INSE 6150: Scribe Notes for Lecture 10 HUMAN SECURITY: PROCEDURES (EXAMPLE: AIRPORTS) AND USABILITY
|
|
- Colleen Wilcox
- 7 years ago
- Views:
Transcription
1 INSE 6150: Scribe Notes for Lecture 10 Scribed by: Seema Kottappurath April 10, 2015 HUMAN SECURITY: PROCEDURES (EXAMPLE: AIRPORTS) AND USABILITY Human oriented Security also known as Soft Security consists of: 1. Procedures 2. Usability 3. Social Engineering PROCEDURES Procedures are the codes/rules that must be followed within an organization where the description would be in a language used by humans. It is a pathway between the code and the humans. Example 1 : The Certificate Authority decides whether they are talking to Google or not before giving out the certificate by following certain procedures within the organization. Eg: DNS validation, Send out an , Inperson etc. Example 2 : AIRPORTS Airport Security are governed by two primary government agencies, the Transport security and the Customs. The organisation that deals with the transport security in Canada is known as the Canadian Air Transport Security Authority (CATSA) that checks for weapons and for liquids. The Canadian customs is the Canadian Border Services (CBS) which comes into play for international travel. They are responsible for checking to see if the passenger possesses drugs, currency greater than 10,000 dollars and organics. Under organics though liquids are screened by the CATSA and the vegetables and plant section are dealt by the customs. In order for a traveller to travel on an airplane the list of must haves and must not haves are given below: Must Haves: Must Not Haves: ID (Passport) Boarding Pass Weapons or Ammunitions Drugs Currency of greater than 10,000 dollars Organics (vegetation, chemicals) Liquids greater than 100ml On the NO FLY list
2 Containers of liquids, food and personal items in your carry-on must be 100 ml/100 grams (3.4 oz) or less. All containers must fit in one clear, resealable plastic bag no more than 1-litre in capacity. The bag must be transparent so screening officers can easily see the contents. The Government of Canada set these limits based on national and international consultations and analysis. The 100mL restriction is set by the International Civil Aviation Organization (ICAO). The complete list of items that can be carried are given on the CATSA website: Why Liquid Restrictions are put in place? It is a direct response to a bomb threat Exceptions Those that are purchased from Duty Free (As there is a chain of custody where the origin is trusted) Baby formula Contact Lens Solution SECURITY THEATER Bruce Schneier has perfectly coined the term Security Theater to the security measures that are implemented to make people feel more secure than to really doing something to improve security. When an incident occurs people want something to be done to feel safe even if it doesn t make them safe. Airport security is reactionary and hence critics claim it as a security theater. Example 1 : The restriction placed on the amount of liquids (<100ml) that can be carried in the carryon luggage. The idea is to prevent making a bomb with it but other security loopholes can be used to achieve the same goal as the allowed items such as the baby formula or the contact lens solution can be used for the same purpose.
