Electronic Monitoring Systems NAGRA 2006 CASINO GAMING John Briney CIO Arizona Department of Gaming.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Basic Concepts of a Computer Network
NAGRA 2006 Scottsdale, AZ The New Mexico Model NEW MEXICO GAMING CONTROL BOARD  Established By Statute In 1997 Agreed Upon Relationship Between Compacts.
OVERVIEW TEAM5 SOFTWARE The TEAM5 software manages personnel and test data for personal ESD grounding devices. Test and personnel data may be viewed/reported.
TITO Ticket In/Ticket Out
Auditing Concepts.
Gaming in Arizona Paul Bullis Courtney Moyah Geoffrey Gonsher
Information Systems Audit Program (cont.). PHYSICAL SECURITY CONTROLS.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
GLI Regulator Roundtable Feb 2008 Benefits for Regulators with the G2S Communication Protocol GLI Regulator’s Roundtable 2008.
Chapter 21 Successfully Implementing The Information System
Information Security Policies and Standards
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 5: Planning, Configuring, And Troubleshooting DHCP.
 Controls that provide security against internal and external threats  2 Types of access controls: › Physical controls › Logical controls.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 18-1 Accounting Information Systems 9 th Edition Marshall.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
1 RECORDS MANAGEMENT USING TRIM Presented by: Information Access Operations Shared Services BC Ministry of Citizens’ Services.
Security Guide for Interconnecting Information Technology Systems
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
SmartLog X 3 TEAM Basic SmartLog X 3 TEAM Basic DescoEMIT.com USER STATUS USER EDIT TEST LOG ADMIN TEST MACHINE SCHEDULE INSTALL System Requirements:
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Loss Control Program Compliance Audits An overview of the purpose and procedures of program auditing.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Client-Server & Peer-to-Peer Networks
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Make Sense of Your Imaging Costs. Make Sense of Your Imaging Costs Imaging Fleets Cost Unnecessary Time and Money You don’t know.
California State University, Northridge Certification Process Team B Carlos Guzman John Kramer Stacey LaMotte University of Phoenix.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
1 Operations Objectives April 21, Q
Note1 (Admi1) Overview of administering security.
ITGS Networks. ITGS Networks and components –Server computers normally have a higher specification than regular desktop computers because they must deal.
1 OGM Presentation for Your Hospital Today. 2 The Ongoing Maintenance Program The OGM Program Components.
G2E Session 4051 The Future of Electronic Gaming Devices; From Game-Centric to System Enabled to System-Centric September 20, 2002.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
3.3 Data Networks. Overview Identify the main differences between LAN and WAN. Identify the advantages of using a network over stand-alone computers.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
NETWORKING COMPONENTS lLTEC 4550 JGuadalupe. HUB -THIS IS A HARDWARE DEVICE THAT IS USED TO NETWORK MULTIPLE COMPUTERS TOGETHER. IT IS A CENTRAL CONNECTION.
GCSE ICT 3 rd Edition The system life cycle 18 The system life cycle is a series of stages that are worked through during the development of a new information.
Vending machine monitoring system Industry&Business &Government IT transformation.
Dr. Pipat Sookavatana. IT for Business Communication and Information Exchange Web access File and Printer Sharing Information Access Advertisement.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Integrating the Healthcare Enterprise The Integration Profiles: Basic Security Profile.
Managed IT Services JND Consulting Group LLC
Computer Technology: Your Need to Know Chapter 1 Slide 1.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Nexbase Invites You To Our Special Products
Auditing Concepts.
Critical Security Controls
Internal Control and Cash
UNIT 19 Data Security 2.
IS4550 Security Policies and Implementation
Computer-Based Processing: Developing an Audit Assessment Approach
Auditing your gaming floor Protecting your assets, minimizing compliance risk, empowering your operations Master Class.
County HIPAA Review All Rights Reserved 2002.
Network+ Guide to Networks, Fourth Edition
Creating a University IT Service Portfolio
PLANNING A SECURE BASELINE INSTALLATION
IT OPERATIONS Session 7.
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Electronic Monitoring Systems NAGRA 2006 CASINO GAMING John Briney CIO Arizona Department of Gaming

Electronic Monitoring Systems Session Objective: Present and discuss various approaches to implementing electronic monitoring systems.

