Security vs safety. August The paper is based on previous work by Albrechtsen (2002) 2 Differences between security and safety
|
|
|
- Silvester Shelton
- 10 years ago
- Views:
Transcription
1 Security vs safety PhD student Eirik Albrechtsen NTNU - Norwegian University of Science and Technology Department of Industrial Economics and Technology Management August Background This brief paper is written for use in the course Security analyse og ledelse. The main purpose of the paper is to introduce the term security and to discuss differences between security and safety. The reason for this discussion is security management s lack of academic foothold. Nevertheless, safety management has a long tradition of scientific research. Thus, as will be shown throughout the course, security management can learn a lot from the field of safety management. Some of the lessons on security management will be based on theories from safety management The paper is based on previous work by Albrechtsen (2002) 2 Differences between security and safety 2.1 Grammatical differences In Norwegian the word sikkerhet translates both security and safety. Thus, it might be confusing for a Norwegian to distinguish them, since these words actually do not exist in Norwegian. Nevertheless, some groups at the Norwegian University of Technology and Science (NTNU) has distinguished the two words in Norwegian, saying that security is protection against deliberate incidents and safety is protection against unintended incidents (Hovden, 1998; Skavland Idsø and Mejdell Jakobsen, 2000). NTNU definition (Skavland Idsø and Mejdell Jakobsen, 2000): Safety is protection against random incidents. Random incidents are unwanted incidents that happen as a result of one or more coincidences. Security is protection against intended incidents. Wanted incidents happen due to a result of deliberate and planned act. Eirik Albrechtsen, NTNU 1
2 The new Oxford dictionary of English (Pearsall and Hanks, 2001) describes the words in the following way: Safety: 1) The condition of being protected from or unlikely to cause danger, risk or injury. Denoting something designed to prevent injury or damage, e.g. safety barrier Safe: 1) Protected from or not exposed to danger or risk; not likely to be harmed or lost Not likely to cause or lead to harm or injury; not involving danger or risk (of a place) Affording security or protection 2) Uninjured; with no harm done From the Latin word saluses uninjured Security: 1) the state of being free from danger or threat, e.g. the system is designed to provide maximum security against toxic spills the safety of a state or organizations against criminal activities such as terrorism, theft or espionage procedures followed or measures taken to ensure such safety the state of feeling safe, stable and free from fear or anxiety From the Latin word securus ; se -without, cara care, - securus free from care Secure: not subject to threat; certain to remain or continue safe and unharmed protected against attack or other criminal activity feeling safe, stable and free from fear and anxiety From the definitions presented in the frames, it can be seen that the differences between security and safety are not remarkable. Both are conditions where one is well protected and without risks. The basic idea of both is protecting assets from hazards/threats creating safe/secure conditions. The condition safety is about being protected, while the condition security is about being free from danger. The differences between being protected and being free from danger or threat are not easily seen. Being protected leads to a condition of being free from danger or threat, and being free from danger or threat might imply well protection. Thus, the basic idea is the same for both. One part of security is protection against criminal activities. Simultaneously security is about being in a state of feeling safe, stable and free from fear or anxiety (no. trygghet ). Criminal acts are mainly deliberate acts, but they do not need to be deliberate; driving a car a few km/h over the speed limit is per definition a criminal act, nevertheless it can be an unintended incident (e.g. inattention on speed limits). Thus, I do not think it s correct to say, following the definition given by Hovden (1998) and Skavland Idsø & Mejdell Jakobsen (2000), to say that security is just about protection against deliberate acts. It is also about protection against unintended incidents that might bring one into a state of not being subject to threat. It seems like one slight difference between security and safety is that security specifically protects against crime, while safety specifically protects human lives and health. However, I do not think this distinction is adequate. Protection of human lives Eirik Albrechtsen, NTNU 2
