INSE 6150: Scribe Notes for Lecture 10 HUMAN SECURITY: PROCEDURES (EXAMPLE: AIRPORTS) AND USABILITY

Size: px
Start display at page:

Download "INSE 6150: Scribe Notes for Lecture 10 HUMAN SECURITY: PROCEDURES (EXAMPLE: AIRPORTS) AND USABILITY"

Transcription

1 INSE 6150: Scribe Notes for Lecture 10 Scribed by: Seema Kottappurath April 10, 2015 HUMAN SECURITY: PROCEDURES (EXAMPLE: AIRPORTS) AND USABILITY Human oriented Security also known as Soft Security consists of: 1. Procedures 2. Usability 3. Social Engineering PROCEDURES Procedures are the codes/rules that must be followed within an organization where the description would be in a language used by humans. It is a pathway between the code and the humans. Example 1 : The Certificate Authority decides whether they are talking to Google or not before giving out the certificate by following certain procedures within the organization. Eg: DNS validation, Send out an , Inperson etc. Example 2 : AIRPORTS Airport Security are governed by two primary government agencies, the Transport security and the Customs. The organisation that deals with the transport security in Canada is known as the Canadian Air Transport Security Authority (CATSA) that checks for weapons and for liquids. The Canadian customs is the Canadian Border Services (CBS) which comes into play for international travel. They are responsible for checking to see if the passenger possesses drugs, currency greater than 10,000 dollars and organics. Under organics though liquids are screened by the CATSA and the vegetables and plant section are dealt by the customs. In order for a traveller to travel on an airplane the list of must haves and must not haves are given below: Must Haves: Must Not Haves: ID (Passport) Boarding Pass Weapons or Ammunitions Drugs Currency of greater than 10,000 dollars Organics (vegetation, chemicals) Liquids greater than 100ml On the NO FLY list

2 Containers of liquids, food and personal items in your carry-on must be 100 ml/100 grams (3.4 oz) or less. All containers must fit in one clear, resealable plastic bag no more than 1-litre in capacity. The bag must be transparent so screening officers can easily see the contents. The Government of Canada set these limits based on national and international consultations and analysis. The 100mL restriction is set by the International Civil Aviation Organization (ICAO). The complete list of items that can be carried are given on the CATSA website: Why Liquid Restrictions are put in place? It is a direct response to a bomb threat Exceptions Those that are purchased from Duty Free (As there is a chain of custody where the origin is trusted) Baby formula Contact Lens Solution SECURITY THEATER Bruce Schneier has perfectly coined the term Security Theater to the security measures that are implemented to make people feel more secure than to really doing something to improve security. When an incident occurs people want something to be done to feel safe even if it doesn t make them safe. Airport security is reactionary and hence critics claim it as a security theater. Example 1 : The restriction placed on the amount of liquids (<100ml) that can be carried in the carryon luggage. The idea is to prevent making a bomb with it but other security loopholes can be used to achieve the same goal as the allowed items such as the baby formula or the contact lens solution can be used for the same purpose.

3 Example 2 : At the airport, after a bomb was found in a person s shoes thereafter ever since during the security screening shoes are asked to be taken off every single time. Example 3: If the laptop that one is carrying does not turn on, it won t be allowed. If it does turn on, it is let through even though there are ways to circumvent to use it for hiding a bomb. PHYSICAL SECURTY IN THE AIRPLANE Locks- to protect the check in baggage. Cockpit Locks- After the 9/11 incident, locks were installed for the cockpit doors that were not present earlier. The locks can be locked from the inside and the pilot/flight attendants could unlock the code from the outside. The threat would be they could be co- erced into giving up the code. From the inside, the pilot can override the unlock. This model assumes the pilot is trustworthy. How to update the trust model if the pilot is not trust worthy? Discussion arose after the German Wings Incident where the pilot intentionally crashed the plane into the Alps by taking control of the air plane and set it for rapid descent to crash it. He did this by locking the cockpit door and by overriding the access code entered from the outside by the captain. Airmarshalls Remote Unlock/ Control discussed Procedure Implemented: Two people inside the cockpit always AIRPORTS A Procedural Vulnerability that is now fixed. A person on the No Fly List could fly anyways as different parties were responsible for different things. The airline and the Transport security checks did not co-ordinate. ASSUMPTION: Can fake a Boarding Pass but can t fake a Passport