3 Example 2 : At the airport, after a bomb was found in a person s shoes thereafter ever since during the security screening shoes are asked to be taken off every single time. Example 3: If the laptop that one is carrying does not turn on, it won t be allowed. If it does turn on, it is let through even though there are ways to circumvent to use it for hiding a bomb. PHYSICAL SECURTY IN THE AIRPLANE Locks- to protect the check in baggage. Cockpit Locks- After the 9/11 incident, locks were installed for the cockpit doors that were not present earlier. The locks can be locked from the inside and the pilot/flight attendants could unlock the code from the outside. The threat would be they could be co- erced into giving up the code. From the inside, the pilot can override the unlock. This model assumes the pilot is trustworthy. How to update the trust model if the pilot is not trust worthy? Discussion arose after the German Wings Incident where the pilot intentionally crashed the plane into the Alps by taking control of the air plane and set it for rapid descent to crash it. He did this by locking the cockpit door and by overriding the access code entered from the outside by the captain. Airmarshalls Remote Unlock/ Control discussed Procedure Implemented: Two people inside the cockpit always AIRPORTS A Procedural Vulnerability that is now fixed. A person on the No Fly List could fly anyways as different parties were responsible for different things. The airline and the Transport security checks did not co-ordinate. ASSUMPTION: Can fake a Boarding Pass but can t fake a Passport
4 Real Boarding Pass(BPA)- Purchased from the Airline using a different name that is not on the No Fly List. Fake Boarding Pass(BPB)- Create a fake Boarding Pass using the Real Name. Passport- Has the real name. Only the Airline checks for the No Fly list and not the CATSA. Step1 How to fly even when your name is on the No Fly List? The person uses a fake name which the Airline checks against the No Fly List. If the name is not on the No Fly List, a Boarding Pass(BPA) is issued which contains the fake name that was used by the person. ( BPA, No Fly List ) Step 2 The person creates a fake Boarding Pass(BPB) with his/her real name at the security. The CATSA checks if the name contained in the Boarding Pass(BPB) matches with his/her piece of identity, the Passport. If it matches he s allowed in. This information is not matched against the flight information though as CATSA does not have access to the Airline s No Fly List. ( BPB, Passport ) Flight Information/No Fly List Step 3 At the Gate, the real Boarding Pass(BPA) with the fake name is used again. Here, the BPA is checked against the Flight Information and since it matches, the person is granted permission to fly even if on the No Fly List. ( BPA, No Fly List ) Passport
5 How to avoid this security loophole? i. Passport is required when you book. ii. CATSA and Airline should exchange information. iii. People show ID when boarding the plane. Nowadays at the Gate, you have to show your Boarding pass along with your Passport and this solves the problem. (Passport, Boarding Pass, Flight Information) BPA BPA Airport s Secure and Insecure Areas INSECURE ZONE Security screening Security Screening SECURE ZONE
6 Generally, majority of the Airports are designed in such a way most of the airport areas are considered as insecure. Once the security screening is done, then the area onwards is considered as a secure zone as shown in the above diagram. In this design, suppose an accident happens and a person manages to enter the secure zone somehow then the ways to contain the situation are either to 1. Ignore someone has entered the secure zone 2. Airport shutdown by making everyone re-enter the airport for performing security screening once again. However, in the case of the Amsterdam Airport all the areas are insecure except at the gates to board the airplane which is considered secure as the security screening process occurs here. Gate1 Gate 3 SECURE SECURE Gate 2 SECURE Figure: Amsterdam Airport Design
7 SPOT PROGRAM A document that was leaked to a news agency, Intercept where a US based program called SPOT that was designed by the TSA (Transport Security Agency). At the airport, while directing the travellers to stand in different lines before the actual physical security process, there are officers trained to identify suspicious behaviour and passes you on to secondary screening. Behaviour is analysed the moment travellers enter the airport until the procedure of clearing security. They have a guideline that assigns points for certain behaviours and once they reach 10 points, that passenger would be assigned for secondary screening. Refer: SPOT USABILITY Usability is how well users can use security products such as softwares, procedures etc. The usability research started with PGP (Encrypted ) as it is quite complex to use even for cryptographers as the user needs to set up the public/private keys, verify signatures with public key etc. A mental model of how the software worked was needed to use it. Security often fails because users are not experts or are unmotivated with regards to security. Case Study- Why Johnny can t encrypt? If users cannot use the secure tool then there is no security in the end even if the tool provides all the security properties. Security tools needs some form of expertise level such as the knowledge of public key Eg: Even for using a Password Manager, the user has to have a mental model of how to use it. Aspects of Usable Security: i. Defaults are very important as Normal users would not change the default options. ii. Users often make mistakes so redundancy could be built into the software
8 iii. Users need a proper functioning mental model of the tool that they are using. EVALUATION METHODOLOGIES FOR USABILITY 1. Cognitive Walkthrough 2. User Studies 1. COGNITIVE WALKTHROUGH It is a usability evaluation method in which the experts evaluates the tool and will `walk through the user tasks pretending to be a user and defines certain core tasks that a normal user might get caught at doing so. The purpose of the cognitive walkthrough is the system s learnability for new users or infrequent users and is a methodological process. Core tasks Eg: In PGP, user can successfully encrypt an . Heuristics/Guidelines 1. Users should know the next step 2. Users should be able to determine how to do it using the user interface. 3. Users should know they have completed a task. 4. Users should recover from non-criticial errors. 5. Users should not make dangerous errors. 6. Terminology should be understandable. 7. Users should be comfortable with the interface. 8. Users should be aware of the status at all times. Eg: Lock symbol appears to be unlocked Use of the software to understand the behaviour.