3 and health can be protection against deliberate (and criminal) acts such as murder attempts and violence. When an unintended accident at an industrial plant happens, it might be a violence of the Working Environment Act, which per definition is a criminal act. Taking shortcuts in order to get more efficient work and less workload are deliberate incidents as well, which might lead to an accident at an industrial plant. Ignorance of procedures leading to an accident is a deliberate incident as well. Thus, it will not be fully correct to say that safety is protection against unintended incidents. It is about time to end this grammatical discussion before it gets even more confusing. It is definitively complicated to distinguish safety and security. The basic idea is the same in both understandings; protecting assets from a possible hazard or threat. Thus, it might be unnecessary to distinguish them. A slight difference seems to be that security is related to criminal acts (e.g. espionage, theft, terrorism) and that safety is related to the risk of injury of humans. As discussed above neither deliberate or unintended incidents are directly associated with criminal incidents or injuries. What the differences actually are, still remains as a question. Even persons with English as their mother language I have talked to, have difficulties by distinguishing the two. From these persons point of view the difference lies in a kind of tacit knowledge, and is thus found difficult to describe. 2.2 Basic ideas of security and safety In order to understand differences, we have to look at the basic ideas of both security and safety. Traditions At it s simplest, safety means protection from accidents. This short expression gives a lot of possibilities bringing a number of issues into the safety science. Safety science is related to the health and well being of people at work and in other activities. The longest traditions of safety research come from the high-risk industries, including nuclear plants, shipping, offshore operation (oil and gas production) and transportation. The modelling of accidents may cover technological, human and organisational factors. Still, focus is principally on the unintended incidents (Kufås, 2002). Security has its roots in theft protection. Today the field covers everything from personal to national security, including financial crime, information protection, burglary and espionage among others. Security relates to those problems where people act deliberately to gain profit or, for some reason, create harm. Consequently, financial business, the trading sector and the national defence have the longest traditions of security work (Kufås, 2002). Hazards/threats Safety is protection against hazards, while security is protection against threats. Within the field of safety, hazards represent a risk for human health and lives, environment, production and material objects. The hazards are tightly related to the concept of energy release. An incident involves a sudden and uncontrolled release of energy (Kjellén, 2000). The injury or damage develops when the uncontrolled energy hits the human body, environment or material assets. The energy might be Eirik Albrechtsen, NTNU 3
4 mechanical, chemical, electrical, thermal, kinetic, etc. Uncontrolled energy might develop due to mechanical failures, human failures and influence from the environment. Threats within the field of security can always be tracked down to humans. Incidents is a result of a person or a groups will. The threats within security can be divided into external threats and insider threats (i.e. inside the organisation). The external threats (e.g. hackers) principally imply deliberate incidents. This external threat makes the picture of threats more complex and adds uncertainty. It is impossible to control the external threat, the only thing the organisation can do is to protect oneself. Further it is difficult to predict the threat (where, when and how the attack appear), and it might be difficult to find the responsible after an incident since the attacker seldom leave any tracks behind. In contrast to the external threat, the insider threat can be unintended as well as deliberate. Within the field of safety, hazards are within the organisation. The threats within industrial safety can be characterised as more proximate than within information security. It is possible to physically see and sometimes touch the hazard, while security threats are often not viewable and physically close (the threat can be at the other side of earth). This proximity within industrial safety provides a simpler and better overview of the hazard, which gives a good understanding of the hazard. Deliberate and accidental acts The hazard within industrial safety is mainly associated with unintended incidents, in contrast information security protects against deliberate as well