4 Real Boarding Pass(BPA)- Purchased from the Airline using a different name that is not on the No Fly List. Fake Boarding Pass(BPB)- Create a fake Boarding Pass using the Real Name. Passport- Has the real name. Only the Airline checks for the No Fly list and not the CATSA. Step1 How to fly even when your name is on the No Fly List? The person uses a fake name which the Airline checks against the No Fly List. If the name is not on the No Fly List, a Boarding Pass(BPA) is issued which contains the fake name that was used by the person. ( BPA, No Fly List ) Step 2 The person creates a fake Boarding Pass(BPB) with his/her real name at the security. The CATSA checks if the name contained in the Boarding Pass(BPB) matches with his/her piece of identity, the Passport. If it matches he s allowed in. This information is not matched against the flight information though as CATSA does not have access to the Airline s No Fly List. ( BPB, Passport ) Flight Information/No Fly List Step 3 At the Gate, the real Boarding Pass(BPA) with the fake name is used again. Here, the BPA is checked against the Flight Information and since it matches, the person is granted permission to fly even if on the No Fly List. ( BPA, No Fly List ) Passport

5 How to avoid this security loophole? i. Passport is required when you book. ii. CATSA and Airline should exchange information. iii. People show ID when boarding the plane. Nowadays at the Gate, you have to show your Boarding pass along with your Passport and this solves the problem. (Passport, Boarding Pass, Flight Information) BPA BPA Airport s Secure and Insecure Areas INSECURE ZONE Security screening Security Screening SECURE ZONE

6 Generally, majority of the Airports are designed in such a way most of the airport areas are considered as insecure. Once the security screening is done, then the area onwards is considered as a secure zone as shown in the above diagram. In this design, suppose an accident happens and a person manages to enter the secure zone somehow then the ways to contain the situation are either to 1. Ignore someone has entered the secure zone 2. Airport shutdown by making everyone re-enter the airport for performing security screening once again. However, in the case of the Amsterdam Airport all the areas are insecure except at the gates to board the airplane which is considered secure as the security screening process occurs here. Gate1 Gate 3 SECURE SECURE Gate 2 SECURE Figure: Amsterdam Airport Design

7 SPOT PROGRAM A document that was leaked to a news agency, Intercept where a US based program called SPOT that was designed by the TSA (Transport Security Agency). At the airport, while directing the travellers to stand in different lines before the actual physical security process, there are officers trained to identify suspicious behaviour and passes you on to secondary screening. Behaviour is analysed the moment travellers enter the airport until the procedure of clearing security. They have a guideline that assigns points for certain behaviours and once they reach 10 points, that passenger would be assigned for secondary screening. Refer: SPOT USABILITY Usability is how well users can use security products such as softwares, procedures etc. The usability research started with PGP (Encrypted ) as it is quite complex to use even for cryptographers as the user needs to set up the public/private keys, verify signatures with public key etc. A mental model of how the software worked was needed to use it. Security often fails because users are not experts or are unmotivated with regards to security. Case Study- Why Johnny can t encrypt? If users cannot use the secure tool then there is no security in the end even if the tool provides all the security properties. Security tools needs some form of expertise level such as the knowledge of public key Eg: Even for using a Password Manager, the user has to have a mental model of how to use it. Aspects of Usable Security: i. Defaults are very important as Normal users would not change the default options. ii. Users often make mistakes so redundancy could be built into the software

8 iii. Users need a proper functioning mental model of the tool that they are using. EVALUATION METHODOLOGIES FOR USABILITY 1. Cognitive Walkthrough 2. User Studies 1. COGNITIVE WALKTHROUGH It is a usability evaluation method in which the experts evaluates the tool and will `walk through the user tasks pretending to be a user and defines certain core tasks that a normal user might get caught at doing so. The purpose of the cognitive walkthrough is the system s learnability for new users or infrequent users and is a methodological process. Core tasks Eg: In PGP, user can successfully encrypt an . Heuristics/Guidelines 1. Users should know the next step 2. Users should be able to determine how to do it using the user interface. 3. Users should know they have completed a task. 4. Users should recover from non-criticial errors. 5. Users should not make dangerous errors. 6. Terminology should be understandable. 7. Users should be comfortable with the interface. 8. Users should be aware of the status at all times. Eg: Lock symbol appears to be unlocked Use of the software to understand the behaviour.

9 REFERENCES

Social Narrative AIRPORT INSTRUCTION & READINESS. miami-airport.com/miaair.asp

Social Narrative AIRPORT INSTRUCTION & READINESS. miami-airport.com/miaair.asp AIRPORT INSTRUCTION & READINESS Social Narrative um nsu card University of Miami-Nova Southeastern University Center for Autism & Related Disabilities miami-airport.com/miaair.asp Index Part 1 Checking

More information

Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0

Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0 Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0 Alma Whitten and J. D. Tygar Presentation by Jukka Valkonen jukka.valkonen@tkk.fi 25.10.2006 Outline 1. Background 2. Test methods and results

More information

LAN Airline Flight Schedule

LAN Airline Flight Schedule LAN Airline Flight Schedule Exclusively Prepared for World Spree Traveler The scheduled departures of World Spree Tour feature flights with LAN Airline (code LA). LAN operates non-stop flights from,, to.

