SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
Newsletter: May 2011
               Let’s professionalize the professionals… 
                                       http://www.wix.com/sbtyagi/iciss




                   Security and safety are important parts of life and cannot be ignored. Without a
                   sense of security, one cannot hope to lead a stress free and happy life. If you
                   regularly feel threatened or exposed to certain negative influences of situations, you
                   can never have a relaxed or calm state of mind. You will always be on edge and
                   before long may even be headed for a possible nervous breakdown if you are not
                   careful enough. Thus it is very important not to take these factors lightly.

                    Even for a child to prosper and showcase proper psychological growth and
                    development, it is extremely important that he/she feels nurtured and secure. You
                    cannot concentrate on any other area in life if you feel vulnerable or defenseless in
your everyday life. So, you need to set some time to think about your safety in daily situations and
come up with suitable action plans to mitigate the threat levels that may arise at any moment. It is
important not to be lackadaisical about these issues. Remaining secure whenever possible can also
help in bringing down the possibility of falling prey to unwanted accidents or unfortunate circumstances
considerably. Even if you take a few simple, easy steps to ensure your safety, you can end up saving
your own life as well as that of other people who may be around you. Life is the best gift that we have
and it is very important to guard it and to keep ourselves safe from disasters that can be avoided. Self
preservation is one of the most important biological goals for humans and this can be brought about
only if you take steps to keep yourself secure enough.

If we get too lazy when it comes to our security and do not give it much thought or attention, we can
end up unnecessarily hurting or injuring ourselves. If we give high importance to security, we can
significantly lower the adverse effects of a disaster even though we may not be able to prevent it. All it
requires to remain secure is the investment of a little time. You should consider all kinds of scenarios
that may affect you at the different places that you visit habitually. All the threats arising at these places
should be thoroughly examined and a possible reaction should be determined if such incidents do take
place in the future.

Being prepared for any eventuality is enough to help you remain secure. Putting a little thought into
developing the suitable ways to behave in case of accidents or adverse situations is enough to
guarantee your safety. Today’s society is full of anti social elements that can disrupt your lives if you do
not remain alert enough. The increasing rate of crime across most cities of the world also makes it
necessary to beef up on your security. Apart from this, it is a well known fact that
natural disasters can also occur at any time without warning and if you are prepared
for them, you are more likely to remain secure.

                                                                                       Capt S B Tyagi
                                                                                            For ICISS

C:S B TyagiICISSNews Letter May 11.doc
This article was created by a professional writer and edited by experienced copy editors, both
qualified members of the Demand Media Studios community. All articles go through an
editorial process that includes subject matter guidelines, plagiarism review, fact-checking, and
other steps in effort to provide reliable information.

A data security officer maintains an information systems structure or operations.

The position of data security officer is a challenging occupation. According to the Occupational
Outlook Handbook, 2011 Edition, the job outlook for a data security officer is expected to grow
by 17 percent over the 2008-2018 decade. An individual considering a career as a data
security officer must have technical expertise with the ability to rapidly solve problems that
arise in an information processing environment.

System Security
   o   Data security officers are responsible for the physical security of system assets for a
       business or organization, including access to controlled areas that process data and
       information. Oversight includes the physical security of computer systems, software,
       and hardware components and media devices. The data security officer also creates
       and implements security policies concerning these resources for personnel to follow.

C:S B TyagiICISSNews Letter May 11.doc
The data security officer creates the information system disaster recovery plan for the
       care of system assets during and after a disaster to the data facility.

Approves Software Changes
   o   When there is a major software change or release, the data security officer
       communicates changes to management and personnel through memorandum, release
       meetings or verification by letter to other departments and branches. The data officer
       has the responsibility to review the changes and state the impact of those changes on
       certain programs on the system. Version numbers which update software processes are
       implemented by the data officer.

Establish Security Profiles
   o   Every business or organization using an information system to process data should
       have security controls for software access at all levels of system processing, which
       supports separation of duties. Separation of duties is the concept of a single individual
       having control over a transaction from "start to finish." The data officer's responsibility is
       to create policies and profiles that control user access to the applications by
       establishing user ID and passwords. The officer also creates layers of security within
       the information systems environment as a check and balance system against user ID
       and passwords. Security layers that are created limit risk of faulty processing and
       security breaches.

Audits System Tables and Catalogs
   o   System tables and catalogs contain database records and program routines that
       maintain the integrity of database
       structures, tables and records. The
       data security officer is responsible
       for the integrity of all data
       structures that exist in an
       information system. Period audits
       are performed by the data security
       officer    to    examine      record
       structures and apply correction if
       there are any errors. In a systems
       programming environment, the
       data officer checks the system
       catalog of programs and files to
       ensure     software     development
       programs are separated from live programs that are running on the same system.

