprocedure
Educationprofessionenvironmejournalismofficers to
This probmeet the that mostemployersinstitutionreview thethat allow down train
Security isproductiveare issuesbudget is misconceatmospheconductedthere are inside thehigher pr
At giant cProtectingwith expeand live bcenter wit There aredesigningthat securineffectua
standards fs and indu
ment and sees.
n remains nals with ent and pre
m graduateo plan and
blem arisesever-chan
t security s and gros of the nee effective
w business ning standa
s treated ine systems s such as allocated tption. It i
ere where d smoothlychances o
e premisesrofit!
companiesg them is aertise in phbackups inth a pocket
e plenty of a secure rity for the
al afterthou
for securityustry groupecurity pro
an area army or
emises. Oe to write wexecute go
s from a nnging techn
professionoups like Ieed for cansecurity pto be condards for se
n most busand plansinsuranceto security is good s
all produy without fof attack bys or at wor
, data cena job for sehysical secn the worldt knife, a c
f complicatdata cente new data
ught?
y are not aps can tell ofessionals
of concepolice se
ne commewith approood securi
number of nology lannals rank CISS / ISndidates wlans as pe
ducted withecurity pers
siness and. Security , legal comdepartmen
security thuction, opefear or dany miscreanrk-floor are
nters don't ecurity officcurity and d are a waamera pho
ted documer-But wha center is
a cure all –us a lot a
s in our org
ern for secervices arent seemedopriate graty measure
challengedscape. Slow on th
SSM / IPSwho are weer changingh assurancsonnle but
d organizatis also see
mpliances,nt. Mostly shat guaraeration annger. No onts, theft oeas. Good
just hold cers, of cobusiness
aste of moone and ba
ments that at should bbuilt into t
– and this about best ganizations
curity profre inadequd to resona
ammar, whes?”
es, particulSecurity is heir hierarcSA / CAPSell trained ig needs ofce. PSAR Afall short o
tions as ‘coen as burd pressure
security prontees secnd mainteone can wof costly invd security
the crownourse. But j
continuityoney if somad intention
can guide be the CSOthe design
is a good practices
s to come u
fessionals.uately preate with may can’t we
arly the nealso an “echy of inteSI / SAFEn how to p
f varied orgAct 2005 aof desired
ost center’ en which ifrom stake
ofessionalscured, hasnance or ork; forgetventory or
y means g
jewels; thjust as imp. That's bemeone canns.
companieO's high-les, instead
thing on thand goals
up with the
. The perepared to any: “If it’se expect e
eed to adjeat your veerests. Th
E Code to plan, execganizationsattampts vedetails.
needing bis evil yet eeholders es are to bessle-free c
marketingt the best law-and –
good prod
hey are theportant, it'secause alln walk righ
es throughevel goals f
of being a
he whole. Ws, it is up te processe
rception iscreate s
s fair to expex-army / p
just curricuegetables” e onus fainform tra
ute and res and induery feebly
budgets foressential. Tetc. that mee blamed focongenial g activitiesperforman
–order probduction, m
e crown jes a job for the encryht into the
the procefor makingan expensi
While to the s and
s that ecure pect a police
ula to topic
alls to aining
evise / stries to lay
r non-There eager or this
work s are nce, if blems
means
ewels. those yption e data
ess of g sure ive or
Read below to find out how a data center is designed to withstand everything from corporate espionage to terrorists to natural disasters. Sure, the extra precautions can be expensive. But they're simply part of the cost of building a secure facility that also can keep humming through disasters. Build on the right spot. Be sure the building is some distance from headquarters (20 miles is typical) and at least 100 feet from the main road. Bad neighbors: airports, chemical facilities, power plants. Bad news: earthquake fault lines and areas prone to hurricanes and floods. And scrap the "data center" sign. Have redundant utilities. Data centers need two sources for utilities, such as electricity, water, voice and data. Trace electricity sources back to two separate substations and water back to two different main lines. Lines should be underground and should come into different areas of the building, with water separate from other utilities. Use the data center's anticipated power usage as