as unintended incidents. The threats within security are related to human threats, as an incident most often is a result of one person or a group s will. There are deliberate incidents in industrial safety as well. The difference between deliberate incidents in information security and industrial safety is illustrated in Figure 1. The figure shows deliberate incidents in industrial safety above the time axis, while deliberate incidents in information security is beneath the time axis. The arrows indicate how the purposes of the deliberate incidents are related to the causes, incidents and consequences. In industrial safety the purpose of deliberate incidents is not directly related to the incident and consequences. In contrast the purpose of deliberate incidents in information security is mainly to get a benefit from the incident, regardless of the consequences of the incident. The deliberate incident within industrial safety do not want incidents to happen, the deliberate acts are made in order to do work more efficient and less effortful. These deliberate acts can be characterized as cynical, calculating and ignorant. Deliberate acts within information security are malicious acts, forcing the incident to happen by the desire of beneficial consequences for the attacker. For a further discussion see Mølmann (2003). Eirik Albrechtsen, NTNU 4
5 Figure 1 Purposes of deliberate incidents influence on cause, incidents and consequences Causes Security relates to those problems where people act deliberately to gain profit or, for some reason, create harm. Hence, incidents are most often a result of a persons or a group s will. A safety incident usually has several contributors, such as bad conditions or several unintended actions. The accident is then a result of these contributors working together, which is outside the control of one person. Security incidents are results of planned action, i.e. acting in way in order to achieve a wanted outcome (e.g. money), while safety accidents are unplanned (no one plans to cut his finger in a sawing machine). The security incidents are mainly malicious and criminal acts. Safety accidents are seldom, if ever, malicious, but they can be criminal as they often are violations against regulations (see section 2.1). Losses The losses within industrial safety are injuries and death of people, damage of the environment, material/production costs, delays in delivery and loss of reputation (Kjellén, 2000). The safety field is also related to reliability of industrial assets. The range of consequences is broad for security, the losses are mainly related to physical assets and information. The losses are to a large extent directly related to economical loss (loss of income, material loss of technology, loss of man-hour, loss of reputation, insider incidents with financial gain as aim). It is easier to replace the losses within security than within safety, as it is more easy to replace stolen assets through e.g. insurance (if insured) than to bring back a human life. Eirik Albrechtsen, NTNU 5
6 Uncertainty The uncertainty dimension of the threats are much more present within the field of security than in safety. This uncertainty on threats and consequences in security is created due to: - High degree of complexity in information technology systems - Unforeseen and unwanted interactions - Non-proximity of threats, threats beyond sight - External threats are difficult to predict and control - Deliberate threats (internal/external) are difficult to predict - Broad range of threats - Change of technology - Need for knowledge to understand the information technology Surroundings The security field is more regulated as well as affected by the society, than what is the case of safety. Security problems reflect the society through is social structure, economic conditions, its perception of law and crime, and its morality (Kufås, 2002). Security is relevant for a wide range, if not all, companies, while safety is most relevant for the industry and transporting sector ( heavy safety, not SHE). For a store or a consultant company, security will be more important than safety. Everybody deals with security in some way e.g. locking your door is security. Security holds a mirror up, not to nature, but to society and its institutions, reflects the aspect that humans, as members of society and institutions, are what we are protecting us from. Concerning environmental factors in the surroundings of the individual is also important. 3 Summary of comparison 3.1 Similarities The basic ideas of industrial safety and security are the same; both are protecting assets from hazards/threats creating safe/secure conditions. Nevertheless, there are some nuances that distinguish them. By taking these nuances into consideration it is possible to coordinate security and safety management. In addition security management can learn from safety management, especially on the field of organisational aspects. Eirik Albrechtsen, NTNU 6