More information

THE AMERICAN AIRLINEW INDUSTRY AND SOUTHWEST AIRLINES. low profit margins. Within the industry, however, there have been differences in terms of

THE AMERICAN AIRLINEW INDUSTRY AND SOUTHWEST AIRLINES. low profit margins. Within the industry, however, there have been differences in terms of THE AMERICAN AIRLINEW INDUSTRY AND SOUTHWEST AIRLINES Introduction The domestic airline industry in the USA has been characterized by intense rivalry and low profit margins. Within the industry, however,

More information

Why Johnny Can't Encrypt: A Usability Study of PGP

Why Johnny Can't Encrypt: A Usability Study of PGP Why Johnny Can't Encrypt: A Usability Study of PGP Jan Sousedek Technische Universität Berlin, Germany Erasmus program Summer semester 2008 Seminar: Internet Security jan.sousedek@seznam.cz Abstract Interfaces

More information

PRACTICE EDITION. Airport Social Stories

PRACTICE EDITION. Airport Social Stories PRACTICE EDITION Airport Social Stories Dear families, In this section of the airport accessibility website, you will find Social Stories(TM) that I wrote for air travel. A Social Story describes a situation,

More information

WHEN ENCOUNTERING LAW ENFORCEMENT

WHEN ENCOUNTERING LAW ENFORCEMENT KNOW YOUR RIGHTS WHEN ENCOUNTERING LAW ENFORCEMENT KNOW YOUR RIGHTS WHEN ENCOUNTERING L A W E N F O R C E M E N T This booklet addresses what rights you have when you are stopped, questioned, arrested,

More information

CABIN CREW TRAINING FOR FLIGHT ATTENDANTS THE ROLES AND RESPONSIBILITIES OF A CABIN CREW

CABIN CREW TRAINING FOR FLIGHT ATTENDANTS THE ROLES AND RESPONSIBILITIES OF A CABIN CREW CABIN CREW TRAINING FOR FLIGHT ATTENDANTS THE ROLES AND RESPONSIBILITIES OF A CABIN CREW WHO IS A FLIGHT ATTENDANT? FLIGHT ATTENDANTS OR CABIN CREW (ALSO KNOWN AS STEWARDESSES/ STEWARD, AIR HOSTESSES /

More information

10 Hidden IT Risks That Might Threaten Your Law Firm

10 Hidden IT Risks That Might Threaten Your Law Firm (Plus 1 Fast Way to Find Them) Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

RE: Xavier University Buenos Aires Program February/March, 2010

RE: Xavier University Buenos Aires Program February/March, 2010 July, 2009 RE: Xavier University Buenos Aires Program February/March, 2010 Dear Travelers: PLEASE NOTE. Before your flight, check with your airline and government websites to see what the current security

More information

"They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety. Benjamin Franklin, 1775

They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety. Benjamin Franklin, 1775 Security Theater 11/23/2010 by Dubbs Galt "They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety. Benjamin Franklin, 1775 The holiday season is

More information

The Saint Lucia Ports Police (SLPP)

The Saint Lucia Ports Police (SLPP) The Saint Lucia Ports Police (SLPP) The Saint Lucia Ports Police (SLPP) constituted under the Saint Lucia Air and Sea Ports Authority (SLASPA) Act Chapter 8.13 of the Revised Edition of the Laws of Saint

More information

KNOW YOUR RIGHTS: AIRPORT SECURITY AND TRANSGENDER PEOPLE Updated March 2014

KNOW YOUR RIGHTS: AIRPORT SECURITY AND TRANSGENDER PEOPLE Updated March 2014 KNOW YOUR RIGHTS: AIRPORT SECURITY AND TRANSGENDER PEOPLE Updated March 2014 The right to travel freely is a fundamental human right, yet travelers across the country continue to express concerns about

More information

Chapter 2. Basic Airplane Anatomy. 2008 Delmar, Cengage Learning

Chapter 2. Basic Airplane Anatomy. 2008 Delmar, Cengage Learning Chapter 2 Basic Airplane Anatomy Objectives Identify components of basic aircraft anatomy Understand aircraft size and weight categories List different types and examples of General aviation aircraft Military

More information

TSA Administrator John S. Pistole Addressing Homeland Security Policy Institute, George Washington University Washington, DC

TSA Administrator John S. Pistole Addressing Homeland Security Policy Institute, George Washington University Washington, DC TSA Administrator John S. Pistole Addressing Homeland Security Policy Institute, George Washington University Washington, DC Speech Tuesday, May 28, 2013 (As prepared for delivery) Good morning. Thank

More information

SECURITY AWARENESS FOR WORK, TRAVEL & HOME

SECURITY AWARENESS FOR WORK, TRAVEL & HOME SECURITY AWARENESS FOR WORK, TRAVEL & HOME This easy-to-use Leaders Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the program and

More information

EU Measures for Liquids

EU Measures for Liquids EU Measures for Liquids New European Regulation for hand luggage Frequently Asked Questions FAQs regarding the new European Regulation 1. What changes for hand luggage due to the new European Regulation?

