News letter april 13
-
Upload
capt-sb-tyagi-coacccfismcsc -
Category
Education
-
view
186 -
download
4
description
Transcript of News letter april 13
specialisenhances Spearheaestablishas well newslette
Let’s
t in the fies the level
ading this hed their Cas individer is on th
N
s profe
ThanAlamoup Thretalaanma
eld. This tl of securi
phenomeCentral Modual resid
he subject
Newsle
essionhttp://www
e alarm md tediousarms andonitoring graded an
ere is alsturn-on-inarm monitd prioritanagementurns out tity prepare
enon are fonitoring dents whof establi
etter: A
alize tww.wix.com
monitorings function d resultan
also mend proced
so need tovestment
toring. Sinties of nts startedto be costedness.
few securiStations. o wish tishing Cen
April 20
the prom/sbtyagi/ic
g and respof securi
nt unneceeans that dures chec
o constantand the in
nce all thethe orga
d off-loadit effective
ity agenciThese meo avail thntral Moni
013
ofessiociss
ponse is pty managssary res
systemscked.
tly audit tntegrity of
ese activitanizationsng these
e and very
es in sometros cateheir serviitoring Sta
onals…
probably thement. Fr
source-mos need to
the efficacf the data
ties occups, the factivities
y dependa
me metroser to big oices. Leaations.
C
…
he most craught witobilizationo be con
cy of the s for very e
py lot of atforward to third-p
able option
where theoffices, indd article
Capt S BFor
complex th False n, alarm nstantly
system, efficient ttention looking
parties – n which
ey have dustries of this
B Tyagi r ICISS
The alarmFraught wneed to bthe efficacmonitoringforward lofield. Thissecurity p
Security sthat acts emergencweek by hproper au
Central Samounts processedpackets wcommunicetc.
Spearheaestablisheas individuhave head
"Licensedmandated
m monitorinwith False be constancy of the syg. Since aooking mans turns outpreparedne
systems seas the li
cy responshighly skillethorities an
tation softwof data a
d by digitawhich arecated over
ading this ped their Ceual residend start and
d" compand to follow c
ng and resAlarms an
ntly upgradystem, retu
all these anagementst to be cosess.
end their snk betwee
se authoritied operatond dispatc
ware has tand integral alarm ree then anr any trans
phenomenentral Monnts who wid surly ben
nies typicacertain reg
ponse is vnd resourced and prurn-on-invectivities ocs started ost effective
signals oveen homes es. A cent
ors trained hes help.
to meet veration withceivers; thalyzed bysmission m
non are fewitoring Stash to avail efit from th
ally offer hgulations.
very complece-mobilizarocedures estment anccupy lot aoff-loading and very
er telephon or any ptral monitoto respond
ery specialh many dhese convey the Cenmedium: P
w securityations. The their serv
he lead tak
higher leve
ex and tedation, alarmchecked. Tnd the inteattention athese activdependab
ne line to apremises aoring statiod to emerg
requiremeifferent alaert the incntral StatioSTN, GSM
y agencies ese metrosices. The f
ken by them
els of serv
dious functim monitorinThere is agrity of the
and prioritievities to thble option w
a central mand the pn is manne
gencies. Th
ents procearm protooming eveon softwaM, Radio, d
in some cater to b
field is widem.
vice and r
ion of secung also mealso need te data for ves of the ird-parties which enh
monitoring police, fire ed 24 houhe station
essing and ocols. Incoent packetre. Event direct line,
metros in big offices,e open and
reliability b
urity manaeans that to constanvery efficieorganizatio– specialiances the
station-thedepartme
rs a day, 7operator a
storing veoming signs to serial
packets , Ethernet,
India, whe industriesd new entr
because t
gement. systems
ntly audit nt alarm ons, the st in the level of
e facility ent, and 7 days a alerts the
ery large nals are
or TCP can be
, GRPS,
ere they s as well rants will
they are
In AustraOperationgenerated
Physical psecurity ro3c. To be
There areand need
A monitotechnologtechnologproviding In additionhighest leelements platform to
- Tra- De- Pro- Imp- Po
Transitio To succesfocused ltransition following dand opercriteria, ctransition
alia Centranal performd by custom
performancooms havegraded at
e no such for licensi
oring centegy to custogy and ma
best-in-cla
n to equipevel of sec
which woo a third-pa
ansition teaecision procoject plannplementatist impleme
n Team
ssfully conleaders mproject. Indepartmenations etcreating peof alarm m
al Stationsmance inclmers' secu
ce includese airlocks w3c central
requiremeng thereof
er must proomers 24 aintaining ass alarm m
pment needcurity is coould becomarty suppli
am identificcess to detning on entation (c
nvert alarmmay be sen addition tnts: procurc. This teaerformancemonitoring.