Educational Requirements and Salary
   o   Obtaining a bachelor's degree in information systems management with a depth in
       computer science can help an individual seeking a career in data management. The
       occupation is a technical career field and programming courses will help candidates
       understand data structures. The salary for a data security officer with five to nine years
       of experience ranges from $58,474 to $82,025 in European countries.


C:S B TyagiICISSNews Letter May 11.doc
What are the Key Infrastructures? Transport, communication and Energy sectors have great
role in nation building and economical prosperity. Energy security draws attention of planners
and saboteurs world over. Focus is on Energy Security which is core of Key Infrastructures
and also very vulnerable.

US has defined the Key Infrastructures as -

      “Systems and assets, whether physical or virtual, so vital to the country that the
      incapacity or destruction of such systems and assets would have a debilitating
      impact on security, national economic security, national public health or safety,
      or any combination of those matters.”
                                                                        - US Patriot Act
There is no definition of this term but broadly it is defined as

       “Key infrastructures are those, damage to which will adversely affect Nation’s
       Defense preparedness and Economy. “


Key infrastructures are those, damage to which will adversely affect Nations defense
preparedness and economy. Following are the areas falling in the category of ‘Key or Critical
Infrastructure –

       Energy infrastructures – nuclear, hydro, coal and gas
       Information & communication infrastructures
       Water resources
       Financial institutions
       Transport infrastructures
       Space – development and research

C:S B TyagiICISSNews Letter May 11.doc
Food – supply chain
       Health infrastructures

Because of the private ownership of major elements of critical infrastructure any security and
control measures will (almost by definition) require the involvement of both private and public
interests. However the national authorities will often have sole competence in the area.

India’s Economic Rise & Infrastructure

Best consideration for Indian economical development will require following steps:

         Development of infrastructures to cope with the growing demand;
         Policy for sustainable growth and up-gradation of existing assets.
         Ensuring availability of resources through domestic efforts or through long term supply
         agreements or through buying assets abroad;
         An elaborate network for easy availability for domestic stakeholders;
         Above all, institutional and policy mechanisms to ensure an equitable usages both in
         terms of reaching underdeveloped regions and in
         terms of the economically backward sections of
         the Indian society.

Major Areas of Security Concerns

The creation of any key-infrastructure is a major logistical
operation from locating and investigating new sites to the
movement of personnel and establishment of facilities. It
takes an enormous amount of resources to establish such
sites and all the operators have to rely on a sound cloak of
security to prevent theft of equipment, extortion, sabotage
and kidnapping of work force. There are following major
areas of security concerns –

   •   Security of survey parties and their equipments (even explosives!)
   •   Land acquisition and establishing camp sites: Pre-camp: armed / static security
   •   Security during movement of essential equipments and key personnel
   •   Travel protection of executive and employees
   •   Transportation of heavy machinery and raw material - rail, air & sea
   •   Commencement of construction activities – labor unrest, law-and-order
   •   Establishing early oil / gas collection centers and security thereof
   •   Security of off-shore platforms, receiving terminals, dispatch terminals, compressor
       stations etc.
   •   Security of larger installations such as refineries, LPG plants and petrochemical
       complexes
   •   Security of supply chain – storage / warehouse, rail / road transportation
   •   Intelligence gathering and disaster planning
   •   Constitution of Emergency Response Teams



C:S B TyagiICISSNews Letter May 11.doc
For the Key Infrastructures such as power, oil and gas, security is always a major concern as
this sector world over has high probability and vulnerability from terrorist attacks and sabotage.
Their operations also have high criticality.

Strategies for Reliable Security of Key Infrastructures

Following are the specifics of the security management of this sector -

Optimizing Assets through Centralized Command & Control

Integrated command and control systems must be positioned to provide an integrated solution,
which captures and validates data that can be used throughout the organization during normal
operation, whilst providing relevant, useful information in difficult and emergency situations.
This approach will enable operators of critical national infrastructure to optimize their assets
whilst maintaining their investment in legacy systems. New developments in technology can
improve the security of personnel and assets and provide enhanced operational capabilities.

Biometric Integrated Safe System of Work

Integrated Safe System of Work (ISSoW) is a key tool in ensuring the safe operation of Oil and
Gas installations. However, such systems can only be truly effective if user identities can be
quickly validated and definitively authenticated. For this to be implemented in practice in
providing advanced authentication and identity management, the biometrics based access
control solutions are found to be very reliable. There are many solutions available solution
where worker identities can be positively and accurately registered, identified and managed
securely throughout their lifecycle.

