INFORMATION

Site Map - SM Online

Holes in SOX

- The government accounting board charged with SOX compliance oversight has found holes in the way companies met the challenge last year.

Predicting Events

- A study of advanced data analytics and other predictive software looks at the potential for predicting terrorist attacks.

Decontaminating Children

- A government training video shows emergency responders and hospital ER staff how to decontaminate children exposed to dangerous chemicals.

School Security

- A new survey by the National Center for Education Statistics reports an increase in locked doors, security guards, and visitor sign-in procedures.

Go phish

- There are seven steps in a phishing attack, from preparation through successful infection of a victim to the fraud committed using stolen information. Fortunately, there are countermeasures available for each stage. For example, organizations should monitor call volumes and the type of questions customers are asking; a large number of calls regarding password problems can signal a phishing attack. To interfere with the use of compromised information, organizations can use two-factor authentication devices such as biometrics. Instituting delays in some types of money transfers can provide time to detect and void phishing-based transactions. @ Online identity theft: phishing technology, checkpoints and countermeasures, from the identity theft technology council is at SM Online.

A Look at Laptop Theft

- Twenty-nine percent of all stolen laptops are taken from offices, with thefts from cars responsible for another 25 percent of laptop losses, according to survey data from CREDANT Technologies, a security software provider. Some of the 283 executives who responded to the survey noted that office laptops had been stolen despite being locked or even glued to desktops. Only 10 percent of the units had a full-disk encryption solution in place, and 82 percent of the stolen laptops were never recovered  @ More details from the survey are available at SM Online.

Knocking Gangs Off the Network

- When it comes to street gangs, “network analysis” has nothing to do with identifying risks in computer systems but rather with analyzing the pattern of social relationships among gangs and individual members. In an innovative program, the North Jersey Gang Task Force has been using network analysis to combat the gang problem in Newark. Partnering with Rutgers University, which has provided free access to graduate students and researchers, the task force has been documenting relationships among gang members, such as which ones hang out together and which have been incarcerated together. Among other things, the analysis has revealed differing levels of “embeddedness” on the part of specific gang members, indicating that different tactics for intervention are necessary for particular gang members. “Cut points”—people who are the only connection among people or groups—have been identified as potentially ideal targets for disrupting gangs.@  Learn more about the program in a report published by the U.S. Department of Justice’s Office of COPS. it is available at SM Online.

First-Responder Testers Sought

- Video-game technology being adapted to help train first responders. One of the latest examples is Hazmat: Hotzone, a program being developed by the Entertainment Technology Center at Carnegie Mellon University in collaboration with the Fire Department of New York to train first responders to deal with hazardous materials. @ If you wish to participate in the beta testing, sign up on the Hazmat: Hotzone mailing list and express your interest. A link on SM Online takes you to the sign-up page.

Transit System

- Despite the attacks on the Madrid and London rail systems, commuters concerned about safety should think twice about forgoing mass transit for cars, according to a brief paper by the Victoria Transport Policy Institute, an independent Canadian research institution specializing in transportation issues.

Nuclear Vulnerabilities

- A Department of Energy internal report finds that the agency has failed to protect critical nuclear assets.

Weak Passwords

- A new survey examines consumer password preferences.

Credit Card Fraud

- This report highlights 10 ways that businesses can reduce credit card fraud.

Lingua Franca

- CIOs should develop IT plans to support their companies’ overall business objectives.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.