leverage for getting the electric company to accommodate the building's special needs. Pay attention to walls. Foot-thick concrete is a cheap and effective barrier against the elements and explosive devices. Avoid windows. Think warehouse, not office building! If you must have windows, limit them to the break room or administrative area, and use bomb-resistant laminated glass. Use landscaping for protection. Trees, boulders and gulley can hide the building from passing cars, obscure security devices (like fences), and also help keep vehicles from getting too close. Use retractable crash barriers at vehicle entry points. Control access to the parking lot and loading dock with a staffed guard station. Use a raised gate and a green light as visual cues that the bollards are down and the driver can go forward. In situations when extra security is needed, have the barriers lift-up by default, and lowered only when someone has permission to pass through. Plan for bomb detection. For data centers that are especially sensitive or likely targets, have guards use mirrors to check underneath vehicles for explosives, or provide portable bomb-sniffing devices. You can respond to a raised threat by increasing the number of vehicles you check—perhaps by checking employee vehicles as well as visitors and delivery trucks. Limit entry points. Control access to the building by establishing one main entrance, plus a back one for the loading dock. This keeps costs down too. Make fire doors exit only. For exits required by fire codes, install doors that don't have handles on the outside. When any of these doors is opened, a loud alarm should sound and trigger a response from the security command center. Use plenty of cameras. Surveillance cameras should be installed around the perimeter of the building, at all entrances and exits, and at every access point throughout the building. A combination of motion-detection devices, low-light cameras, pan-tilt-zoom cameras and standard fixed cameras is ideal. Footage should be digitally recorded and stored offsite. Protect the building's machinery. Keep the mechanical area of the building, which houses environmental systems and uninterruptible power supplies, strictly off limits. If generators are outside, use concrete walls to secure the area. For both areas, make sure all contractors and repair crews are accompanied by an employee at all times.
Plan for scan be sepeople anspreadingchemical, Ensure nsure interhoused. A Use two-sensitive less invasexpensive Harden thwill have b
At for
At gen
At censtripighav
At roomalocas
Watch thsensitive helps withcommon a Visitor’s who don't
secure airet to re circnd equipmeg from a n
biological
nothing carnal walls rAlso make
-factor auareas of dsive than e access ca
he core wbeen authe
the outer visitors to the inner
neral emplthe entra
nter. Typicictest "p
ggybackingve two optthe door t
om. This isainframes cated. Prov
possible in
he exits toareas of t
h building area where
rest roomt have acce
r-handlingculate air rent if there
nearby fireor radiolog
an hide in run from thsure drop-
uthenticatidata centerretinal scaards.
ith securitenticated a
door. Donbuzz the f
r door. Seloyee area
ance to thcally, this positive g allowed. ions: to an indivs for the ror other
vide accessn order to c
oo. Monitohe facility evacuatione people c
ms. Make sess to the s
AsattyoStr
g. Make surather thane were som. For addegical conta
the walls he slab ce-down ceili
on. Biomers, with haanning. In
ty layers. at least thre
n't forget yfront desk. eparates v. e "data" is the laycontrol," For impl
vidual comoom wher
critical Is only on acontrol and
or entranceas well. It
n if there'san eat with
sure to inclsecure par
s soontack an
our inrategist
ure the hean drawing ime kind of ed securityaminant.
and ceiliniling all theings don't p
etric identand geome
other are
Anyone enee times, i
you'll need visitor are
part of thyer that h
meaninglementatio
mputer procre actual sT equipm
an as-needd track acc
e and exit'll help you
s a fire. Prhout gettin
lude bathrorts of the b
n as tnd desnterests
ating, ventn air from biological
y, put dev
ngs. In sece way to sprovide hid
ification isetry or fingeas, you m
ntering thencluding:
a way
a from
he data has the g no
on, you
cessing servers, ment is ded basis, cess.