High Accuracy Real Time Personnel & Asset Location

There is need to have a system that improves the safety of workers in hazardous
environments and helps to improve the effectiveness of emergency response measures.
There are systems available which can locate an
individual, or asset, to within 1 meter in 3D (e.g. in a
multi-storey/multi-level facility) and it can do this up to
1km from a base station. The system provides a
position update every second and, for example, could
be used to track a lone worker or road tanker's
progress through a plant or ensure that personnel are
moving towards the correct muster points in an
emergency. Such system do not require large amount
of infrastructure or extensive cabling and is therefore
easily installed in an existing plant at minimal cost.

Situational Awareness - Securely Integrating Site Data

This aspect deals with the need to simply and securely integrate data from a wide variety of
systems to show site leaders and managers the overall condition of their site - and what is
happening on it. This capability brings together data from operational, security and work

C:S B TyagiICISSNews Letter May 11.doc
management systems and merges this private data with public information from the internet to
provide a complete picture.

By using underlying open data architecture together with security protection system, it can
bring these data sources together and share them securely among multiple disparate user
groups, and at different locations, whilst ensuring data validity, security, and privacy. As well
as the complete picture, it can also provide custom views for users such as maintenance
teams, emergency services and even the media and general public in the event of a major
incident.

Air traffic
Rogue aircraft can endanger the security of any flights in its vicinity of the flight path! Due to
loose security controls at the take-off points unscreened passengers can board it with
unimaginable explosives and ammunition! Even this is not needed as aircraft in collision path
itself is big danger to other aircraft.
Security of Aircraft in the future environment therefore must begin with the aim of improving
security on commercial aircraft. It must address classic hijacking situations, September 11-type
scenarios and futuristic scenarios involving electronic jamming and hacking of computer
systems. Additionally it must address technical issues such as onboard-threat detection, threat
assessment and response management plus flight protection.
Security of Offshore Platforms

Off-shore platforms are highly vulnerable, high risk installations having high probability of
attacks of terrorist which may be equipped with some of the best technical capabilities.
Somalian sea-pirates have well demonstrated that now-a-days any one can get any thing
provided they have sufficient funds!

It is therefore very important that beside sturdy infrastructure security and the security risk
management mechanism including airborne, maritime and ground surveillance, these
platforms have very reliable and impregnable communication and cyber security measures.
Tracking and positioning of manpower and material is equally important.

To devise an action plan to combat attacks on its offshore installations, potential terrorist-
related crisis situations should be incorporated in the CMP (Crisis Management Plan) along
with the response mechanisms/capacity building required to handle such situations.

The Maritime Sector
The International Ship and Port Facility Security, ISPS code, was introduced in July 2004. It
requires ports and vessels to show that they have put adequate security systems in place -
and vessels to show that they have been calling only at certified ports. The purpose of the
code is to provide a standardized, consistent framework for evaluating risk.
Vessel Automatic Tracking and Monitoring System for the security of large oil infrastructures in
high sea areas assume greater importance to rule out attack capabilities of Somalian like out-
fits which might draw their attention to the vulnerabilities of these assets.



C:S B TyagiICISSNews Letter May 11.doc
Cyberspace

The EU has set up a task force to explore what its 25 member states are doing to combat
cyber-threats against critical infrastructure. As part of the EU's Critical Information
Infrastructure Research Coordination, CI2RCO project, the task force aims to identify research
groups and programs focused on IT security in critical
infrastructures, such as telecommunications networks and
power grids. The scope of the cooperation goes beyond the EU;
the task force also wants to include USA, Canada, Australia and
Russia. India with its strong IT workforce, known world-over for
its prowess must join such cooperative and collaborative efforts!

Robust, Secure, Global Communication Solutions

This capability calls for seamlessly connecting all oil & gas
installations of an organization and on more higher level , of the
Nation by providing highly available, robust, secure, integrated
communication networks for critical operational systems. A
number of communication solutions are available which provide
robust connectivity and communication helpful for protection of
assets and personnel in environments where a high standard of
inherent safety is a mandatory requirement. There are resilient
telecommunications networks such as Broadband Global Area
Network (BGAN), which allow for simultaneous voice & data
communications and secure access to applications from almost
anywhere in the world.

Securing Supervisory Control Systems

Supervisory Control and Data Acquisition (SCADA) systems
and other similar control systems are widely used by utilities
and industries that are considered critical to the functioning of
countries around the world. The Operations, Safety, Security, and IT decision-makers of Key
Infrastructures, especially oil & gas, power generation and transmission and nuclear energy
are well advised to pay attention to following aspects –

       More and more reliability on Local Area Network (LAN), Wide Area Network (WAN) and
       Broadband Global Area Network (BGAN) brings increased threats to operations of
       organizations using them. Threats to SCADA are Malware, Insider, Hacker and
       Terrorists.

       The networks are susceptible to attacks aimed to disrupt and destroy them. Such an
       attack by viruses, worms or other forms of cyber-terrorism on nuclear, oil and gas
       industry process control networks and related systems could destabilize the national
       economy and defense preparedness.