Today we will look at : Today we will look at :  Arizona – online direct connect  Louisiana – online separate state model  New Mexico – online monitoring AND control  Wisconsin – periodic data extract Electronic Monitoring Systems

State Electronic Access System (SEAS) Arizona Department of Gaming

SEAS Compact Provisions  To provide real-time, read only access to online electronic game management systems in Phoenix & Tucson casinos.  To be implemented over a three year period  Will not result in the loss of normal accumulation of data elements.

SEAS Compact Provisions  Specific data elements:  Drop, coin in, coin out, bill count by denomination  Jackpots, machine fills, ticket in, ticket out, vouchers  Theoretical hold and hold variances (actual vs theoretical)  Door opens/closes (slot, drop, cash box, ticket)  No-communication errors

Online Electronic Game Management System Data Description Revenue Information Revenue Information  Electronic meter information received from slot machines:  Coin, bills, tickets, jackpots, fills  Actual information based on count of money, tickets and coin  Transactions from cashier’s cage  A hand-pay jackpot or fill transaction  Adjustments made by the casino’s revenue audit team  Cash box counted and assigned to wrong machine number

Online Electronic Game Management System Data Description Gaming Device Information Gaming Device Information  Number of gaming devices connected  Detailed gaming device information  Game name, EPROM info., install date, location, hold %  Gaming device events  door opens/closes (main, drop, logic board/area, cash box)  Unauthorized machine access (no employee card)  Communication errors  RAM errors  Power failures

SEAS Uses Limited number of authorized users Limited number of authorized users Gaming device tribal contribution verification Gaming device tribal contribution verification Gaming device compliance Gaming device compliance Compact Compliance Review (Internal Controls) Compact Compliance Review (Internal Controls)

Direct Connect Method Direct access from authorized ADG desktops. Direct access from authorized ADG desktops. Use existing system access methods. Use existing system access methods. Use standard system client software. Use standard system client software. Information viewed on-screen, or printed as a non- editable file at ADG. Information viewed on-screen, or printed as a non- editable file at ADG. Casino operator would establish and monitor ADG system access. Casino operator would establish and monitor ADG system access. ADG Desktop PC Casino Slot System Secure Network 2 Box Method – “Direct Connect”

Direct Connect Method - Diagram Game Management System Secure Network CASINO ADG Authorized ADG User Desktop Secure Network File Storage (separated by Tribe) Router Firewall Switch Network- attached storage Router VPN device Switch Intrusion Detection software DS1-Frame Relay Secure Network

Direct Connect Method (Aristocrat and IGS Advantage Variation) Game Management System Secure Network CASINO ADG State Terminal Server State Terminal Server Pass thru only – No Data Storage Terminal Server Router Firewall Switch Router VPN device Switch Authorized ADG User Desktop Secure Network File Storage (separated by Tribe) Secure Network- attached storage Network DS1-Frame Relay

Access Method Evaluation - Analysis Developed concept of directly accessing game management systems (direct connect) Developed concept of directly accessing game management systems (direct connect) Attended game management systems training Attended game management systems training Developed an understanding of system access for all three on-line electronic game management systems currently used by urban tribes (Aristocrat, IGT and Bally’s) Developed an understanding of system access for all three on-line electronic game management systems currently used by urban tribes (Aristocrat, IGT and Bally’s) Assessed technical feasibility of remotely accessing affected on-line electronic game management systems Assessed technical feasibility of remotely accessing affected on-line electronic game management systems Conducted direct-connect method proof of concept testing - accessing all three systems with good results Conducted direct-connect method proof of concept testing - accessing all three systems with good results

SEAS – Current Status Developing detailed system design in partnership with affected tribes Developing detailed system design in partnership with affected tribes Formulating baseline document that will guide operational processes and procedures Formulating baseline document that will guide operational processes and procedures Planning for operational testing and implementation Planning for operational testing and implementation Implementation timeline: 18 months Implementation timeline: 18 months

Questions??