9 REFERENCES
Social Narrative AIRPORT INSTRUCTION & READINESS. miami-airport.com/miaair.asp
AIRPORT INSTRUCTION & READINESS Social Narrative um nsu card University of Miami-Nova Southeastern University Center for Autism & Related Disabilities miami-airport.com/miaair.asp Index Part 1 Checking
More informationWhy Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0
Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0 Alma Whitten and J. D. Tygar Presentation by Jukka Valkonen jukka.valkonen@tkk.fi 25.10.2006 Outline 1. Background 2. Test methods and results
More informationLAN Airline Flight Schedule
LAN Airline Flight Schedule Exclusively Prepared for World Spree Traveler The scheduled departures of World Spree Tour feature flights with LAN Airline (code LA). LAN operates non-stop flights from,, to.
More informationTHE AMERICAN AIRLINEW INDUSTRY AND SOUTHWEST AIRLINES. low profit margins. Within the industry, however, there have been differences in terms of
THE AMERICAN AIRLINEW INDUSTRY AND SOUTHWEST AIRLINES Introduction The domestic airline industry in the USA has been characterized by intense rivalry and low profit margins. Within the industry, however,
More informationWhy Johnny Can't Encrypt: A Usability Study of PGP
Why Johnny Can't Encrypt: A Usability Study of PGP Jan Sousedek Technische Universität Berlin, Germany Erasmus program Summer semester 2008 Seminar: Internet Security jan.sousedek@seznam.cz Abstract Interfaces
More informationPRACTICE EDITION. Airport Social Stories
PRACTICE EDITION Airport Social Stories Dear families, In this section of the airport accessibility website, you will find Social Stories(TM) that I wrote for air travel. A Social Story describes a situation,
More informationWHEN ENCOUNTERING LAW ENFORCEMENT
KNOW YOUR RIGHTS WHEN ENCOUNTERING LAW ENFORCEMENT KNOW YOUR RIGHTS WHEN ENCOUNTERING L A W E N F O R C E M E N T This booklet addresses what rights you have when you are stopped, questioned, arrested,
More informationCABIN CREW TRAINING FOR FLIGHT ATTENDANTS THE ROLES AND RESPONSIBILITIES OF A CABIN CREW
CABIN CREW TRAINING FOR FLIGHT ATTENDANTS THE ROLES AND RESPONSIBILITIES OF A CABIN CREW WHO IS A FLIGHT ATTENDANT? FLIGHT ATTENDANTS OR CABIN CREW (ALSO KNOWN AS STEWARDESSES/ STEWARD, AIR HOSTESSES /
More information10 Hidden IT Risks That Might Threaten Your Law Firm
(Plus 1 Fast Way to Find Them) Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
More informationRE: Xavier University Buenos Aires Program February/March, 2010
July, 2009 RE: Xavier University Buenos Aires Program February/March, 2010 Dear Travelers: PLEASE NOTE. Before your flight, check with your airline and government websites to see what the current security
More information"They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety. Benjamin Franklin, 1775
Security Theater 11/23/2010 by Dubbs Galt "They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety. Benjamin Franklin, 1775 The holiday season is
More informationThe Saint Lucia Ports Police (SLPP)
The Saint Lucia Ports Police (SLPP) The Saint Lucia Ports Police (SLPP) constituted under the Saint Lucia Air and Sea Ports Authority (SLASPA) Act Chapter 8.13 of the Revised Edition of the Laws of Saint
More informationKNOW YOUR RIGHTS: AIRPORT SECURITY AND TRANSGENDER PEOPLE Updated March 2014
KNOW YOUR RIGHTS: AIRPORT SECURITY AND TRANSGENDER PEOPLE Updated March 2014 The right to travel freely is a fundamental human right, yet travelers across the country continue to express concerns about
More informationChapter 2. Basic Airplane Anatomy. 2008 Delmar, Cengage Learning
Chapter 2 Basic Airplane Anatomy Objectives Identify components of basic aircraft anatomy Understand aircraft size and weight categories List different types and examples of General aviation aircraft Military