C:S B TyagiICISSNews Letter May 11.doc
We need to keep control systems safe and secure, and to help minimize the chance
       that a cyber attack could severely damage or cripple infrastructures. We need to identify
       ways to reduce cyber vulnerabilities in process control and SCADA (Supervisory Control
       and Data Acquisition) Systems: to identify new types of security sensors for process
       control networks.

       There is real threat to SCADA from mischief mongers prowling in the web-world and the
       tech-savvy terrorist and Stuxnet is the most lethal combination!




Conclusion

While above are the main strategies for securing the assets of key infrastructure, constant
improvement and improvisation need to be carried out to make security measures reliable as
well as cost effective, as in present phase of economic melt-down no organization will take
decision with out working out the ROI (Return on investment).

Dedicated manpower ready to face the disaster would always be central consideration for any
security and disaster response plan. To keep them constantly motivated and updated is also
another prime responsibility of the Management as otherwise even the best plans are doomed
to fail. Only those will succeed in this sector who foresee and fore-plan and rehearse thereafter
their security and emergency response plans!


                                  During a bank heist the Chief told the Sgt. to cover all exits
                                  so the robbers could not get away. Later the Sgt. reports to
                                  the chief. “Sorry sir but they got away.”


C:S B TyagiICISSNews Letter May 11.doc
The chief very disappointed says, “I told you to cover all Exits.”
                          "I did” replied the Sgt. “…but they got away through the Entrance"




                                             'One of the tests of leadership is
                                           the ability to recognise a problem
                                   before it becomes an emergency'




 "Have you ever observed that we pay much more attention to a
 wise passage when it is quoted than when we read it in the
 original author?"


        Suggestions & feedback may be sent to us on e-mail: sbtyagi1958@gmail.com


P.S. - If you don't like to receive our newsletter, we apologize for bothering you. Please
let us know your mail address and we will move it out from our contact list, thank you!




                                               Digitally signed by Capt S B Tyagi,
                    Capt S B Tyagi, COAS' CC*, FISM, CSC, CSP
                                    DN: CN = Capt S B Tyagi, COAS'
                    COAS' CC*,      CC*, FISM, CSC, CSP, C = IN, O =
                                    GAIL (India) Limited, OU = Deputy
                    FISM, CSC, CSP General Manager 15:18:10 +05'30'
                                    Date: 2011.05.06
                                                       (Security)




C:S B TyagiICISSNews Letter May 11.doc

Weitere ähnliche Inhalte

Was ist angesagt?

The Physical Security_&_Risk_Management_book
The Physical Security_&_Risk_Management_bookThe Physical Security_&_Risk_Management_book
The Physical Security_&_Risk_Management_bookJAMES E. McDONALD, PSNA
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnelDhani Ahmad
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle ManagementBarry Caplin
 
2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew RosenquistMatthew Rosenquist
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningKeyaan Williams
 
CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19IBM Sverige
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a SciencePankaj Rane
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Janghyuck Choi
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk MitigationMukalele Rogers
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectIOSR Journals
 
Simplifying the data privacy governance quagmire building automated privacy ...
Simplifying the data privacy governance quagmire  building automated privacy ...Simplifying the data privacy governance quagmire  building automated privacy ...
Simplifying the data privacy governance quagmire building automated privacy ...Avinash Ramineni
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew RosenquistMatthew Rosenquist
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Security in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everSecurity in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everEC-Council
 

Was ist angesagt? (20)

The Physical Security_&_Risk_Management_book
The Physical Security_&_Risk_Management_bookThe Physical Security_&_Risk_Management_book
The Physical Security_&_Risk_Management_book
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle Management
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
 
2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic Planning
 
CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19
 
The need for security
The need for securityThe need for security
The need for security
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
 
Become CISSP Certified
Become CISSP CertifiedBecome CISSP Certified
Become CISSP Certified
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and Prospect
 
Simplifying the data privacy governance quagmire building automated privacy ...
Simplifying the data privacy governance quagmire  building automated privacy ...Simplifying the data privacy governance quagmire  building automated privacy ...
Simplifying the data privacy governance quagmire building automated privacy ...
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Security in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everSecurity in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than ever
 
Information Security
Information SecurityInformation Security
Information Security
 

Ähnlich wie News letter May 11

IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - GuidelinesPedro Espinosa
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020Jessica Graf
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docxeugeniadean34240
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Global Knowledge Training
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
News letter June 11
News letter June 11News letter June 11
News letter June 11captsbtyagi
 
Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Monica Rivera
 
Security Information and Risk Management.pptx
Security Information and Risk Management.pptxSecurity Information and Risk Management.pptx
Security Information and Risk Management.pptxDaveCalapis3
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraLuke Farrell
 
