Sunday, April 21, 2019

Manage IT Security for the London Olympic 2012 games Essay

exert IT Security for the London Olympic 2012 games - Essay ExampleA asylum and security measure measure strategy and security measures have been set up to respond to these. According to BBC News (2011), 13,500 armed forces personnel and 10,000 police officers get out be deployed during the Olympics to enforce security. This will be backed by 50 marine officers in unfluctuating response boats who will be joined by 100 military personnel (Seida 2012). The structure of the safety and security strategy has been built around strategic objectives and each of these be will be delivered though a special programme headed by a programme manager. The Protect Programme will visualize the safety and security of games sites, infrastructure and venues, and pack involved in the Games. The Programme will also go out protecting people travelling to the Games. The Prepare Programme will provide specialist response by ensuring that the necessary contingencies and workforce are in place to mana ge events that could signifi hindquarterstly compromise or sever the security of the Games. The Identify and Disrupt Programme will provide the required capacity and capability to refer and disrupt all forms of threats to the Games. Command, Control, Plan and Resource (C2PR) programmes will ensure that required resources are available and locoweed be deployed to the necessary sites to provide safety and security (Home Office 2012). One of the assumptions for this strategy is that the greatest security threat will be terrorism. Despite the above security, the potential IT security vulnerabilities of the event are silence high and the major threat is identity theft. Vacca (2003) defines this as a type of crime where someone steals the identity of someone else and thwarts as that person. This is basically an identify fraud. In true-name ID fraud, the persons identify information is not modified. Terrorists are also same(p)ly to stealing key pieces information from people like dr ivers license numbers and social security numbers and combine them with fake information to create naked identities which they will use to gain entry into the games venues. This is called synthetic ID fraud as noted by McFadden (2010). Criminals could pose as fans, players, visitors and even London Organising Committee for the Olympic Games (LOCOG) officials. Once they gain entry into the venues, they commit terrorist attacks. They can also use these IDs to obtain goods and services. ID theft is a form of cyber crime. Giles (2010) explains that hackers access personal information of former(a) people online. To get this information, the terrorists could send messages posing as the official website for LOCOG, trying to sell tickets. As people respond, they get their personal details and use them to make fake IDs. ID theft could also result from phishing attacks like man-in-the-middle phishing. This is where a criminal positions themselves between the legitimate site and the user (Emi gh and Labs 2005). In this way, they will save of import information from different sources and send false messages between LOCOG and its users. To detect this, LOCOG will have to setup a spoof-reporting email address that users will send mails to. This will provide

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.