s are gradludes the
urity system
s measurewhich can l stations s
ents in Indif.
ovide timelhours a dalarm sys
monitoring
ded, enhanontinuouslyme foundaer:
cation termine the
ontinuous
m monitorinelected to o loss prevement, fina
am must me metrics,
Ce
ded on 2 ability of
ms, operati
es such as only be o
still meet ve
ia and PSA
y, consisteay, 365 dstem data service.
ncing alarmy maintaineation to s
e service p
improvem
ng to a thidesign, a
vention, traance, busimeet reguand repre
entral
areas: opthe monitonal reliab
the constrperated inery high st
AR Act 20
ent, high-qays a yea
a integrity
m data inted. The plsuccessfull
provider
ent)
rd-party suanalyze, aansition teness unit l
ularly, definesenting th
l Mon
perational oring syst
bility, data r
ruction of mternally. Tandards.
005 has no
quality servar. Keeping
were cru
egrity is alanning phay convert
upplier, a tand implemam is to inleaders, ITning the o
he organiza
nitorin
and phystem to resretrieval, e
monitoring The highest
o reference
vices utilizig pace wicial to ma
lso necessase may iin-house
transition tment the nclude stakT, real estaobjectives,ation to e
ng St
sical perfospond to eetc.
rooms - mt standard
e of such
ing state-oth the chaaintaining
sary to ensnclude fivealarm mo
team of cualarm mo
keholders fate, legal, f
building nsure a se
tation
rmance. events -
most high is 1a to
services
of-the-art anges in
goal of
sure the e critical onitoring
ustomer-onitoring from the facilities, success eamless
ns
Any plan f
- Un- Est- De- Pre
sup- De- Co- Su- Pre
rec- An- Ne- Pre- No- Exe- De- Est
trac Determin Collectivecustomer-
- Fitn- Tot- The- Ind- Exp- Qu- Fin- Pro
Sourcing critical deprimary an Project P A project assignmefor projecselected s Implemen Convertinhouse, resystem mscrubbed
for the alar
derstand ttablish ope
evelop draftesent souppliers, and
evelop, distomplete supppliers comesent requcommendaalyze RFP
egotiate witesent overv
otify supplieecute cont
evelop perfotablish quack perform
ning the Se
ely, transiti-focused c
ness to tectal cost of e ability to
dustry repuperience a
uality assurnancial streoven metho
decision mecision facnd most cr
Planning
task list caent of tasksct planningsolutions p
ntation
g alarm sequires abmonitoring
to determ
rm monitor
the buy – inerating prot scope of
urcing strad timeline)tribute, andpplier bid mmplete anduest for prations to staP th suppliersview to staers and statract ormance marterly perf
mance metr
ervice Pro
on team ncapabilities
chnical andownershipsupport cu
utation andand qualificrance comength odologies,
must be bctor, the qritical aspe
an be creas. Tasks cag. Clear coprovider are
system mobsolute und
change, tine its acc
ring transit
nterview stcedures fowork for re
ategy (sco) d analyze rmeetings ad return reqroposal (Rakeholders
s akeholdersakeholders
metrics formance mrics
ovider
needs to i. Criteria fo
d functionap urrent and experienc
cations of tmitment
tools, and
ased on tquality of tects.
ted to idenan be assigommunicae the build
onitoring, wderstandinhe data fruracy and
tion may in
takeholderor suppliereview by stope of w
request forand site visquest for in
RFP) suppls
s s of contrac
meetings to
identify suor a succe
al requirem
emerging ce the compan
d value add
he “best vthe equipm
ntify key isgned miles
ation, preciing blocks
whether frong of a derom the efreshness
nclude:
rs
takeholderwork, list
r informatiosits nformationlier short l
ct award
o review a
uppliers thassful servic
ments
equipmen
ny and res
ded service
value/total ment, and
sues that cstones in thise operatof our tran
om in-houefined scoxisting mo
s. The data
rs of
on
list
nd
at providedce provide
t
sources
es
cost” prind operating
can affect he project fing proced
nsition plan
se to thirdpe of wor
onitoring faa then nee
d the moser are as fo
ciple. Whig efficienc
the overalfile to helpdures, andn.