Information Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelKoen Maris
 
Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxbartholomeocoombs
 
Influential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookInfluential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookCIO Look Magazine
 
Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Professionamiable_indian
 
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...Mighty Guides, Inc.
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1securityAnne Starr
 
Protecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdfProtecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdfkelyn Technology
 
SBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesSBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesEMC
 

Ähnlich wie News letter May 11 (20)

IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
News letter June 11
News letter June 11News letter June 11
News letter June 11
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )
 
Security Information and Risk Management.pptx
Security Information and Risk Management.pptxSecurity Information and Risk Management.pptx
Security Information and Risk Management.pptx
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
 
Information Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive Level
 
Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docx
 
Influential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookInfluential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO Look
 
Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Profession
 
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1security
 
Protecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdfProtecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdf
 
SBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesSBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing Processes
 

Mehr von captsbtyagi

'Computer Hardware' - A PPT good for summer home work for Class VIII
'Computer Hardware' - A PPT good for summer home work for Class VIII'Computer Hardware' - A PPT good for summer home work for Class VIII
'Computer Hardware' - A PPT good for summer home work for Class VIIIcaptsbtyagi
 
Background screening
Background screeningBackground screening
Background screeningcaptsbtyagi
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11captsbtyagi
 
News letter jan 11
News letter jan 11News letter jan 11
News letter jan 11captsbtyagi
 
News letter jan 12
News letter jan 12News letter jan 12
News letter jan 12captsbtyagi
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11captsbtyagi
 
News letter July 11
News letter July 11News letter July 11
News letter July 11captsbtyagi
 
News letter april 11
News letter april 11News letter april 11
News letter april 11captsbtyagi
 
ICSSM Newsletter Dec11
ICSSM Newsletter Dec11ICSSM Newsletter Dec11
ICSSM Newsletter Dec11captsbtyagi
 
News letter oct 11
News letter oct 11News letter oct 11
News letter oct 11captsbtyagi
 
Newsletter sept 11
Newsletter sept 11Newsletter sept 11
Newsletter sept 11captsbtyagi
 
Contingency planning train
Contingency planning  trainContingency planning  train
Contingency planning traincaptsbtyagi
 

Mehr von captsbtyagi (13)

'Computer Hardware' - A PPT good for summer home work for Class VIII
'Computer Hardware' - A PPT good for summer home work for Class VIII'Computer Hardware' - A PPT good for summer home work for Class VIII
'Computer Hardware' - A PPT good for summer home work for Class VIII
 
Background screening
Background screeningBackground screening
Background screening
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11
 
News letter jan 11
News letter jan 11News letter jan 11
News letter jan 11
 
News letter jan 12
News letter jan 12News letter jan 12
News letter jan 12
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11
 
News letter July 11
News letter July 11News letter July 11
News letter July 11
 
News letter april 11
News letter april 11News letter april 11
News letter april 11
 
ICSSM Newsletter Dec11
ICSSM Newsletter Dec11ICSSM Newsletter Dec11
ICSSM Newsletter Dec11
 
News letter oct 11
News letter oct 11News letter oct 11
News letter oct 11
 
Newsletter sept 11
Newsletter sept 11Newsletter sept 11
Newsletter sept 11
 
Contingency planning train
Contingency planning  trainContingency planning  train
Contingency planning train
 
Child abduction
Child abductionChild abduction
Child abduction
 

Kürzlich hochgeladen

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Kürzlich hochgeladen (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