More information

Basic Airport Security Awareness

Basic Airport Security Awareness Basic Airport Security Awareness Mineta San Jose International Airport Training Standards Program Division of Employee Services, Safety & Training Mineta San Jose International Airport Key Points: The

More information

Passengers may bring an adequate plastic bag from home. At several airports plastic bags are provided for passengers.

Passengers may bring an adequate plastic bag from home. At several airports plastic bags are provided for passengers. Changes for passengers: new rules for carry-on luggage As of November 6 2006, new rules are in force regarding is permitted as carry-on luggage. Only liquids, gels and aerosols are permitted in carry-on

More information

China Airlines Flight Schedule

China Airlines Flight Schedule China Airlines Flight Schedule Exclusively Prepared for World Spree Travelers The scheduled departures of World Spree Tour feature transpacific flights with China Airlines (code CI). China Airlines operates

More information

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Emirates Airline. Cargo Security The EK Experience

Emirates Airline. Cargo Security The EK Experience Emirates Airline Cargo Security The EK Experience The aim of Aviation Security The aim of aviation security is to safeguard passengers, crew, ground personnel and the general public from acts of unlawful

More information

To help you, here s how we differentiate between infants and children:

To help you, here s how we differentiate between infants and children: FAQs Flying with children Here at easyjet we want to make travelling as a family as easy as possible. So we ve put together answers to your most popular questions, which we hope will make your journey

More information

RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING

RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING U.S. Department of Homeland Security Arlington, VA 22202 RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING Recurrent FSSA Training for Flight School Employees and independent Certified Flight

More information

Becoming a Pilot. Questions Answered by a Professional Pilot.

Becoming a Pilot. Questions Answered by a Professional Pilot. Becoming a Pilot. Questions Answered by a Professional Pilot. By Mario Sabogal Introduction My name is Mario Sabogal, and I am a professional pilot. I have worked as a pilot in various corners of the aviation

More information

The OPEN Manifesto Future City Principles

The OPEN Manifesto Future City Principles November 2013 The OPEN Manifesto Future City Principles 2 OPEN Manifesto The Open Manifesto paves the way for a more responsive city that adapts to the needs of its citizens. The success of Glasgow s Open

More information

Walt Disney World Walt Disney World Walt Disney World Walt Disney World Walt Disney World Walt Disney World Walt Disney World

Walt Disney World Walt Disney World Walt Disney World Walt Disney World Walt Disney World Walt Disney World Walt Disney World Disney s Magical Express is a complimentary service that includes round-trip motor coach transportation and baggage handling between Orlando International Airport and Walt Disney World Resort for guests

More information

COMP3441 Lecture 9: Security Architecture

COMP3441 Lecture 9: Security Architecture COMP3441 Lecture 9: Security Architecture Ron van der Meyden (University of New South Wales Sydney, Australia) May 6, 2014 Overview Security Design Principles Security Architecture Security Design in the

More information

Subject: Review of Aviation Security in Australia

Subject: Review of Aviation Security in Australia REF:SM/17/09/03 September 17, 2003 Mr John Carter Committee Secretary Joint Committee of Public Accounts & Audit Parliament House CANBERRA ACT 2600 Dear Mr Carter Subject: Review of Aviation Security in

More information

RECOMMENDED PRACTICE 1701h

RECOMMENDED PRACTICE 1701h RECOMMENDED PRACTICE 1701h Security Checkpoint Access and Egress All the content of this document is intended to be used as guidance material, to be considered by airports when applicable, subject to local

More information

Aerodrome Advisory Circular

Aerodrome Advisory Circular Aerodrome Advisory Circular AC(AD) NO-13 Integration of International Aviation Security (AVSEC) Measures into Designs and Constructions of New Facilities and alterations to Existing Facilities. CIVIL AVIATION

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Mauro Calvano. About Aviation Safety Management Systems

Mauro Calvano. About Aviation Safety Management Systems Mauro Calvano About Aviation Safety Management Systems January 2003 1 INTRODUCTION In order to be aware of the factors that are driving the accident rate during the last decade, we must identify the hazards