More informationTSA Administrator John S. Pistole Addressing Homeland Security Policy Institute, George Washington University Washington, DC
TSA Administrator John S. Pistole Addressing Homeland Security Policy Institute, George Washington University Washington, DC Speech Tuesday, May 28, 2013 (As prepared for delivery) Good morning. Thank
More informationSECURITY AWARENESS FOR WORK, TRAVEL & HOME
SECURITY AWARENESS FOR WORK, TRAVEL & HOME This easy-to-use Leaders Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the program and
More informationEU Measures for Liquids
EU Measures for Liquids New European Regulation for hand luggage Frequently Asked Questions FAQs regarding the new European Regulation 1. What changes for hand luggage due to the new European Regulation?
More informationBasic Airport Security Awareness
Basic Airport Security Awareness Mineta San Jose International Airport Training Standards Program Division of Employee Services, Safety & Training Mineta San Jose International Airport Key Points: The
More informationPassengers may bring an adequate plastic bag from home. At several airports plastic bags are provided for passengers.
Changes for passengers: new rules for carry-on luggage As of November 6 2006, new rules are in force regarding is permitted as carry-on luggage. Only liquids, gels and aerosols are permitted in carry-on
More informationChina Airlines Flight Schedule
China Airlines Flight Schedule Exclusively Prepared for World Spree Travelers The scheduled departures of World Spree Tour feature transpacific flights with China Airlines (code CI). China Airlines operates
More informationData Protection and Information Security. Data Security - Guidelines for the use of Personal Data
Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationEmirates Airline. Cargo Security The EK Experience
Emirates Airline Cargo Security The EK Experience The aim of Aviation Security The aim of aviation security is to safeguard passengers, crew, ground personnel and the general public from acts of unlawful
More informationTo help you, here s how we differentiate between infants and children:
FAQs Flying with children Here at easyjet we want to make travelling as a family as easy as possible. So we ve put together answers to your most popular questions, which we hope will make your journey
More informationRECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING
U.S. Department of Homeland Security Arlington, VA 22202 RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING Recurrent FSSA Training for Flight School Employees and independent Certified Flight
More informationBecoming a Pilot. Questions Answered by a Professional Pilot.
Becoming a Pilot. Questions Answered by a Professional Pilot. By Mario Sabogal Introduction My name is Mario Sabogal, and I am a professional pilot. I have worked as a pilot in various corners of the aviation
More informationThe OPEN Manifesto Future City Principles
November 2013 The OPEN Manifesto Future City Principles 2 OPEN Manifesto The Open Manifesto paves the way for a more responsive city that adapts to the needs of its citizens. The success of Glasgow s Open
More informationWalt Disney World Walt Disney World Walt Disney World Walt Disney World Walt Disney World Walt Disney World Walt Disney World
Disney s Magical Express is a complimentary service that includes round-trip motor coach transportation and baggage handling between Orlando International Airport and Walt Disney World Resort for guests
More informationCOMP3441 Lecture 9: Security Architecture
COMP3441 Lecture 9: Security Architecture Ron van der Meyden (University of New South Wales Sydney, Australia) May 6, 2014 Overview Security Design Principles Security Architecture Security Design in the