t—not onlyu keep trarohibit foodg food on c
ooms for ubuilding.
the festroy its! -
tilating andthe outsidor chemicices in pla
cure areassub flooringdden acces
becomingerprint sca
may be abl
most secu
and segm
y for the mck of who d in the cocomputer e
use by visit
ear ap. SecuChana
d air-condide. This cocal attack oace to mo
s of the dag where wss points.
g standardanners usule to get a
ure part of
ment these
main facilitwas wher
omputer roequipment
tors and de
proachre youkya, t
tioning sysuld help por heavy snitor the a
ta center, wiring is typ
d for acceually considaway with
f the data c
rooms as
ty but for re when. It
ooms. Provt.
elivery peo
hes neu must,the G
stems rotect moke air for
make pically
ess to dered less-
center
much
more t also vide a
ople
ear, , all reat
easy wayrequiremeconsumerservices f(ITU), moon their hsubscribeMessagesoffensive,
Problem
It is rare fof a text standard mobiles thusers arecommunicrevenue foperators providers the spam[Source: B Another c400 in exmessages70,000 peMobile Nebusinesseviruses spthe phone Corporatefail to chesuspicioussecurity s
y of stayient for keers put thefall short
ore than 80handset at er into cals are com but all hav
ms
for a mobilemessage
to have sphat feature
e completecations. Thfrom the sp
around twith their
m is to swiBloomberg
concern forxistence tos to 6% over day onletwork Vires as theypread in a es of peopl
e phones aeck their ps increase
software in
ing in toueping their eir trust in of expecta
0% of mobsome poinling a pre
mmonly nove one thin
e user not (SMS), p
pam filters e Internet aly dependhe conflictpam, whiche world users' mobtch to ope
g.net, Augu
r mobile opoday. Onever the lasly 1 year rus Attacky move easimilar wale who acc
are particulphone bill,
es in call chnstalled [So
Those intcan Indiaproblems
Rapidly ebillion moMobile Suas India,communicaccess to
uch. Whilsnetworks reliability
ations. Accbile phone nt. The hidemium ratot commerng in comm
to have repicture meon emails
and email aent on thet here is t
ch impacts actively ebile phoneerator. In ust 1st, 200
perators ise mobile ost 12 montago [Sours (online).
asily betweay to PC vicept the SM
larly vulne, sending harges. Toource: 200
trusive andan mobile
expanding obile subsubscriber]., where mcation, aso landline st this is clear of sand acce
cording tousers wordden motivte numberrcially foc
mon: they a
eceived anessage (Ms when usiaccess areeir mobile that in moon their d
ncourage e numbers India som08 (online)
s the sharpoperator hths, averagrce: Adapt. Mobile veen handsruses, goin
MS or MMS
rable to ththe charg
o add to th08 online w
d unwelcooperators
mobile phoscribers w This is lamobile ph
s many petelephony,very pos
pam and vessibility, ao the Interldwide havve behind r to buy aused, andare intrusiv
unsoliciteMS), or vng a home
e extremelynetwork oost cases,desire to p
spam by and the one operato], even afte
p rise in moas noted ging 100,0tiveMobile]viruses areets and inng straightS.
e threat poes straighis worry, 8
well-being
me mobiledo? Chec
one industworldwide rgely cont
hones areeople are and mobitive for oviruses is and are ornational Tve receivedsuch mesa product d in someve and unw
d mobile svideo mese computey vulnerablperator to the operarotect the supplying
nly way forrs face sper protocol
obile phona rise in
000 virus i. It sees S
e also fastnfect sharet to the add
osed by virt to accou
86% of mosurvey, F-
e viruses ack out the
try has alre[Source:
tributed bye the prev
unable tbiles providoperators' absolutely
often left fTelecommud an unso
ssages is oor enter
e cases cawelcome.
