Access "IT network security: Securing the summer Olympics"
This article is part of the July 2004 issue of Olympic trials: Securing the summer games
Physical security will be highly visible when the summer Olympic games open in Athens Aug. 13, but, behind the scenes, a small army of IT professionals will be working to guard against digital intrusions that could enable or amplify a real-world attack. "It's not like other projects where you can try again after having difficulty the first time," said Jean Chevallier, who is charged with securing the Olympic IT infrastructure. "You can't do a 'redo' here after the start date. And the games cannot happen without your systems in place." As executive VP for the Olympic Games Program at Atos Origin, the French company contracted to run the Olympics' IT infrastructure, Chevallier knows that the entire world will have security on its mind during the Olympic fortnight. "The biggest challenge is speed," said Bruce Schneier, CTO of Counterpane Internet Security. "Security is a process, and the Olympics happen too quickly for a process to develop. The entire network needs to come together quickly, be used extensively and then disappear. This makes it harder to get ... Access >>>
Premium Content for Free.
IT network security: Securing the summer Olympics
by Dennis McCafferty, Contributing Writer
While physical security at the Olympics is paramount, information security for its vast IT network is also a major challenge.
Acceptable use policies will minimize email risks
by George Wrenn, CISSP
Learn why setting comprehensive email acceptable use policies can help minimize email risks and secure your email applications.
How to prevent phishing scams and protect customers
by Nalneesh Gaur
In this tip, Web security guru, Nalneesh Gaur examines how hackers are using phishing scams to exploit financial sectors of the industry, why you should care and what you can do to prevent these attacks.
- IT network security: Securing the summer Olympics by Dennis McCafferty, Contributing Writer
USB security tokens may not be as secure as you think
by Tom Bowers, Contributor
USB tokens aren't as strong as you think. Multifactor authentication is meaningless when the supporting software is insecure.
Will intrusion prevention systems live up the hype?
Will intrusion prevention ever live up to its promise?
- USB security tokens may not be as secure as you think by Tom Bowers, Contributor
The Fulda Gap and defense in depth strategy
Enterprise security managers need to think like warriors when it comes to protecting their systems. Lawrence Walsh explains why.
- The Fulda Gap and defense in depth strategy
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...