7 3.2 Differences Differences between security and safety is presented in table 1 Table 1 Main differences between security and safety Causes Security An incident is most often a result of one person or a group s will Safety An incident is most often a result of human behaviour in combination with the environment Causes Often planned actions Often unplanned Causes Criminal acts Criminal acts (Working Environment Act) Causes Mainly malicious acts Seldom, if ever, malicious Causes Mainly deliberate acts with a wish of a wanted output/consequence of the act. Threats/hazards External and internal human threats Threats/hazards Threats are not always observable, tangible and proximate Loss Surroundings Relevance Uncertainty Loss is mainly related to physical assets and information Reflects the state of society through its structures, economical situation, lawabidingness and moral Relevant for a wide range of companies High degree of uncertainty and low degree of knowledge about threats within Mainly deliberate acts without a wish of a wanted output and accidental incidents Internal human threats Hazards are observable, tangible and proximate Loss is related to human injuries/death and reliability of industrial assets Includes physical and environmental conditions not only humans and society More relevant for the industry and transporting sector 4 Security Based on the discussion above, a possible definition of security might be: A condition of being protected against planned, malicious and criminal incidents from a wide range of threats, where what is protected is all kinds of values to an organisation/individual and incidents happen due to the wish for a wanted output/consequence for the attacker. Eirik Albrechtsen, NTNU 7
8 5 Conclusion The paper has discussed similarities and differences between safety and security, they are both about protecting assets from threats/hazards. The main differences found in the discussion is shown in table 1. The discussions of security and safety has lead to a possible definition of security. By taking the differences between security and safety into consideration it is possible to use safety management strategies in security management as well. Coordination of security and safety management is possible 6 References Albrechtsen E, A generic comparison of industrial safety and information security. Term paper in the PhD course "Risk an Vulnerability", NTNU. December Available at Hovden, J., Sikkerhetsforskning. En utredning for NFR, Institutt for industriell økonomi og teknologiledelse, NTNU Trondheim, Kjellén, U Prevention of Accidents Through Experience Feedback.Taylor and Francis Kufås, I, A framework for information security culture; could it help on solving the insider problem? In Kufås, I and Mølmann, R.A., 2003, Informasjonssikkerhet og innsideproblematikk. Institutt for produksjons- og kvalitetsteknikk, NTNU Mølmann, R.A., The Human Factor Taxonomy for classifying human challenges to information security. In Kufås, I and Mølmann, R.A., 2003, Informasjonssikkerhet og innsideproblematikk. Institutt for produksjons- og kvalitetsteknikk, NTNU Pearsall, J. and Hanks, P. (eds), 2001, The new Oxford dictionary of English, Oxford, Oxford, University Press, ISBN Skavland Idsø, E. og Mejdell Jakobsen, Ø., 2000, Objekt- og informasjonssikkerhet. Metode for risikoog sårbarhetsanalyse, Institutt for produksjons- og kvalitetsteknikk, NTNU Eirik Albrechtsen, NTNU 8
An approach for evaluating methods for risk and vulnerability assessments
Risk, Reliability and Societal Safety Aven & Vinnem (eds) 2007 Taylor & Francis Group, London, ISBN 978-0-415-44786-7 An approach for evaluating methods for risk and vulnerability assessments E. Ford IRIS,
Enterprise Security Risk Assessments What are we trying to protect and why?
DSW Consulting Pty Ltd ABN: 88 131 241 113 NSW SECURITY MASTER LICENCE: 409991858 ACT SECURITY MASTER LICENCE: 17501699 VIC SECURITY REGISTRATION: 716 877 70S QLD SECURITY ADVISOR LICENCE: 3440620 www.dswconsulting.com.au
Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART. Section 3.1 What Is a Crime?
Chapter 3 SECTION OPENER / CLOSER: INSERT BOOK COVER ART Section 3.1 Chapter 3 What Criminal Is a Crime? Law Section 3.1 Section 3.2 Particular Crimes Why It s Important Learning the essence of criminal
Dealing with risk. Why is risk management important?
Why is risk management important? Things don t always go according to plan: a company s sales manager changes employment in the middle of an important project, a packaging machine breaks down, a lathe
performance Tackling the Challenges To Develop Effective Safety Cultures