More information

HIPAA: Privacy/Info Security

HIPAA: Privacy/Info Security HIPAA: Privacy/Info Security Jeff Jones HIPAA Privacy Officer HIPAA Information Security Officer KY Region What you should know Discussion Topics Protected Health Security Awareness Information(PHI) Disclosure

More information

Aviation Safety: Making a safe system even safer. Nancy Graham Director, Air Navigation Bureau International Civil Aviation Organization

Aviation Safety: Making a safe system even safer. Nancy Graham Director, Air Navigation Bureau International Civil Aviation Organization Aviation Safety: Making a safe system even safer Nancy Graham Director, Air Navigation Bureau International Civil Aviation Organization Video Message, October 1st, 2010 (http://livestream.com/icao) I am

More information

section 5 machine guarding and lockout

section 5 machine guarding and lockout section machine guarding and lockout This section covers ways to physically protect people working in and around machinery. It includes information on: machinery guards lockout systems emergency stop confined

More information

Using Incident Investigation Tools Proactively for Incident Prevention.

Using Incident Investigation Tools Proactively for Incident Prevention. Using Incident Investigation Tools Proactively for Incident Prevention. Joanne De Landre General Manager, Safety Wise Solutions ANZSASI 2006 - Melbourne Introduction Reducing Error Investigative Tools

More information

transavia virtual dispatch manager user manual 2015, transavia virtual airline. All rights reserved. http://www.transavia-virtual.

transavia virtual dispatch manager user manual 2015, transavia virtual airline. All rights reserved. http://www.transavia-virtual. transavia virtual dispatch manager user manual applies to version 1.5.0 http://www.transavia-virtual.com/ 2015, transavia virtual airline. All rights reserved. table of contents table of contents... 2

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

ELIZABETHAN ACADEMY EXCURSION TO GERMANY. Thursday 18 December Sunday 21 December

ELIZABETHAN ACADEMY EXCURSION TO GERMANY. Thursday 18 December Sunday 21 December ELIZABETHAN ACADEMY EXCURSION TO GERMANY Thursday 18 December Sunday 21 December We hope that this booklet will provide you with information about the Excursion to Germany and will answer many of your

More information

THE EQUIPMENT THE SOLUTION THE CHALLENGE THE THREAT

THE EQUIPMENT THE SOLUTION THE CHALLENGE THE THREAT THE CHALLENGE The aviation system, essential to the U.S. economy, its quality of life, and national security, is in a sustained period of economic growth. As the system grows, so do the opportunities for

More information

b) Describe the concept of ERROR CHAIN in aviation.

b) Describe the concept of ERROR CHAIN in aviation. 1. Crew Resource Management (CRM) was celebrated as the convergence ofa concept, an attitude and a practical approach to pilot training. a) What is the CRM all about and how this program could improve

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security

More information

July 25, 1947 Three Romanian terrorists kill an aircrew member on board a Romanian Airlines flight, resulting in the world s first fatal hijacking.

July 25, 1947 Three Romanian terrorists kill an aircrew member on board a Romanian Airlines flight, resulting in the world s first fatal hijacking. Intro: The timeline of airline security measures going back several decades shows that security has adapted to threats as they arose. But while the terrorist threat has changed over time, checkpoint security

More information

Mobile Deposit Frequently Asked Questions

Mobile Deposit Frequently Asked Questions Mobile Deposit Frequently Asked Questions What is TopLine Mobile Deposit? Mobile Deposit, available through TopLine s Mobile App, allows you to conveniently deposit your checks remotely by using your mobile

More information

Brain-in-a-bag: creating an artificial brain

Brain-in-a-bag: creating an artificial brain Activity 2 Brain-in-a-bag: creating an artificial brain Age group successfully used with: Abilities assumed: Time: Size of group: 8 adult answering general questions, 20-30 minutes as lecture format, 1

More information

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems. 1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood

More information

The E-Myth Revisited By Michael E. Gerber

The E-Myth Revisited By Michael E. Gerber By Michael E. Gerber Introduction o Over 1 million new businesses are started each year in the U.S. o At least 40% will not make it through the first year o Within five years, more than 80% will have failed

More information

WHY YOU NEED AN SSL CERTIFICATE

WHY YOU NEED AN SSL CERTIFICATE GO DADDY TECHNICAL BRIEF ecommerce SECURITY WHY YOU NEED AN SSL CERTIFICATE In the world of electronic commerce, security is paramount. Although Web sales are on the rise, widespread fears about sending

More information

IN FLIGHT SECURITY INCIDENT MANAGEMENT

IN FLIGHT SECURITY INCIDENT MANAGEMENT 1. Introduction IN FLIGHT SECURITY INCIDENT MANAGEMENT The tragic events on 9/11 drastically changed the way in-flight security incidents are managed. That day, the world witnessed an unprecedented dimension