More informationSubject: Review of Aviation Security in Australia
REF:SM/17/09/03 September 17, 2003 Mr John Carter Committee Secretary Joint Committee of Public Accounts & Audit Parliament House CANBERRA ACT 2600 Dear Mr Carter Subject: Review of Aviation Security in
More informationRECOMMENDED PRACTICE 1701h
RECOMMENDED PRACTICE 1701h Security Checkpoint Access and Egress All the content of this document is intended to be used as guidance material, to be considered by airports when applicable, subject to local
More informationAerodrome Advisory Circular
Aerodrome Advisory Circular AC(AD) NO-13 Integration of International Aviation Security (AVSEC) Measures into Designs and Constructions of New Facilities and alterations to Existing Facilities. CIVIL AVIATION
More informationInfocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
More informationMauro Calvano. About Aviation Safety Management Systems
Mauro Calvano About Aviation Safety Management Systems January 2003 1 INTRODUCTION In order to be aware of the factors that are driving the accident rate during the last decade, we must identify the hazards
More informationHIPAA: Privacy/Info Security
HIPAA: Privacy/Info Security Jeff Jones HIPAA Privacy Officer HIPAA Information Security Officer KY Region What you should know Discussion Topics Protected Health Security Awareness Information(PHI) Disclosure
More informationAviation Safety: Making a safe system even safer. Nancy Graham Director, Air Navigation Bureau International Civil Aviation Organization
Aviation Safety: Making a safe system even safer Nancy Graham Director, Air Navigation Bureau International Civil Aviation Organization Video Message, October 1st, 2010 (http://livestream.com/icao) I am
More informationsection 5 machine guarding and lockout
section machine guarding and lockout This section covers ways to physically protect people working in and around machinery. It includes information on: machinery guards lockout systems emergency stop confined
More informationUsing Incident Investigation Tools Proactively for Incident Prevention.
Using Incident Investigation Tools Proactively for Incident Prevention. Joanne De Landre General Manager, Safety Wise Solutions ANZSASI 2006 - Melbourne Introduction Reducing Error Investigative Tools
More informationtransavia virtual dispatch manager user manual 2015, transavia virtual airline. All rights reserved. http://www.transavia-virtual.
transavia virtual dispatch manager user manual applies to version 1.5.0 http://www.transavia-virtual.com/ 2015, transavia virtual airline. All rights reserved. table of contents table of contents... 2
More informationNational Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
More informationELIZABETHAN ACADEMY EXCURSION TO GERMANY. Thursday 18 December Sunday 21 December
ELIZABETHAN ACADEMY EXCURSION TO GERMANY Thursday 18 December Sunday 21 December We hope that this booklet will provide you with information about the Excursion to Germany and will answer many of your
More informationTHE EQUIPMENT THE SOLUTION THE CHALLENGE THE THREAT
THE CHALLENGE The aviation system, essential to the U.S. economy, its quality of life, and national security, is in a sustained period of economic growth. As the system grows, so do the opportunities for
More informationb) Describe the concept of ERROR CHAIN in aviation.
1. Crew Resource Management (CRM) was celebrated as the convergence ofa concept, an attitude and a practical approach to pilot training. a) What is the CRM all about and how this program could improve
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
More informationJuly 25, 1947 Three Romanian terrorists kill an aircrew member on board a Romanian Airlines flight, resulting in the world s first fatal hijacking.