improving human performance Tackling the Challenges To Develop Effective Safety Cultures PAM BOSCHEE, OIL AND GAS FACILITIES SENIOR EDITOR Human error is identified as a root cause of accidents and incidents
Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative
Final Draft/Pre-Decisional/Do Not Cite Forging a Common Understanding for Critical Infrastructure Shared Narrative March 2014 1 Forging a Common Understanding for Critical Infrastructure The following
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com
Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two
(voľný riadok písmo Arial 12) ENTERPRISE RISK MANAGEMENT AND THE INFORMATION SECURITY
Ž I L I N S K Á U N I V E R Z I T A V Ž I L I N E F A K U L T A Š P E C I Á L N E H O I N Ž I N I E R S T V A KRÍZOVÝ MANAŽMENT - 1/2012 (voľný riadok písmo Arial 12) ENTERPRISE RISK MANAGEMENT AND THE
Risk Assessment / Risk Management Protocol
1 Canadian Pacific Railway Risk Assessment / Risk Management Protocol Overview / Outline At Canadian Pacific Railway, we conduct risk assessments of our activities and operations for a number of different
Global Corporate IT Security Risks: 2013
Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs
EXECUTIVE SAFETY LEADERSHIP
EXECUTIVE SAFETY LEADERSHIP EXECUTIVE SUMMARY This guide offers clear explanations of health and safety concepts that are important to executives and board members, and provides practical solutions that
Lone Working. A guide for safety representatives
Lone Working A guide for safety representatives November 2009 The HSE says lone workers are those who work by themselves without close or direct supervision. A huge number of jobs can require people to
Car Parking. A Health and Safety Perspective. David Bone
Car Parking A Health and Safety Perspective David Bone Contents 1: Introduction 2: Legislation 3: Management Systems 4: Common Workplace Hazards Introduction HEALTH AND SAFETY Is a condition free from
Home Invasion Safety. Protecting Your Family
Home Invasion Safety Protecting Your Family Point of Entry and Confrontation A home invasion is when robbers force their way into an occupied home, apartment or hotel room to commit a robbery or other
CRITICAL/NON CRITICAL INCIDENT MANAGEMENT AND REPORTING PROCEDURE
CRITICAL/NON CRITICAL INCIDENT MANAGEMENT AND REPORTING PROCEDURE This procedure must be read in conjunction and interpreted in line with the Critical/Non Critical Incident Management and Reporting policy.
Risk Assessment Guide
KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment
MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0
MAJOR PROJECTS CONSTRUCTION SAFETY SECURITY MANAGEMENT PROGRAM STANDARD HS-09 Document Owner(s) Tom Munro Project/Organization Role Supervisor, Major Projects Safety & Security (Canada) Version Control:
DRILL OF THE MONTH INSTRUCTOR GUIDE. Teaching/Learning Materials: LCD and laptop for PowerPoint slides
DRILL OF THE MONTH INSTRUCTOR GUIDE Title: CRIME / FIRE SCENE INVESTIGATION Time Required: 1-2 Hours Teaching/Learning Materials: LCD and laptop for PowerPoint slides References: Arson Detection for the
Hazardous Materials Security Awareness
Hazardous Materials Security Awareness Security Awareness Objectives Provide employees with skills to: Identify hazardous materials (hazmat) security risks Improve transportation security Recognize and
QUANTITATIVE RISK ASSESSMENT FOR ACCIDENTS AT WORK IN THE CHEMICAL INDUSTRY AND THE SEVESO II DIRECTIVE
QUANTITATIVE RISK ASSESSMENT FOR ACCIDENTS AT WORK IN THE CHEMICAL INDUSTRY AND THE SEVESO II DIRECTIVE I. A. PAPAZOGLOU System Reliability and Industrial Safety Laboratory National Center for Scientific
London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments
London 2012 Olympic Safety and Security Strategic Risk Assessment (OSSSRA) and Risk Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments Introduction London 2012
Managing the Risk of Work-related Violence and Aggression in Healthcare
Managing the Risk of Work-related Violence and Aggression in Healthcare Information Sheet November, 2014 The purpose of this information sheet is to provide information and guidance on managing the risk
PHYSICAL SECURITY. A Primer and a Story of Why it s Necessary
PHYSICAL SECURITY A Primer and a Story of Why it s Necessary 1 What Is PhySec? Physical Security consists of physical, logical and design measures which protect people, physical property and other assets
Master of Science in Risk Management and Safety Engineering at Lund University, Sweden. Johan Lundin & Robert Jönsson
The Risk Management and Safety Engineering Programme Johan Lundin Master of Science in Risk Management and Safety Engineering at Lund University, Sweden Johan Lundin & Robert Jönsson The Risk Management
Section A: Introduction, Definitions and Principles of Infrastructure Resilience
Section A: Introduction, Definitions and Principles of Infrastructure Resilience A1. This section introduces infrastructure resilience, sets out the background and provides definitions. Introduction Purpose
