THE MAGAZINE

November 2007

SPECIAL FOCUS: DISASTER PREPAREDNESS

Plus: Fire Safety • Data Protection • School Security

COVER STORY

No Lights, No Camera, Just Action

By E. Floyd Phelps, CPP

Emergency response and disaster management plans shouldn't be filed away until the day they are needed, but tested regularly to identify weaknesses and improve plans. Learn the eight major areas that must be tested and how to stage an exercise.

FEATURES

Can Your Business Withstand a Flu Pandemic?

By Lloyd F. Reese, CPP, CISSP

What businesses can do to prepare for the business continuity and security implications of a flu pandemic before it hits. (Online Exclusive)

It's All About the Data

By Ken Biery, Jr., CPP, CISSP, and Mike Hager, CISSP

Businesses need defense-in-depth strategies for protecting their sensitive data. They should start at the network perimeter and go from there to the operating system and applications and finally to the data itself.

The New Hall Monitor

By Ann Longmore-Etheridge

Buncombe County (North Carolina) Schools have installed survelliance that has helped it cut incidents of crime.

HOMELAND SECURITY

Worldwide Terrorism by Tactic

By Mike Moran

Quarterly Target, Region, and Tactic data on terrorist incidents from the MIPT Terrorism Knowledge Base

Odd Carry-ons or Probing Attack?

By Joseph Straw

Experts differ on whether suspicious carry-ons were a terrorist trial run, but they are encouraged that scanners caught the objects.

Fusion Centers Should Work with ISACs

By Joseph Straw

A lack of appreciation has led state intelligence fusion centers to ignore private sector owner-operators of critical infrastructure.

State Perspective - Pennsylvania

By Joseph Straw

Interview with James F. Powers, Pennsylvania’s director of Homeland Security

PRINT EDITION ONLY

Will Maritime ID Finally Set Sail?

By Laura Spadanuta

The long-awaited and beleaguered Transportation Worker Identification Credential (TWIC) is finally set to roll out in the Port of Wilmington, Delaware.

How Safe Are Our Labs?

By Laura Spadanuta

Before they receive government authorization, labs handling dangerous biological specimens must show they have incident response plans.

Fraternité, Sororité, Fire Safety

By Richard C. Graves

The University of Florida has developed a scoring system that has led to fire-safety improvements in Greek fraternity and sorority housing.

Workplace Bullying: Consequences and Solutions

By Laura Spadanuta

Schoolyard bullies don't fade away, they grow up and continue their bullying at the office.

Legal Report

By Teresa Anderson

An employee can sue over on-the-job horseplay, plus proposals for security officer checks, terrorism reinsurance, and more.

Industry News

By Ann Longmore-Etheridge

ASIS releases Salary Survey results and the information asset protection guideline. Kenneth R. Jones, CPP, is profiled.

Assessing Project Results

By Jack J. Phillips and Patricia Pulliam Phillips

To ensure that resources are directed effectively, companies have to assess the cause and effect relationship between changes made and results achieved.

 

 

The Magazine — Past Issues

EDITOR'S NOTE

Collapse and Consequences

By Sherry Harowitz

The collapse of the I-35 bridge in Minneapolis was a reminder that 72,000 bridges in this country are structurally deficient. How did we get here? By using the wrong infrastructure management model.

CYBERSECURITY

Voice Biometrics Get Heard

By John Wagley

A push for two-factor authentication is making voice recognition a more attractive security option for financial firms.

Behind the Numbers: The Out-Bound Threat

IT Pros Wary of Google Desktop

By John Wagley

Are the reported flaws truly serious, or is the hype mainly about knocking the wildly successful Google down a peg?

Numbers

13

The amount, in billions of dollars, of direct damage caused by malware attacks worldwide in 2007, according to market research firm Computer Economics.

Site to See

By John Wagley

The software has a simple interface and uses highly regarded Twofish encryption. Keep your passwords organized and secure at this month’s A Site to See.

New in Plaintext

By Ronald L. Mendell

The text, CEH Official Certified Ethical Hacker Review Guide, is reviewed.

INTERNATIONAL

EU Works to Secure its Supply Chain

By John Barham

A new risk-assessment system is expected to detect numerous potential threats as part of a broader EU customs modernization.

Russia's Oil Bust

By John Barham

Russia emerged as a big player in world oil markets a decade ago, but now it’s struggling to maintain production. It could hamper the Kremlin’s foreign policy in years ahead.

Hope Rises in Africa

By John Barham

Sub-Saharan African countries are making slow progress on governance, corruption, and basic political rights, says the World Bank.

Numbers

22

The percentage of U.S. crude oil imports that came from Africa in 2006, up from 15 percent in 2004. Africa is currently the largest supplier of U.S. crude oil, making strategic alliances in that region critical.

CASE STUDY

Security to Bank On

By Teresa Anderson

Faced with the need to increase IT staff and resources, this bank chose to outsource all of its network monitoring.

BOOK REVIEWS

Unconquerable Nation: Knowing Our Enemy, Strengthening Ourselves

By James T. Dunne

Among the many books that purport to point the way forward for America in the wake of 9-11, this one stands out, chiefly for its clarity and sensibility. It is often difficult to deny the common sense of Brian Michael Jenkins' commentary.

 

From the Terrorists' Point of View: What They Experience and Why They Come to Destroy

By Mayer Nudell, CSC

What makes Islamist terrorism tick?

Counterdeception Principles and Applications for National Security

By Ben Rothke, CISSP

The term "instant classic" is an oxymoron, but it nevertheless may apply to Counterdeception Principles and Applications for National Security.

Intruder Alarms, Third Edition

By James R. Black, CPP, PSP, CET

Learn the skills and tools necessary to install and maintain effective intrusion alarm devices and systems.

Security Law and Methods

By William E. Thornton, Ph.D

Author James F. Pastor weaves together security standards, best practices, and the law to help lawyers who litigate civil premises liability cases.

Separating Fools From Their Money: A History of American Financial Scandals

By Dan Bergevin

Financial scandals follow a pattern, and learning how this pattern plays out is essential to preventing future business crime and financial meltdowns.

 

 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.