Intro: The timeline of airline security measures going back several decades shows that security has adapted to threats as they arose. But while the terrorist threat has changed over time, checkpoint security
More informationMobile Deposit Frequently Asked Questions
Mobile Deposit Frequently Asked Questions What is TopLine Mobile Deposit? Mobile Deposit, available through TopLine s Mobile App, allows you to conveniently deposit your checks remotely by using your mobile
More informationBrain-in-a-bag: creating an artificial brain
Activity 2 Brain-in-a-bag: creating an artificial brain Age group successfully used with: Abilities assumed: Time: Size of group: 8 adult answering general questions, 20-30 minutes as lecture format, 1
More informationThe introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
More informationThe E-Myth Revisited By Michael E. Gerber
By Michael E. Gerber Introduction o Over 1 million new businesses are started each year in the U.S. o At least 40% will not make it through the first year o Within five years, more than 80% will have failed
More informationWHY YOU NEED AN SSL CERTIFICATE
GO DADDY TECHNICAL BRIEF ecommerce SECURITY WHY YOU NEED AN SSL CERTIFICATE In the world of electronic commerce, security is paramount. Although Web sales are on the rise, widespread fears about sending
More informationIN FLIGHT SECURITY INCIDENT MANAGEMENT
1. Introduction IN FLIGHT SECURITY INCIDENT MANAGEMENT The tragic events on 9/11 drastically changed the way in-flight security incidents are managed. That day, the world witnessed an unprecedented dimension
More informationU.S. Customs and Border Protection Security Seal/Hologram Program Procedures (Updated Sep 2010)
U.S. Customs and Border Protection Security Seal/Hologram Program Procedures (Updated Sep 2010) Definition of CBP Security Area (19 CFR 122.181) The term CBP security area means the Federal Inspection
More informationInformation Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
More informationSaudi Arabian Airlines Customer Service Plan
Saudi Arabian Airlines Customer Service Plan This Plan is adopted for all scheduled and public charter flights operated by Saudi Arabian Airlines. Our goal is to make every flight a safe and pleasant experience
More informationInformation Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
More informationWhitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to
More information1 Privacy Statement - Virgin Australia (Flight Bookings) 1. 2 Privacy Statement - Velocity (Membership Join) 3
Contents 1 Privacy Statement - Virgin Australia (Flight Bookings) 1 2 Privacy Statement - Velocity (Membership Join) 3 3 Privacy Statement - Virgin Australia Holidays (Package Bookings) 6 4 Privacy Statement
More informationAuthentication Part 4: Issues and Implications. People and Security Lecture 8
Authentication Part 4: Issues and Implications People and Security Lecture 8 The great authentication fatigue (1) 23 knowledge workers asked to keep a diary of all their authentication events for 24 hours
More information(Sample) Building Emergency Plan
(Sample) Building Emergency Plan for XXXXXX 2815 Commons Way Cincinnati, OH 45221 August 2016 University of Cincinnati Department of Public Safety Department a 2 Table of Contents A. Introduction B. Components
More informationMaking your journey easier. Advice and tips for travelling with children and vulnerable passengers.
Making your journey easier Advice and tips for travelling with children and vulnerable passengers. Introduction At Gatwick we understand how stressful the airport journey can be for many people, especially
More informationKnow your rights. Q: What If police, FBI, or immigration agents contact me? Do I have to answer questions?
Know your rights What rights do I have as a non-immigrant, F-1/J-1 visa holder? Whether or not you re a citizen, you have rights under the United States Constitution. The Fifth Amendment gives every person
More informationAIR CARGO SECURITY: An Overview of Several Regulatory Initiatives around the World
AIR CARGO SECURITY: An Overview of Several Regulatory Initiatives around the World A presentation by Maria Buzdugan (McGill Institute of Air and Space Law, Montreal, Canada) Questions Raised Why is air
More information2.6 Personnel and Goods Check Procedures upon Accessing Security Restricted Areas
Page 1/6 2.6 Personnel and Goods Check Procedures upon Accessing Security Restricted Areas signed Peter Schmitz signed Dr. Pierre Dominique Prümm Page 2/6 Edition Edition number Edition date Comments Author
More informationDANGEROUS GOODS TRAINING FOR EMPLOYEES
Advisory Circular AC 92-01(1) AUGUST 2009 DANGEROUS GOODS TRAINING FOR EMPLOYEES CONTENTS 1. References 1 2. Purpose 1 3. Status of this AC 2 4. Accronyms 2 5. Who is Required to Undertake Dangerous Goods
More informationEmerging Threats from Cyber Security in Aviation Challenges and Mitigations
Emerging Threats from Cyber Security in Aviation Challenges and Mitigations ABSTRACT Security threats to civil aviation operations have become more sophisticated and challenging to deal with. One that
More informationDOT HAZMAT SECURITY AWARENESS TRAINING
ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader
More informationTHE MEDA PROCESS IS THE WORLDWIDE STANDARD FOR MAINTENANCE ERROR INVESTIGATION.
