PRO+ Premium Content/Information Security magazine
Access your Pro+ Content below.
IT network security: Securing the summer Olympics

This article is part of the Information Security magazine issue of July 2004
Physical security will be highly visible when the summer Olympic games open in Athens Aug. 13, but, behind the scenes, a small army of IT professionals will be working to guard against digital intrusions that could enable or amplify a real-world attack. "It's not like other projects where you can try again after having difficulty the first time," said Jean Chevallier, who is charged with securing the Olympic IT infrastructure. "You can't do a 'redo' here after the start date. And the games cannot happen without your systems in place." As executive VP for the Olympic Games Program at Atos Origin, the French company contracted to run the Olympics' IT infrastructure, Chevallier knows that the entire world will have security on its mind during the Olympic fortnight. "The biggest challenge is speed," said Bruce Schneier, CTO of Counterpane Internet Security. "Security is a process, and the Olympics happen too quickly for a process to develop. The entire network needs to come together quickly, be used extensively and then disappear. ...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Features in this issue
-
IT network security: Securing the summer Olympics
While physical security at the Olympics is paramount, information security for its vast IT network is also a major challenge.
-
USB security tokens may not be as secure as you think
USB tokens aren't as strong as you think. Multifactor authentication is meaningless when the supporting software is insecure.
-
Will intrusion prevention systems live up to the hype?
Will intrusion prevention ever live up to its promise?
-
How to prevent phishing scams and protect customers
In this tip, Web security guru, Nalneesh Gaur examines how hackers are using phishing scams to exploit financial sectors of the industry, why you should care and what you can do to prevent these attacks.
Columns in this issue
-
The Fulda Gap and defense-in-depth strategy
Enterprise security managers need to think like warriors when it comes to protecting their systems. Lawrence Walsh explains why.