More information

U.S. Customs and Border Protection Security Seal/Hologram Program Procedures (Updated Sep 2010)

U.S. Customs and Border Protection Security Seal/Hologram Program Procedures (Updated Sep 2010) U.S. Customs and Border Protection Security Seal/Hologram Program Procedures (Updated Sep 2010) Definition of CBP Security Area (19 CFR 122.181) The term CBP security area means the Federal Inspection

More information

Information Technology Branch Access Control Technical Standard

Information Technology Branch Access Control Technical Standard Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,

More information

Saudi Arabian Airlines Customer Service Plan

Saudi Arabian Airlines Customer Service Plan Saudi Arabian Airlines Customer Service Plan This Plan is adopted for all scheduled and public charter flights operated by Saudi Arabian Airlines. Our goal is to make every flight a safe and pleasant experience

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to

More information

1 Privacy Statement - Virgin Australia (Flight Bookings) 1. 2 Privacy Statement - Velocity (Membership Join) 3

1 Privacy Statement - Virgin Australia (Flight Bookings) 1. 2 Privacy Statement - Velocity (Membership Join) 3 Contents 1 Privacy Statement - Virgin Australia (Flight Bookings) 1 2 Privacy Statement - Velocity (Membership Join) 3 3 Privacy Statement - Virgin Australia Holidays (Package Bookings) 6 4 Privacy Statement

More information

Authentication Part 4: Issues and Implications. People and Security Lecture 8

Authentication Part 4: Issues and Implications. People and Security Lecture 8 Authentication Part 4: Issues and Implications People and Security Lecture 8 The great authentication fatigue (1) 23 knowledge workers asked to keep a diary of all their authentication events for 24 hours

More information

(Sample) Building Emergency Plan

(Sample) Building Emergency Plan (Sample) Building Emergency Plan for XXXXXX 2815 Commons Way Cincinnati, OH 45221 August 2016 University of Cincinnati Department of Public Safety Department a 2 Table of Contents A. Introduction B. Components

More information

Making your journey easier. Advice and tips for travelling with children and vulnerable passengers.

Making your journey easier. Advice and tips for travelling with children and vulnerable passengers. Making your journey easier Advice and tips for travelling with children and vulnerable passengers. Introduction At Gatwick we understand how stressful the airport journey can be for many people, especially

More information

Know your rights. Q: What If police, FBI, or immigration agents contact me? Do I have to answer questions?

Know your rights. Q: What If police, FBI, or immigration agents contact me? Do I have to answer questions? Know your rights What rights do I have as a non-immigrant, F-1/J-1 visa holder? Whether or not you re a citizen, you have rights under the United States Constitution. The Fifth Amendment gives every person

More information

AIR CARGO SECURITY: An Overview of Several Regulatory Initiatives around the World

AIR CARGO SECURITY: An Overview of Several Regulatory Initiatives around the World AIR CARGO SECURITY: An Overview of Several Regulatory Initiatives around the World A presentation by Maria Buzdugan (McGill Institute of Air and Space Law, Montreal, Canada) Questions Raised Why is air

More information

2.6 Personnel and Goods Check Procedures upon Accessing Security Restricted Areas

2.6 Personnel and Goods Check Procedures upon Accessing Security Restricted Areas Page 1/6 2.6 Personnel and Goods Check Procedures upon Accessing Security Restricted Areas signed Peter Schmitz signed Dr. Pierre Dominique Prümm Page 2/6 Edition Edition number Edition date Comments Author

More information

DANGEROUS GOODS TRAINING FOR EMPLOYEES

DANGEROUS GOODS TRAINING FOR EMPLOYEES Advisory Circular AC 92-01(1) AUGUST 2009 DANGEROUS GOODS TRAINING FOR EMPLOYEES CONTENTS 1. References 1 2. Purpose 1 3. Status of this AC 2 4. Accronyms 2 5. Who is Required to Undertake Dangerous Goods

More information

Emerging Threats from Cyber Security in Aviation Challenges and Mitigations

Emerging Threats from Cyber Security in Aviation Challenges and Mitigations Emerging Threats from Cyber Security in Aviation Challenges and Mitigations ABSTRACT Security threats to civil aviation operations have become more sophisticated and challenging to deal with. One that

More information

DOT HAZMAT SECURITY AWARENESS TRAINING

DOT HAZMAT SECURITY AWARENESS TRAINING ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader

More information

THE MEDA PROCESS IS THE WORLDWIDE STANDARD FOR MAINTENANCE ERROR INVESTIGATION.