THE MEDA PROCESS IS THE WORLDWIDE STANDARD FOR MAINTENANCE ERROR INVESTIGATION. 14 aero quarterly qtr_02 07 MEDA Investigation Process by William Rankin, Ph.D., Boeing Technical Fellow, Maintenance Human
More informationSECURING YOUR AIRCRAFT
SECURING YOUR AIRCRAFT THE THREAT Unlike commercial airliners that are rarely left unoccupied, VIP aircraft and Business Jets can often be parked up for hours or even days without someone on board. In
More informationHoneymoon of YOUR Dreams!
Planning the Honeymoon of YOUR Dreams! Carolyn Waffle, Certified Travel AllInclusiveHoneymoonsandDestinationWeddings.com Planning the Honeymoon of YOUR Dreams! Preparing for the Perfect Romantic Honeymoon
More informationSetting up a basic database in Access 2003
Setting up a basic database in Access 2003 1. Open Access 2. Choose either File new or Blank database 3. Save it to a folder called customer mailing list. Click create 4. Double click on create table in
More informationCompleting your CTM Online - RESX Profile
Completing your CTM Online - RESX Profile Your CTM Online profile information is used to complete online bookings and agent-assisted bookings. Note! Whether booking travel through Enterprise, or directly
More informationIntroduction to Sexual Health Education Classes
Title: Theme: Getting Started Introduction to Sexual Health Education Classes Time: Materials: 70 minutes Find Someone Who - Handout Anatomy Review - Teacher Guide Using The Question Box - Teacher Guide
More informationWHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
More informationDaniel Meier & Stefan Badertscher
Daniel Meier & Stefan Badertscher 1. The definition of Honeypots 2. Types of Honeypots 3. Strength and Weaknesses 4. Honeypots in action 5. Conclusions 6. Questions 7. Discussion A honeypot is an information
More informationTeaching & Learning Plans. Plan 1: Introduction to Probability. Junior Certificate Syllabus Leaving Certificate Syllabus
Teaching & Learning Plans Plan 1: Introduction to Probability Junior Certificate Syllabus Leaving Certificate Syllabus The Teaching & Learning Plans are structured as follows: Aims outline what the lesson,
More informationKnow the Risks. Protect Yourself. Protect Your Business.
Protect while you connect. Know the Risks. Protect Yourself. Protect Your Business. GETCYBERSAFE TIPS FOR S MALL AND MEDIUM BUSINESSES If you re like most small or medium businesses in Canada, the Internet
More informationReview Report. CTIVD nr. 43. Review Committee on the Intelligence and Security Services. arising from the crash of flight MH17
Review Report arising from the crash of flight MH17 The role of the General Intelligence and Security Service of the Netherlands (AIVD) and the Dutch Military Intelligence and Security Service (MIVD) in
More informationATM Security. Emergent challenges and opportunities focusing on increasing automation and cyber-security. Antonio Nogueras
Emergent challenges and opportunities focusing on increasing automation and cyber-security Antonio Nogueras Civil-Military Coordination Unit SECONOMICS, 5 November 2014 The European Organisation for the
More informationHow Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
More informationSCDHSC0032 Promote health, safety and security in the work setting
Promote health, safety and security in the work setting Overview This standard identifies the requirements when you promote the health, safety and security of yourself and others for whom you are responsible
More informationFeature List for Kaspersky Password Manager
Feature List for Kaspersky Password Manager Overview... Features by Platform...3 Feature Descriptions...4 Glossary...7 PAGE Feature List for Kaspersky Password Manager Overview Kaspersky Password Manager
More informationElements of Security
Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 15, 2015 Slideset 8: 1 Some Poetry Mary had a little key (It s all she could export)
More informationInformation Security Awareness Training
Information Security Awareness Training Presenter: William F. Slater, III M.S., MBA, PMP, CISSP, CISA, ISO 27002 1 Agenda Why are we doing this? Objectives What is Information Security? What is Information
More informationBBC Learning English Talk about English Business Language To Go Part 1 - Interviews
BBC Learning English Business Language To Go Part 1 - Interviews This programme was first broadcast in 2001. This is not a word for word transcript of the programme This series is all about chunks of language
More informationCustomer Service Plan
Customer Service Plan Concesionaria Vuela Compañía de Aviación, S.A.P.I. de C.V., d/b/a Volaris, seeks to reach our Customers satisfaction and offer them a unique flight experience. This is the reason
More informationOpen-Xchange Guard Major Release v2.0.0. Feature Overview V1.4
Open-Xchange Guard Major Release v2.0.0 Feature Overview V1.4 2015 Copyright Open-Xchange Inc. This document is the intellectual property of Open-Xchange Inc. The document may be copied in whole or in
More informationEach room will automatically be selected with the same room type (standard, junior suite, ocean view, etc.).
