Access your Pro+ Content below.
IT network security: Securing the summer Olympics
This article is part of the Information Security magazine issue of July 2004
Physical security will be highly visible when the summer Olympic games open in Athens Aug. 13, but, behind the scenes, a small army of IT professionals will be working to guard against digital intrusions that could enable or amplify a real-world attack. "It's not like other projects where you can try again after having difficulty the first time," said Jean Chevallier, who is charged with securing the Olympic IT infrastructure. "You can't do a 'redo' here after the start date. And the games cannot happen without your systems in place." As executive VP for the Olympic Games Program at Atos Origin, the French company contracted to run the Olympics' IT infrastructure, Chevallier knows that the entire world will have security on its mind during the Olympic fortnight. "The biggest challenge is speed," said Bruce Schneier, CTO of Counterpane Internet Security. "Security is a process, and the Olympics happen too quickly for a process to develop. The entire network needs to come together quickly, be used extensively and then disappear. ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
While physical security at the Olympics is paramount, information security for its vast IT network is also a major challenge.
USB tokens aren't as strong as you think. Multifactor authentication is meaningless when the supporting software is insecure.
Learn why setting comprehensive email acceptable use policies can help minimize email risks and secure your email applications.
Will intrusion prevention ever live up to its promise?
In this tip, Web security guru, Nalneesh Gaur examines how hackers are using phishing scams to exploit financial sectors of the industry, why you should care and what you can do to prevent these attacks.
Columns in this issue
Enterprise security managers need to think like warriors when it comes to protecting their systems. Lawrence Walsh explains why.