INS 3101: PRINCIPLES OF RISK MANAGEMENT AND INSURANCE. By 5315045 Pichaya Sadudeechevin
INS 3101: PRINCIPLES OF RISK MANAGEMENT AND INSURANCE By 5315045 Pichaya Sadudeechevin Chapter 1: Risk and Its treatment What is risk? Risk is uncertainty concerning the occurrence of loss. - Objective
City of London Supported Housing. Incident Reporting Procedure
City of London Supported Housing Incident Reporting Procedure Policy purpose Policy scope Legal requirements Definition of Responsibilities Mandatory procedures Practical guidance Related - Serious incident
Violence at work A guide for employers
at work A guide for employers People who deal directly with the public may face aggressive or violent behaviour. They may be sworn at, threatened or even attacked. AT WORK a guide for employers This document
Performance Indicators in major hazard industries An Offshore Regulator s perspective - Ian Whewell
Performance Indicators in major hazard industries An Offshore Regulator s perspective - Ian Whewell Background Much has been written about indicators of health and safety performance and a great deal of
REINVESTMENT STRATEGY MAKING FOR DISTRIBUTION NETWORKS
REINVESTMENT STRATEGY MAKING FOR DISTRIBUTION NETWORKS Maria D. Catrinu, Agnes Nybø, SINTEF Energy Research [email protected], [email protected], Dag Eirik Nordgård NTNU [email protected]
Guidelines for Setting up Security Measures to Stop Domestic Violence in the Workplace
Guidelines for Setting up Security Measures to Stop Domestic Violence in the Workplace As of June 15, 2010, all employers in Ontario are responsible for protecting workers when domestic violence follows
NORWEGIAN PROJECT MANAGEMENT PRINCIPLES APPLIED IN THE JURONG ROCK CAVERN PROJECT
NORWEGIAN PROJECT MANAGEMENT PRINCIPLES APPLIED IN THE JURONG ROCK CAVERN PROJECT FINN FAGERVIK 1, PETTER PLASSBAK 1 and TEO TIONG YONG 2 1 Sintef-Tritech-Multiconsult (STM) Consortium, Singapore E-mail:[email protected]
DEVONSHIRE HOUSE SCHOOL
DEVONSHIRE HOUSE SCHOOL Risk Assessment POLICY This policy is for the whole school including EYFS What is a risk assessment? A risk assessment is a tool for conducting a formal examination of the harm
Policy for Protecting Customer Data
Policy for Protecting Customer Data Store Name Store Owner/Manager Protecting our customer and employee information is very important to our store image and on-going business. We believe all of our employees
Managing A Vehicle Fleet In Australia
Safety First Managing A Vehicle Fleet In Australia CONTENTS Introduction 3 Statistics 4-5 Protecting Your People 6-7 Protecting Your Business 8-9 Work Health and Safety Act 10-11 Page 2 Introduction This
Identifying Cyber Risks and How they Impact Your Business
10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates
WHS Induction Series. 36 Toolbox Talks. Contents
36 Toolbox Talks 3-5 minute toolbox talks for induction or refresher safety training. Having regular training programs that educate your workers about workplace issues has never been easier than now with
Security Management Training Course Notes
Security Management Training Course Notes SECURITY MANAGEMENT Security Management Framework Context Analysis Who are we? Mission Values People Political stance Where are we? Historical background Political
Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry
Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry Templar Executives NIAS 2007 DHR 2008 IAMM 2008 1 st CSS 2009 2 nd CSS 2011 Advising Government & Industry
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
How To Protect Your Business From A Cyber Attack
Intelligence FIRST helping your business make better decisions Cyber security Keeping your business resilient Cyber security is about keeping your business resilient in the modern technological age. It
Cyber security exposure
RECOMMENDATION: MANAGEMENT Cyber security exposure Given the highly dynamic development of the threat situation in cyber space, as exact a knowledge as possible of what aspects concern you is a prerequisite
Annex 1: Assesing risk: threats, vulnerabilities and capacities
Annex 1: Assesing risk: threats, vulnerabilities and capacities There is no widely accepted definition of risk, but we can say that risk refers to possible events, however uncertain, that result in harm.
Cyber Security. Protecting the UK water industry
Cyber Security Protecting the UK water industry In today s connected world, cyber attacks are a daily occurrence. These attacks can have potentially disastrous consequences for water companies and the
Accident Investigation Basics
Accident Investigation Basics Think about the difference between incident and accident. What RESULTS are you looking for: This would include removing or minimizing the potential for another occurrence.
CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE
1 CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE Gavin McLintock P.Eng. CISSP PCIP 2 METCALFE POWER STATION 16 April 2013 Sophisticated physical attack 27 Days outage $15.4 million
Assessment of natural hazards, man made hazards, technical and societal related risks and associated impact.
Aon Business Continuity Planning The Aon Business Continuity Planning practice provides consulting services that allow Aon clients to measure and manage their strategic and tactical risks through Crisis
Sytorus Information Security Assessment Overview
Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)
APPENDIX F HSEQ REQUIREMENTS
APPENDIX F HSEQ REQUIREMENTS CATEGORY IV (Hired Temporary Personnel & Services Onshore) Table of Contents 1. GENERAL... 2 2. DEFINITIONS... 2 2.1 ACCIDENT... 2 2.2 DEVIATION PERMITS... 2 2.3 FAC, FIRST
Understanding insurance and risk management A guide for community groups who organise events
Understanding insurance and risk management A guide for community groups who organise events Introduction 1 This booklet aims to give general advice, assistance and provide further information on insurance
Alcohol and Other Drugs in the Workplace. employer guide
Alcohol and Other Drugs in the Workplace employer guide 1 2 Managing alcohol and other drugs as hazards in the workplace Introduction This resource has been developed by the Alcohol Advisory Council of
A Risk Assessment Methodology (RAM) for Physical Security
A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to
An Analysis of Accidents Caused by Improper Functioning of Machine Control Systems
International Journal of Occupational Safety ANALYSIS and Ergonomics OF ACCIDENTS (JOSE) CAUSED 2004, Vol. BY CS 10, FAILURE No. 2, 129 136 An Analysis of Accidents Caused by Improper Functioning of Machine
DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE THREAT OF DDOS ATTACKS IT SECURITY RISKS SPECIAL REPORT SERIES
DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5500 companies in 26 countries around the world
Incident Investigation and Reporting Procedures - Code of Practice 3.11
- Code of Practice 3.11 Distribution: To be brought to the attention of all Heads of Service, managers, supervisors, employees, trade union representatives and Head Teachers Introduction This code of practice
Cyber Security, a theme for the boardroom www.kpmg.com/nl/cybersecurity
IT ADVISORY Cyber Security, a theme for the boardroom www.kpmg.com/nl/cybersecurity TABLE OF CONTENTS 1 Cyber security, a theme for the boardroom 3 2 What is cyber security? 4 3 Relevance to the boardroom
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
G9 Offshore wind health and safety association
G9 Offshore wind health and safety association 2013 annual incident data report www.g9offshorewind.com About the G9 Offshore wind health and safety association The primary aim of the G9 is to deliver world
Performing Effective Risk Assessments Dos and Don ts
Performing Effective Risk Assessments Dos and Don ts % Gary Braglia Security Specialist GreyCastle Security TCTC March 18, 2013 Introduction Who am I? Why Risk Management? Because you have to Because
Penetration Testing Is A Bad Idea. Anton Aylward, CISSP, CISA System Integrity
Penetration Testing Is A Bad Idea Anton Aylward, CISSP, CISA System Integrity What are you trying to test? Can hackers break in? You can t prove a -ve Your firewall works? But is it configured? Your IDS
Cornell University PREVENTION AND MITIGATION PLAN
Cornell University PREVENTION AND MITIGATION PLAN Table of Contents Table of Contents Section 1 Prevention-Mitigation Introduction...2 Section 2 Risk Assessment...2 2.1 Risk Assessment Components...2 2.2
Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage
Cyber Terrorism and Australia s Terrorism Insurance Scheme Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage Cyber Terrorism? 2013 cyber attacks on the websites of media companies
Modern two-factor authentication: Easy. Affordable. Secure.
Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks
Security risk analysis approach for on-board vehicle networks
1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle
Campus Security and Safety Report Madison Center September, 2015
Campus Security and Safety Report Madison Center September, 2015 This information is being provided to all students and employees as part of Upper Iowa University's - Madison Center commitment to safety
Clinical Incident Management Policy
Clinical Management Policy Policy Name: Clinical Management Document Number: 1 Page 1 of 13 Policy Portfolio Owner: Manager, Quality and Clinical Governance/General Managers Policy Contact Person: Manager,
Some Basic Risk Concepts
Some Basic Risk Concepts Marvin Rausand Department of Production and Quality Engineering Norwegian University of Science and Technology [email protected] Marvin Rausand, May 4, 2005 System Reliability
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Two dimensions of pure risk
What is Insurance? Insurance is protection against risks. We face many risks in our lives: Car accident Theft Disability Heart attack Etc. Consumers buy insurance to pay for the costs associated with some
Statutory duty of candour with criminal sanctions Briefing paper on existing accountability mechanisms
Statutory duty of candour with criminal sanctions Briefing paper on existing accountability mechanisms Background In calling for the culture of the NHS to become more open and honest, Robert Francis QC,
RISK ASSESSMENT GUIDELINES
RISK ASSESSMENT GUIDELINES A Risk Assessment is a business tool used to gauge risks to the business and to assist in safeguarding against that risk by developing countermeasures and mitigation strategies.
Good Security. Good Business
Good Security Good Business Good Security Good Business Attorney-General s foreword Small business plays a crucial role, not only in our nation s economy but in Australian society. We often make decisions
Select Agent Program Workshop November 16, 2012. Agricultural Select Agent Program (USDA/APHIS) CDC Select Agent Program (HHS/CDC)
Select Agent Program Workshop November 16, 2012 Agricultural Select Agent Program (USDA/APHIS) CDC Select Agent Program (HHS/CDC) Revisions to Regulations 11 (a) through 11 (c)(7): (b) and (c)(2) changed
FORCED LABOUR WHY IT IS AN ISSUE FOR EMPLOYERS
FORCED LABOUR WHY IT IS AN ISSUE FOR EMPLOYERS INTERNATIONAL ORGANISATION OF EMPLOYERS SEPTEMBER 2010 INTRODUCTION Although forced labour is universally condemned and banned and many believe that it is
Fostering Incident Response and Digital Forensics Research
Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel [email protected] September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital
Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
The challenge of corporate safety and security
Safety and Security Engineering 821 The challenge of corporate safety and security M. Lanne & M. Räikkönen VTT Technical Research Centre of Finland Abstract Large organisations need to control several
Guide to Commercial Insurance
Guide to Commercial Insurance Introduction Operating a successful business today requires knowledge in many different areas, and one of the most important things to consider are the types and amounts of
It stands for the Reporting of Injuries, Diseases and Dangerous Occurrences Regulations.
Accident Reporting RIDDOR Safer Business - Better Health Issue date - December 2007 Introduction What is RIDDOR? It stands for the Reporting of Injuries, Diseases and Dangerous Occurrences Regulations.
Chippewa County Courthouse Security Emergency Procedures. Dial 9 9 1 1 FIRE POLICE AMBULANCE
Chippewa County Courthouse Security Emergency Procedures Dial 9 9 1 1 FIRE POLICE AMBULANCE Table of Contents Introduction... 2 Explosion... 3 Civil Disorder/Threat to Personal Safety... 4 Chemical Spill...
Preventing arson in buildings
Preventing arson in buildings More than half of fires in commercial buildings are started deliberately. These maliciously started fires can be particularly dangerous because they often develop quickly,
Crime Statistics. Criminal Offenses, Dalton State College: Main Campus- 650 College Drive Dalton, GA 30720
Crime Statistics Criminal Offenses, Dalton State College: Main Campus- 65 College Drive Dalton, GA 372 Type of Offense On-Campus Residential Housing Non-campus Public Property Criminal Homicide Murder/Non-negligent
COMMUNITY RESIDENTIAL POLICY SCHEDULE
COMMUNITY RESIDENTIAL POLICY SCHEDULE LEASEHOLD AND MORTGAGED BUILDINGS INSURANCE Policy Number N0A4N0V15A0T Agents Name Gallagher Heath Policyholder s Name Guildford Borough Council Millmead House, Millmead,