VENETIAN VACATIONS FAQs Updated 11/2011 General Questions Q: Am I booking this package directly with Venetian Vacations? A: No. Your booking is handled through Global Booking Solutions, who specializes
More informationThe use of body scanners for aviation security screening in Australia: Privacy Impact Assessment
The use of body scanners for aviation security screening in Australia: Privacy Impact Assessment February 2012 Contents Contents... 2 1 Executive Summary... 4 2 Purpose... 5 2.1 Background... 5 3 What
More informationEXPO 2016 ANTALYA ENTRANCE TICKET AND RULES OF ENTRANCE AND VISIT TO EXHIBITION AREA
EXPO 2016 ANTALYA ENTRANCE TICKET AND RULES OF ENTRANCE AND VISIT TO EXHIBITION AREA 1. EXPO 2016 ANTALYA ENTRANCE TICKET 1.1. Entrance ticket to EXPO 2016 Antalya Exhibition Area is a printed document
More information2nd End-User Group Meeting on 3D Face Recognition
2nd End-User Group Meeting on 3D Face Recognition Martin Willich Project Manager, Infrastructure Terminals, Fraport AG February 21, 2008, Berlin Page 2 Contents 1. Fraport at a Glance 2. New Challenges
More informationUnderstand your role
The CARE CERTIFICATE Understand your role What you need to know THE CARE CERTIFICATE WORKBOOK Standard Your role - Tasks, Behaviours and Standards of work Your role will have a job description. This tells
More informationCharter Services. Frequently Asked Questions
Charter Services Frequently Asked Questions What advantages does chartering a private airplane have over traveling with the commercial airlines? Chartering a private aircraft provides you with numerous
More informationInformation Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
More informationDesigning a Scientific Poster
Designing a Scientific Poster Purpose and General Information: Scientific Posters are designed to briefly convey a body of work at a scientific conference that can be understood by a reader with a minimum
More informationCathay Pacific Flight Schedule
Cathay Pacific Flight Schedule Exclusively Prepared for World Spree Travelers The scheduled departures of World Spree Travel feature transpacific flights with Cathay Pacific (code CX). Cathay Pacific operates
More information21ST CENTURY AVIATION MAINTENANCE TRAINING
Paper ID #9351 21ST CENTURY AVIATION MAINTENANCE TRAINING Mr. Terry Allen Michmerhuizen, College of Aviation, Western Michigan University Terry Michmerhuizen is currently an Assistant Professor in the
More informationPrepared Testimony and Statement for the Record of
Prepared Testimony and Statement for the Record of Melissa Ngo Director of the Identification and Surveillance Project Electronic Privacy Information Center Meeting on REAL ID Rulemaking Before the Data
More informationSeven business travel tips for PAs
Seven business travel tips for PAs For most PAs, organising travel will be a small part of your day-to-day role, but there are ways to make the process more seamless for you and your travellers E-Guide
More informationOral Preparation Questions
Oral Preparation Questions The oral section of the practical test is the time when you need to demonstrate your understanding of the various tasks listed in the practical test standards and the factors
More information