THE MEDA PROCESS IS THE WORLDWIDE STANDARD FOR MAINTENANCE ERROR INVESTIGATION. THE MEDA PROCESS IS THE WORLDWIDE STANDARD FOR MAINTENANCE ERROR INVESTIGATION. 14 aero quarterly qtr_02 07 MEDA Investigation Process by William Rankin, Ph.D., Boeing Technical Fellow, Maintenance Human

More information

SECURING YOUR AIRCRAFT

SECURING YOUR AIRCRAFT SECURING YOUR AIRCRAFT THE THREAT Unlike commercial airliners that are rarely left unoccupied, VIP aircraft and Business Jets can often be parked up for hours or even days without someone on board. In

More information

Honeymoon of YOUR Dreams!

Honeymoon of YOUR Dreams! Planning the Honeymoon of YOUR Dreams! Carolyn Waffle, Certified Travel AllInclusiveHoneymoonsandDestinationWeddings.com Planning the Honeymoon of YOUR Dreams! Preparing for the Perfect Romantic Honeymoon

More information

Setting up a basic database in Access 2003

Setting up a basic database in Access 2003 Setting up a basic database in Access 2003 1. Open Access 2. Choose either File new or Blank database 3. Save it to a folder called customer mailing list. Click create 4. Double click on create table in

More information

Completing your CTM Online - RESX Profile

Completing your CTM Online - RESX Profile Completing your CTM Online - RESX Profile Your CTM Online profile information is used to complete online bookings and agent-assisted bookings. Note! Whether booking travel through Enterprise, or directly

More information

Introduction to Sexual Health Education Classes

Introduction to Sexual Health Education Classes Title: Theme: Getting Started Introduction to Sexual Health Education Classes Time: Materials: 70 minutes Find Someone Who - Handout Anatomy Review - Teacher Guide Using The Question Box - Teacher Guide

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Daniel Meier & Stefan Badertscher

Daniel Meier & Stefan Badertscher Daniel Meier & Stefan Badertscher 1. The definition of Honeypots 2. Types of Honeypots 3. Strength and Weaknesses 4. Honeypots in action 5. Conclusions 6. Questions 7. Discussion A honeypot is an information

More information

Teaching & Learning Plans. Plan 1: Introduction to Probability. Junior Certificate Syllabus Leaving Certificate Syllabus

Teaching & Learning Plans. Plan 1: Introduction to Probability. Junior Certificate Syllabus Leaving Certificate Syllabus Teaching & Learning Plans Plan 1: Introduction to Probability Junior Certificate Syllabus Leaving Certificate Syllabus The Teaching & Learning Plans are structured as follows: Aims outline what the lesson,

More information

Know the Risks. Protect Yourself. Protect Your Business.

Know the Risks. Protect Yourself. Protect Your Business. Protect while you connect. Know the Risks. Protect Yourself. Protect Your Business. GETCYBERSAFE TIPS FOR S MALL AND MEDIUM BUSINESSES If you re like most small or medium businesses in Canada, the Internet

More information

Review Report. CTIVD nr. 43. Review Committee on the Intelligence and Security Services. arising from the crash of flight MH17

Review Report. CTIVD nr. 43. Review Committee on the Intelligence and Security Services. arising from the crash of flight MH17 Review Report arising from the crash of flight MH17 The role of the General Intelligence and Security Service of the Netherlands (AIVD) and the Dutch Military Intelligence and Security Service (MIVD) in

More information

ATM Security. Emergent challenges and opportunities focusing on increasing automation and cyber-security. Antonio Nogueras

ATM Security. Emergent challenges and opportunities focusing on increasing automation and cyber-security. Antonio Nogueras Emergent challenges and opportunities focusing on increasing automation and cyber-security Antonio Nogueras Civil-Military Coordination Unit SECONOMICS, 5 November 2014 The European Organisation for the

More information

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and

More information

SCDHSC0032 Promote health, safety and security in the work setting

SCDHSC0032 Promote health, safety and security in the work setting Promote health, safety and security in the work setting Overview This standard identifies the requirements when you promote the health, safety and security of yourself and others for whom you are responsible

More information

Feature List for Kaspersky Password Manager

Feature List for Kaspersky Password Manager Feature List for Kaspersky Password Manager Overview... Features by Platform...3 Feature Descriptions...4 Glossary...7 PAGE Feature List for Kaspersky Password Manager Overview Kaspersky Password Manager

More information

Elements of Security

Elements of Security Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 15, 2015 Slideset 8: 1 Some Poetry Mary had a little key (It s all she could export)

More information

Information Security Awareness Training

Information Security Awareness Training Information Security Awareness Training Presenter: William F. Slater, III M.S., MBA, PMP, CISSP, CISA, ISO 27002 1 Agenda Why are we doing this? Objectives What is Information Security? What is Information