News letter May 11

  • 1. Newsletter: May 2011 Let’s professionalize the professionals…  http://www.wix.com/sbtyagi/iciss Security and safety are important parts of life and cannot be ignored. Without a sense of security, one cannot hope to lead a stress free and happy life. If you regularly feel threatened or exposed to certain negative influences of situations, you can never have a relaxed or calm state of mind. You will always be on edge and before long may even be headed for a possible nervous breakdown if you are not careful enough. Thus it is very important not to take these factors lightly. Even for a child to prosper and showcase proper psychological growth and development, it is extremely important that he/she feels nurtured and secure. You cannot concentrate on any other area in life if you feel vulnerable or defenseless in your everyday life. So, you need to set some time to think about your safety in daily situations and come up with suitable action plans to mitigate the threat levels that may arise at any moment. It is important not to be lackadaisical about these issues. Remaining secure whenever possible can also help in bringing down the possibility of falling prey to unwanted accidents or unfortunate circumstances considerably. Even if you take a few simple, easy steps to ensure your safety, you can end up saving your own life as well as that of other people who may be around you. Life is the best gift that we have and it is very important to guard it and to keep ourselves safe from disasters that can be avoided. Self preservation is one of the most important biological goals for humans and this can be brought about only if you take steps to keep yourself secure enough. If we get too lazy when it comes to our security and do not give it much thought or attention, we can end up unnecessarily hurting or injuring ourselves. If we give high importance to security, we can significantly lower the adverse effects of a disaster even though we may not be able to prevent it. All it requires to remain secure is the investment of a little time. You should consider all kinds of scenarios that may affect you at the different places that you visit habitually. All the threats arising at these places should be thoroughly examined and a possible reaction should be determined if such incidents do take place in the future. Being prepared for any eventuality is enough to help you remain secure. Putting a little thought into developing the suitable ways to behave in case of accidents or adverse situations is enough to guarantee your safety. Today’s society is full of anti social elements that can disrupt your lives if you do not remain alert enough. The increasing rate of crime across most cities of the world also makes it necessary to beef up on your security. Apart from this, it is a well known fact that natural disasters can also occur at any time without warning and if you are prepared for them, you are more likely to remain secure. Capt S B Tyagi For ICISS C:S B TyagiICISSNews Letter May 11.doc
  • 2. This article was created by a professional writer and edited by experienced copy editors, both qualified members of the Demand Media Studios community. All articles go through an editorial process that includes subject matter guidelines, plagiarism review, fact-checking, and other steps in effort to provide reliable information. A data security officer maintains an information systems structure or operations. The position of data security officer is a challenging occupation. According to the Occupational Outlook Handbook, 2011 Edition, the job outlook for a data security officer is expected to grow by 17 percent over the 2008-2018 decade. An individual considering a career as a data security officer must have technical expertise with the ability to rapidly solve problems that arise in an information processing environment. System Security o Data security officers are responsible for the physical security of system assets for a business or organization, including access to controlled areas that process data and information. Oversight includes the physical security of computer systems, software, and hardware components and media devices. The data security officer also creates and implements security policies concerning these resources for personnel to follow. C:S B TyagiICISSNews Letter May 11.doc
  • 3. The data security officer creates the information system disaster recovery plan for the care of system assets during and after a disaster to the data facility. Approves Software Changes o When there is a major software change or release, the data security officer communicates changes to management and personnel through memorandum, release meetings or verification by letter to other departments and branches. The data officer has the responsibility to review the changes and state the impact of those changes on certain programs on the system. Version numbers which update software processes are implemented by the data officer. Establish Security Profiles o Every business or organization using an information system to process data should have security controls for software access at all levels of system processing, which supports separation of duties. Separation of duties is the concept of a single individual having control over a transaction from "start to finish." The data officer's responsibility is to create policies and profiles that control user access to the applications by establishing user ID and passwords. The officer also creates layers of security within the information systems environment as a check and balance system against user ID and passwords. Security layers that are created limit risk of faulty processing and security breaches. Audits System Tables and Catalogs o System tables and catalogs contain database records and program routines that maintain the integrity of database structures, tables and records. The data security officer is responsible for the integrity of all data structures that exist in an information system. Period audits are performed by the data security officer to examine record structures and apply correction if there are any errors. In a systems programming environment, the data officer checks the system catalog of programs and files to ensure software development programs are separated from live programs that are running on the same system. Educational Requirements and Salary o Obtaining a bachelor's degree in information systems management with a depth in computer science can help an individual seeking a career in data management. The occupation is a technical career field and programming courses will help candidates understand data structures. The salary for a data security officer with five to nine years of experience ranges from $58,474 to $82,025 in European countries. C:S B TyagiICISSNews Letter May 11.doc
