Application Opportunity for Internet 0 in Risk Management Barry Wessler October 1, 2004.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Facilities Management and Design Chapter 4 Safety and Security systems.
Emergency Preparedness and Response
Chapter 7: Physical & Environmental Security
Emergency Action Plans
Protecting the Public, Astronauts and Pilots, the NASA Workforce, and High-Value Equipment and Property Mission Success Starts With Safety “September 11th.
Computer Security Computer Security is defined as:
Step two in developing a food defense plan.  Foot and Mouth Disease (FMD)  Spring 2001 outbreak in UK  Complete ban on sale of British cattle, pigs.
FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates.
1 Introduction to Security Chapter 15 Institutional Security.
Safe Working Practices - Security Security measures in leisure facilities Identify potential security hazards for the location Dependent upon operation,
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Copyright © Center for Systems Security and Information Assurance Lesson Seven Physical Security.
Stephen S. Yau CSE 465 & CSE591, Fall Physical Security for Information Systems.
Information Security Principles and Practices
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Microsoft Technology Associate
Information Systems Security Physical Security Domain #4.
Developing a Chemical Risk Management Program
Chapter 7: Assuring Safety and Security in Healthcare Institutions
Physical Security Chapter 9.
AMARI AIR BASE AT/FP EVAL 9 JUNE (No photos taken due to tight security)
Protecting your Employees and Securing your Mail Center.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
TM Foundations of Real Estate Management BOMA International Module 5: Putting it All Together Security ® ®
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Understanding Security Layers
Capistrano Unified School District School Safety March 8, 2013.
1 1.H.4 Emergency and Evacuation Procedures Training.
Chapter 6.  Natural environmental threats  Supply system threats  Manmade threats  Politically motivated threats.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Physical Security “Least sexy of the 10 domains but the best firewall in the world will not stand up to a well placed brick.”
“ I once stayed at an airport hotel in New Jersey. It was night when I got to my room and I was amazed at the bolts and chains and the amount of security.
Chapter 15 Industrial Security. Loss Specific to Industry  Industrial losses frequently include:  Tools.  Materials.  Supplies.  Products.  Pallets.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
PANTHER SECURITY AND PRIVATE INVESTIGATION Security is degree of protection against danger, damage, loss and crime.
Preparing for Disasters General Liability. Introduction  The one coverage that provides you and your business the most protection is General Liability.
Chapter 18 Institutional Security. Special Security Institutions  Hospitals and other health care facilities.  Educational institutions.  Libraries.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
ALARM MONITORING SERVICE
Lesson 4 Physical Security - Motion Sensor - Passive Ultrasonic Sensor - Photoelectric System - Ultrasonic - Ultrasonic Motion Sensor - Vibration Sensor.
Add name of trust / organisation in box 1 and name of trainer in box 2. Delete THIS box.
Physical (Environmental) Security
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
UNDP Offices in the Field Physical Security Standards  MOSS provides uniform security standards for UN offices in capitals and the field – read it. 
Chapter 19 Other Applications of Security at Work.
Southeast Financial Center
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
What you will learn in this session 1.The characteristics of fire, smoke and toxic fumes 2.Fire hazards involved in the working environment 3.Significant.
SITE EMERGENCY RESPONSE All sites are different. Different chemicals. Different configurations. Advance planning and training is necessary to protect worker.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Access Control Jeff Wicklund Computer Security Fall 2013.
The Safety of Exhibits. The Safety of Objects The Safety of People.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 13 – Physical and.
1 Regulatory Reform (Fire Safety) Order 2005: An Insurer’s View Mark Newton Property Technical Manager Royal & Sunalliance Insurance.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Services Delivery in Emergencies
NETW4005 COMPUTER SECURITY A
Be prepared How to face crises Safety in and around the building.
Understanding Security Layers
Objectives Telecommunications and Network Physical and Personnel
Physical Security.
Presentation transcript:

Application Opportunity for Internet 0 in Risk Management Barry Wessler October 1, 2004

Risk Management  Risk Assessment  Risk Mitigation  Risk Transfer  Risk Recovery Opportunity area for Internet 0

RM Application Areas  Financial  Operational  Physical  Information Opportunity area for Internet 0

Risk Assessment  Assets  Losses  Threats  Vulnerabilities  Controls/Safeguards Risk=Asset  Loss  Threat  Vulnerability  Control  Risk generally stated as annual loss expectancy Opportunity area for Internet 0

Assets  Aircraft  Ammunition/Explosives  Art/Paintings  Business Market Share  Cash  Communications Equipment  Computer Hardware  Construction Equipment  Controlled Substances  Customers  Electronic Equipment  Evidence  Facilities/Buildings  Food/Water/Perishables  Gold/Silver/Gems  Intangibles  Large Weapons  Manufacturing Equipment  Negotiable Instruments  Nuclear Materials  Office Equipment  Personnel  Petroleum/Oils  Physical Inventory/Product  Production Resources  Proprietary Information  Real Property  Security System  Small Weapons  Supplies/Parts  Uniform/Special Personnel Equipment  Utilities  Vehicles  Watercraft