More information

BBC Learning English Talk about English Business Language To Go Part 1 - Interviews

BBC Learning English Talk about English Business Language To Go Part 1 - Interviews BBC Learning English Business Language To Go Part 1 - Interviews This programme was first broadcast in 2001. This is not a word for word transcript of the programme This series is all about chunks of language

More information

Customer Service Plan

Customer Service Plan Customer Service Plan Concesionaria Vuela Compañía de Aviación, S.A.P.I. de C.V., d/b/a Volaris, seeks to reach our Customers satisfaction and offer them a unique flight experience. This is the reason

More information

Open-Xchange Guard Major Release v2.0.0. Feature Overview V1.4

Open-Xchange Guard Major Release v2.0.0. Feature Overview V1.4 Open-Xchange Guard Major Release v2.0.0 Feature Overview V1.4 2015 Copyright Open-Xchange Inc. This document is the intellectual property of Open-Xchange Inc. The document may be copied in whole or in

More information

Each room will automatically be selected with the same room type (standard, junior suite, ocean view, etc.).

Each room will automatically be selected with the same room type (standard, junior suite, ocean view, etc.). VENETIAN VACATIONS FAQs Updated 11/2011 General Questions Q: Am I booking this package directly with Venetian Vacations? A: No. Your booking is handled through Global Booking Solutions, who specializes

More information

The use of body scanners for aviation security screening in Australia: Privacy Impact Assessment

The use of body scanners for aviation security screening in Australia: Privacy Impact Assessment The use of body scanners for aviation security screening in Australia: Privacy Impact Assessment February 2012 Contents Contents... 2 1 Executive Summary... 4 2 Purpose... 5 2.1 Background... 5 3 What

More information

EXPO 2016 ANTALYA ENTRANCE TICKET AND RULES OF ENTRANCE AND VISIT TO EXHIBITION AREA

EXPO 2016 ANTALYA ENTRANCE TICKET AND RULES OF ENTRANCE AND VISIT TO EXHIBITION AREA EXPO 2016 ANTALYA ENTRANCE TICKET AND RULES OF ENTRANCE AND VISIT TO EXHIBITION AREA 1. EXPO 2016 ANTALYA ENTRANCE TICKET 1.1. Entrance ticket to EXPO 2016 Antalya Exhibition Area is a printed document

More information

2nd End-User Group Meeting on 3D Face Recognition

2nd End-User Group Meeting on 3D Face Recognition 2nd End-User Group Meeting on 3D Face Recognition Martin Willich Project Manager, Infrastructure Terminals, Fraport AG February 21, 2008, Berlin Page 2 Contents 1. Fraport at a Glance 2. New Challenges

More information

Understand your role

Understand your role The CARE CERTIFICATE Understand your role What you need to know THE CARE CERTIFICATE WORKBOOK Standard Your role - Tasks, Behaviours and Standards of work Your role will have a job description. This tells

More information

Charter Services. Frequently Asked Questions

Charter Services. Frequently Asked Questions Charter Services Frequently Asked Questions What advantages does chartering a private airplane have over traveling with the commercial airlines? Chartering a private aircraft provides you with numerous

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Designing a Scientific Poster

Designing a Scientific Poster Designing a Scientific Poster Purpose and General Information: Scientific Posters are designed to briefly convey a body of work at a scientific conference that can be understood by a reader with a minimum

More information

Cathay Pacific Flight Schedule

Cathay Pacific Flight Schedule Cathay Pacific Flight Schedule Exclusively Prepared for World Spree Travelers The scheduled departures of World Spree Travel feature transpacific flights with Cathay Pacific (code CX). Cathay Pacific operates

More information

21ST CENTURY AVIATION MAINTENANCE TRAINING

21ST CENTURY AVIATION MAINTENANCE TRAINING Paper ID #9351 21ST CENTURY AVIATION MAINTENANCE TRAINING Mr. Terry Allen Michmerhuizen, College of Aviation, Western Michigan University Terry Michmerhuizen is currently an Assistant Professor in the

More information

Prepared Testimony and Statement for the Record of

Prepared Testimony and Statement for the Record of Prepared Testimony and Statement for the Record of Melissa Ngo Director of the Identification and Surveillance Project Electronic Privacy Information Center Meeting on REAL ID Rulemaking Before the Data

More information

Seven business travel tips for PAs

Seven business travel tips for PAs Seven business travel tips for PAs For most PAs, organising travel will be a small part of your day-to-day role, but there are ways to make the process more seamless for you and your travellers E-Guide

More information

Oral Preparation Questions

Oral Preparation Questions Oral Preparation Questions The oral section of the practical test is the time when you need to demonstrate your understanding of the various tasks listed in the practical test standards and the factors

More information