  • 4. What are the Key Infrastructures? Transport, communication and Energy sectors have great role in nation building and economical prosperity. Energy security draws attention of planners and saboteurs world over. Focus is on Energy Security which is core of Key Infrastructures and also very vulnerable. US has defined the Key Infrastructures as - “Systems and assets, whether physical or virtual, so vital to the country that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.” - US Patriot Act There is no definition of this term but broadly it is defined as “Key infrastructures are those, damage to which will adversely affect Nation’s Defense preparedness and Economy. “ Key infrastructures are those, damage to which will adversely affect Nations defense preparedness and economy. Following are the areas falling in the category of ‘Key or Critical Infrastructure – Energy infrastructures – nuclear, hydro, coal and gas Information & communication infrastructures Water resources Financial institutions Transport infrastructures Space – development and research C:S B TyagiICISSNews Letter May 11.doc
  • 5. Food – supply chain Health infrastructures Because of the private ownership of major elements of critical infrastructure any security and control measures will (almost by definition) require the involvement of both private and public interests. However the national authorities will often have sole competence in the area. India’s Economic Rise & Infrastructure Best consideration for Indian economical development will require following steps: Development of infrastructures to cope with the growing demand; Policy for sustainable growth and up-gradation of existing assets. Ensuring availability of resources through domestic efforts or through long term supply agreements or through buying assets abroad; An elaborate network for easy availability for domestic stakeholders; Above all, institutional and policy mechanisms to ensure an equitable usages both in terms of reaching underdeveloped regions and in terms of the economically backward sections of the Indian society. Major Areas of Security Concerns The creation of any key-infrastructure is a major logistical operation from locating and investigating new sites to the movement of personnel and establishment of facilities. It takes an enormous amount of resources to establish such sites and all the operators have to rely on a sound cloak of security to prevent theft of equipment, extortion, sabotage and kidnapping of work force. There are following major areas of security concerns – • Security of survey parties and their equipments (even explosives!) • Land acquisition and establishing camp sites: Pre-camp: armed / static security • Security during movement of essential equipments and key personnel • Travel protection of executive and employees • Transportation of heavy machinery and raw material - rail, air & sea • Commencement of construction activities – labor unrest, law-and-order • Establishing early oil / gas collection centers and security thereof • Security of off-shore platforms, receiving terminals, dispatch terminals, compressor stations etc. • Security of larger installations such as refineries, LPG plants and petrochemical complexes • Security of supply chain – storage / warehouse, rail / road transportation • Intelligence gathering and disaster planning • Constitution of Emergency Response Teams C:S B TyagiICISSNews Letter May 11.doc
  • 6. For the Key Infrastructures such as power, oil and gas, security is always a major concern as this sector world over has high probability and vulnerability from terrorist attacks and sabotage. Their operations also have high criticality. Strategies for Reliable Security of Key Infrastructures Following are the specifics of the security management of this sector - Optimizing Assets through Centralized Command & Control Integrated command and control systems must be positioned to provide an integrated solution, which captures and validates data that can be used throughout the organization during normal operation, whilst providing relevant, useful information in difficult and emergency situations. This approach will enable operators of critical national infrastructure to optimize their assets whilst maintaining their investment in legacy systems. New developments in technology can improve the security of personnel and assets and provide enhanced operational capabilities. Biometric Integrated Safe System of Work Integrated Safe System of Work (ISSoW) is a key tool in ensuring the safe operation of Oil and Gas installations. However, such systems can only be truly effective if user identities can be quickly validated and definitively authenticated. For this to be implemented in practice in providing advanced authentication and identity management, the biometrics based access control solutions are found to be very reliable. There are many solutions available solution where worker identities can be positively and accurately registered, identified and managed securely throughout their lifecycle. High Accuracy Real Time Personnel & Asset Location There is need to have a system that improves the safety of workers in hazardous environments and helps to improve the effectiveness of emergency response measures. There are systems available which can locate an individual, or asset, to within 1 meter in 3D (e.g. in a multi-storey/multi-level facility) and it can do this up to 1km from a base station. The system provides a position update every second and, for example, could be used to track a lone worker or road tanker's progress through a plant or ensure that personnel are moving towards the correct muster points in an emergency. Such system do not require large amount of infrastructure or extensive cabling and is therefore easily installed in an existing plant at minimal cost. Situational Awareness - Securely Integrating Site Data This aspect deals with the need to simply and securely integrate data from a wide variety of systems to show site leaders and managers the overall condition of their site - and what is happening on it. This capability brings together data from operational, security and work C:S B TyagiICISSNews Letter May 11.doc