Losses  Disruption  Direct Loss  Compromise  Intangibles  Personal Injury/Loss of Life  Indirect Loss  Theft

Threats  Accident/Fatal  Accident/Injury  Activist  Arson  Assault, Aggravated  Assault, Sexual  Assault, Simple  Biological Contamination  Blackmail/Extortion  Bomb Threats  Burglary/Break In  Chemical Gas  Cold/Frost/Snow  Communications Loss  Earthquakes  Electromagnetic Interference  Espionage  Explosions Major  Explosions Minor/Mail-Bomb  Fire, False Alarm  Fire, Major  Fire, Minor  Flooding/Water Damage  Homicide  Kidnapping  Power Loss  Riot/Civil Disorder  Robbery  Sabotage/Disgruntled Employee  Sabotage/Terrorist  Stalking  Storms/Hurricanes/Tornadoes  Theft - Company Property  Theft - Personal Property  Theft - Services  Unauthorized Disclosure  Vandalism

Vulnerabilities  Barriers  Bomb Detection & Control  Cleaning/Trash Removal  Communications  Communications & Utility Closets  Computer Systems Security  Construction/Architecture  Contingency/Emergency Planning  Contingency/Incidence Response  Controlled Areas  Data Backup/Storage  Doors  Electrical Power  Emergency Evacuation  Emergency Medical  Entry Control  Fire Alarms & Detection  Fire Prevention  Fire Suppression  Illumination  Information/Investigation Process  Intrusion Detection  Landscape/Vegetation  Locks/Key Control  Management/Organization  Marine Access Control  Observation  Package Control  Parking Lot/Garage  Personnel Control  Personnel Screening  Property Management  Roofs  Safety  Security Officers  Security Procedures/Policy/Training  Security System  Shipping and Receiving  Vaults/Safes  Vehicle Control  Visitor Control  Water Drainage/Extraction  Windows

Safeguards  Alarm Beacon/Audible  Alternate Feeds  Audible Detectors  Automatic Suppression  Battery/Backup  Berms  Biometric Access  Bomb Disposal Equipment  Bomb Threat Procedures  Brick Walls  Buffer/Control Zone  Bullet Proof Glass  CCTV Cameras  CCTV Motion Detection  Chain Link Fence  Combination Control  Command and Control Center  Concertina Wire  Construction/Design  Contingency Planning  Contract Specifications  Counter-Surveillance Equipment  Detection  Differential Pressure  Disaster Recovery  Document Destruction Equipment  Drains  Electric Field Detectors  Emergency Generator  Emergency Lighting  Entry Control  Escorts  Exit Signs & Evacuation Routes  Explosives Detection  Explosives Identification  Fiber-Optic Cable  Flammable Storage Container  Gas/Radioactive Detectors  Gates  Guard Accessories  Guard Shack/Tower  Identification - Marking  Incident Notification  Incident Response  Information Handling  Infrared Beam  Infrared Motion Detectors  Inquiry/Investigation  Insurance/Bonding  Integrated System  Jersey Walls  Key Card  Key Control/Inventory  Keys  Lighting  Linguist/Sign Language  Locking Hardware  Logs  Magnetic  Magnetic/Contact Switches  Man-Trap  Marshal/Brigade  Medical Incident Response  Metal Detectors  Micro-Phonic Cable  Microwave Beam  Microwave Motion Detectors  Moisture Detection  Night Vision Instruments  Organization/Security  Package Entry & Control  Panic Alarm/Call Stations  Patrol Vehicles  Patrol/Tour Reporting  Personnel Control  Personnel Identification - Badges  Personnel Screening  Personnel Termination  Photo Electric Detectors  Policy  Policy/Procedure  Portable Extinguishers  Posts/Pillars  Pressure Mats  Problem Resolution Process  Proximity Detectors  Public Announcement System  Pumps  Radar  Radio/Phone/Pager  Removal  Revolving Doors  Safety Inspection/Test  Safety Manual  Screening  Security Manual  Security Policy  Security Staff  Seismic  Shatter Protection of Windows  Shipping and Receiving  Simulation Exercises  Solid Core Doors  Steel Bars/Grills  Steel Mesh Walls  Surge Protectors & Filters  Tank Trap  Taut-Wire  Testing  Testing Pumps/Drains/Detection  Testing/Inspection  Training  Training/Operation  Turnstiles  Ultrasonic Motion Detectors  UPS  UPS Dedicated  Vaults/Safes  Vehicle Barriers  Vehicle Control  Vibration Detectors  Vibration Sensor  Warning Signs  Water  Water Supply  Weapons  X-Ray

Internet 0 and RM  Pick one or a set of Safeguards  Use Internet 0 principles to make the Safeguard faster, smarter, cheaper, more reliable, etc.  Better yet, invent new Safeguards possible only in a rich communications environment  The Risk Assessment will tell you what the ROI will be in a particular Asset/Threat environment