spam messssage (VMer, personale to mobilmanage t
rator is gasubscribe
g content r a subscripam levelsl-level filte
ne viruses, attacks froncidents pSharp Rist becominged addressdress book
ruses as muntants, an
obile phone-Secure C
and spam-e solutions
eady over ABI Rese
y countries valent foro gain re
de a cheaprevenues
y paramounfrustrated unication Ulicited mes
often to lura compe
an be dee
sage in theMS). Whilstal and corpe spam. In
these unwaaining exter. Some mand appliciber to get s of about ring.
with a repom 0.6% per day-upe in Volumg a menas books. Tk and infilt
most emplond won't ne users havorporation
-What s and
three earch:
such rm of eliable p and s, the nt, as when Union ssage re the
etition. emed
e form t it is porate n fact, anted
ensive mobile cation rid of 30%
ported of all
p from me of ace to These rating
oyees notice ve no ]. We
know from our own data that subscribers whose phone do get infected can lose up to 100 Euros a day from MMS being sent from their phone by the virus.
Solutions
To prevent mobile spam and viruses becoming a problem for their subscribers, Indian network operators must ensure they don't solicit spam. Operators also need to take a leading role in the development of built-in network security to protect mobile phones, and prioritize customer satisfaction above potential ready-money revenue generated as a result of spam and viruses.
To ensure protection from mobile spam and viruses, operators must also secure their network. This way, not only known viruses, but also anomalies within the network can be detected, isolated, and disinfected, enabling network immunization. Having security on the network also means that employee-specific policies can be set. For example, an employee may not be allowed to download content which can be considered out of line from their business pursuits, while others may be prohibited from accessing the mobile Internet altogether-a similar approach to the one some organizations are already using for their PC infrastructure.
The constant evolution of spammers' techniques, combined with the continually growing mobile telephony industry, means that the battle for consumer trust is only just beginning-and mobile operators have to make sure they are competing effectively. A new walk-through airport lie-detector made in Israel may prove to be the toughest challenge yet for potential hijackers or drugs smugglers. Tested in Russia, the two-stage GK-1 voice analyzer requires that passengers don headphones at a console and answer: ”Yes" or "No" into a microphone to questions about whether they are planning something illicit. The software will almost always pick up uncontrollable tremors in the voice that give away liars or those with something to hide, say its designers at Israeli firm Nemesysco. "In our trial, 500 passengers went through the test, and then each was subjected to full traditional searches," said chief executive officer Amir Liberman. "The one person found to be planning something illegal was the one who failed our test." The GK-1 is expected to cost between $10,000 to -$30,000 when marketed. A spokesman for Moscow's Domodyedevo Airport, which is using a prototype, said "the tester (lie detector) has proved to be effective and we are in principle ready to use it". The September 11, 2001 hijacking attacks have led to a slew of innovations designed to boost airline security. Lieberman said several countries had expressed interest in the GK-l. "Unlike conventional lie detectors .such as the polygraph, this is minimally invasive, requiring hardly any physical contact," Lieberman said, adding that the first stage of the test takes between 30-75 seconds. Those that fail are taken aside for more intensive questioning and, if necessary, are searched. Lieberman said around 12 percent of passengers tend to show stress even when they have nothing to hide. "Some may feel nervous because they have used drugs, while having no intention to smuggle drugs," he said. "The whole thing is performed in a low-key manner to avoid causing anxiety." Reuters
For more
ManagingLipata, MiT: 0063-2E-mail: poWeb: www
Ever had haven't h
Sug
e detail ple
g Director, inglanilla, C260-05-57 olly.secretaw.pcstcons
days likehad a com
ggestions
ease conta
PCS TrainCebu, Phil M:
these???puter long
& feedbac
act –
ning Consuippines, 600063-9064
consultant.m
? If not, yog enough.
ck may be
ultant 046 4116749 .com,
ou .
e sent to u
us on e-maail: [email protected]