  • 7. management systems and merges this private data with public information from the internet to provide a complete picture. By using underlying open data architecture together with security protection system, it can bring these data sources together and share them securely among multiple disparate user groups, and at different locations, whilst ensuring data validity, security, and privacy. As well as the complete picture, it can also provide custom views for users such as maintenance teams, emergency services and even the media and general public in the event of a major incident. Air traffic Rogue aircraft can endanger the security of any flights in its vicinity of the flight path! Due to loose security controls at the take-off points unscreened passengers can board it with unimaginable explosives and ammunition! Even this is not needed as aircraft in collision path itself is big danger to other aircraft. Security of Aircraft in the future environment therefore must begin with the aim of improving security on commercial aircraft. It must address classic hijacking situations, September 11-type scenarios and futuristic scenarios involving electronic jamming and hacking of computer systems. Additionally it must address technical issues such as onboard-threat detection, threat assessment and response management plus flight protection. Security of Offshore Platforms Off-shore platforms are highly vulnerable, high risk installations having high probability of attacks of terrorist which may be equipped with some of the best technical capabilities. Somalian sea-pirates have well demonstrated that now-a-days any one can get any thing provided they have sufficient funds! It is therefore very important that beside sturdy infrastructure security and the security risk management mechanism including airborne, maritime and ground surveillance, these platforms have very reliable and impregnable communication and cyber security measures. Tracking and positioning of manpower and material is equally important. To devise an action plan to combat attacks on its offshore installations, potential terrorist- related crisis situations should be incorporated in the CMP (Crisis Management Plan) along with the response mechanisms/capacity building required to handle such situations. The Maritime Sector The International Ship and Port Facility Security, ISPS code, was introduced in July 2004. It requires ports and vessels to show that they have put adequate security systems in place - and vessels to show that they have been calling only at certified ports. The purpose of the code is to provide a standardized, consistent framework for evaluating risk. Vessel Automatic Tracking and Monitoring System for the security of large oil infrastructures in high sea areas assume greater importance to rule out attack capabilities of Somalian like out- fits which might draw their attention to the vulnerabilities of these assets. C:S B TyagiICISSNews Letter May 11.doc
  • 8. Cyberspace The EU has set up a task force to explore what its 25 member states are doing to combat cyber-threats against critical infrastructure. As part of the EU's Critical Information Infrastructure Research Coordination, CI2RCO project, the task force aims to identify research groups and programs focused on IT security in critical infrastructures, such as telecommunications networks and power grids. The scope of the cooperation goes beyond the EU; the task force also wants to include USA, Canada, Australia and Russia. India with its strong IT workforce, known world-over for its prowess must join such cooperative and collaborative efforts! Robust, Secure, Global Communication Solutions This capability calls for seamlessly connecting all oil & gas installations of an organization and on more higher level , of the Nation by providing highly available, robust, secure, integrated communication networks for critical operational systems. A number of communication solutions are available which provide robust connectivity and communication helpful for protection of assets and personnel in environments where a high standard of inherent safety is a mandatory requirement. There are resilient telecommunications networks such as Broadband Global Area Network (BGAN), which allow for simultaneous voice & data communications and secure access to applications from almost anywhere in the world. Securing Supervisory Control Systems Supervisory Control and Data Acquisition (SCADA) systems and other similar control systems are widely used by utilities and industries that are considered critical to the functioning of countries around the world. The Operations, Safety, Security, and IT decision-makers of Key Infrastructures, especially oil & gas, power generation and transmission and nuclear energy are well advised to pay attention to following aspects – More and more reliability on Local Area Network (LAN), Wide Area Network (WAN) and Broadband Global Area Network (BGAN) brings increased threats to operations of organizations using them. Threats to SCADA are Malware, Insider, Hacker and Terrorists. The networks are susceptible to attacks aimed to disrupt and destroy them. Such an attack by viruses, worms or other forms of cyber-terrorism on nuclear, oil and gas industry process control networks and related systems could destabilize the national economy and defense preparedness. C:S B TyagiICISSNews Letter May 11.doc
  • 9. We need to keep control systems safe and secure, and to help minimize the chance that a cyber attack could severely damage or cripple infrastructures. We need to identify ways to reduce cyber vulnerabilities in process control and SCADA (Supervisory Control and Data Acquisition) Systems: to identify new types of security sensors for process control networks. There is real threat to SCADA from mischief mongers prowling in the web-world and the tech-savvy terrorist and Stuxnet is the most lethal combination! Conclusion While above are the main strategies for securing the assets of key infrastructure, constant improvement and improvisation need to be carried out to make security measures reliable as well as cost effective, as in present phase of economic melt-down no organization will take decision with out working out the ROI (Return on investment). Dedicated manpower ready to face the disaster would always be central consideration for any security and disaster response plan. To keep them constantly motivated and updated is also another prime responsibility of the Management as otherwise even the best plans are doomed to fail. Only those will succeed in this sector who foresee and fore-plan and rehearse thereafter their security and emergency response plans! During a bank heist the Chief told the Sgt. to cover all exits so the robbers could not get away. Later the Sgt. reports to the chief. “Sorry sir but they got away.” C:S B TyagiICISSNews Letter May 11.doc
  • 10. The chief very disappointed says, “I told you to cover all Exits.” "I did” replied the Sgt. “…but they got away through the Entrance" 'One of the tests of leadership is the ability to recognise a problem before it becomes an emergency' "Have you ever observed that we pay much more attention to a wise passage when it is quoted than when we read it in the original author?" Suggestions & feedback may be sent to us on e-mail: sbtyagi1958@gmail.com P.S. - If you don't like to receive our newsletter, we apologize for bothering you. Please let us know your mail address and we will move it out from our contact list, thank you! Digitally signed by Capt S B Tyagi, Capt S B Tyagi, COAS' CC*, FISM, CSC, CSP DN: CN = Capt S B Tyagi, COAS' COAS' CC*, CC*, FISM, CSC, CSP, C = IN, O = GAIL (India) Limited, OU = Deputy FISM, CSC, CSP General Manager 15:18:10 +05'30' Date: 2011.05.06 (Security) C:S B TyagiICISSNews Letter May 11.doc