d party orrk. To impacility can
ed to be for
st comprehollowing:
le cost recies would
l project a balance wd partners
r third partplement th
be gathermatted in
hensive,
mains a be the
nd allow workload hip with
ty to in-he alarm red and order to
be insertein new mo Post Imp The alarmCenter haresponseswithin 60performanmetrics, idorganizati
"I locked again thragain!! NStore. Theinvolved in I quickly astation, toscheme b Two weemotorwaysomeone nav, briefc He called told him hare using locking deinside the The police
ed into newonitoring sy
lementatio
m monitorinas to be a s. Each m seconds.nce businedentify oppions’ intern
my car. Aree times. Naturally aey were obn this very
abandonedold them wbeing used
ks later, my service a
had manacase and o
the policehe had pronow to clo
evice. Theye Store, res
e officer s
w monitorinystems, th
on – Cont
ng conversseamless,
metric was . To ensuess reviewportunities nal and ext
As I walkedEach tim
alarmed, I bviously w
y weird situ
d my erranwhat had h
to gain en
my friend'sarea to useaged to geother belon
e and sincebably been
one your sey sit a diststaurant, or
said, “Alwa
ng systemse stage is
inuous Im
sion from psuccessfuassigned
ure continuws. Busine
to strengtternal goal
Cour
d away I hme, as so
looked aroatching meation.
nd, jumpedhappened, ntry into pa
s son had e the toilett into his c
ngings.
e there wen a victim ecurity codance awayr whatever
ays to lock
s and revieset to deve
mproveme
proprietary ul event. Ma target g
uous impress reviewthen partns.
rtesy: Col
heard my coon as I sound and e intently,
d into my cand found
arked cars.
a similar t. When hecar and ha
ere no signof the late
de when yoy and watcr and that t
k your car
ewed againelop the sc
nt
monitoringMetrics neegoal, for erovement,
ws provideership, an
Deepak B
car door unstarted to there werand there
car and spd out I wa
experience came oud stolen hi
ns of his cest robberyou lock youch for theirthey now h
manually w
n for accurachedule for
g platform ed to be asexample 90
it is advie the avend continue
Behl
nlock''. I wwalk aw
e two menseemed no
ped away. s part of a
ce....While ut to his cais mobile p
ar having y tactic – thur doors onr next victimhave a few
with the ke
acy. Once r the chang
to the Thirssigned to 0 percent isable to nue to asse to focus
went back away, I coun sitting ino doubt th
I went stra new, and
travelling;ar less thaphone, lap
been brokhere is a dn your car m. They knminutes to
ey when p
all data is ge over.
rd party Moall the alaof burglardevelop qsess perfoon achiev
and lockedld hear it a car nexey were so
raight to thd very suc
; he stoppan 5 minuttop compu
ken into, thdevice that
using yournow you ao steal and
parking in
in place
onitoring rms and r alarms quarterly ormance ing both
d my car t unlock xt to the omehow
he police ccessful,
ped at a es later,
uter, sat-
he police robbers
r remote re going
d run.
a public
area. Thabe you.” Wwalk awaeasily intebe sure wwhatever Please sh
Details of an hour tlocker......own bag. I dismisseretrieve thlocker (nothere wascash had aisles to passenge Eventuallyagitated aplane....mpassengebeen robbwilling to p I vaguelypleaded wdescriptioto offload if not hund By this timthe rear sable to excriminal aweek, (wicoming fro It is estimpolice aftewhere baoverhead steal any
at way if thWhen you y and use
ercepted bywe rememis in our ca
hare with e
f theft on ato go, dur.I wasn't su
ed any thohe bag, jusot above ms a problem
been stolestop any
ers.... My w
y a stewarand unwil
my wife aners to checbed. It wasprovide an
y remembewith the r
on. It turnedmoney, je
dreds of th
me securitysection watxplain the eactivity is reth 30 alreaom the sam
mated that oer they havags are be
lockers, wvaluable c
ere is somlock up wi
e the remoy the devic
mbered to ar."
everyone
a flight into ring the flure and de
ought of ast to make me) and sm. I examinen, during yone at
wife and I b
rd told meling to sh
nd I were ck their ows only at thy meaning
er seeing rest of thed out to bewelry, cam
housands o
y had boatching the events leadeaching epady on remme town in
only 5% ave arrived ehind or awhile passecontents.
meone sittinth the key
ote button,ce. Look ho
lock them
you know
Hong Konight, I thoecided it w
any wrong sure nothiaw my leaned the cothe flight.the back
both shoute
that secuhow patien
the only wn bags athis point, dgful suppor
a passene passeng
e a passenmera equipof dollars’ w
rded the pevents un
ding up to pidemic promand sincen China.
re being cat their de
away fromengers res
ng in a caupon exiti it sends tow many tm - and b
w in the ho
ng last weeought I nowas probab
doing, buing suspiciather bag
ontent, onlyI raised thof the p
ed for assis
urity had bnce or un
people ct which podid I see art.
nger wearigers to se
nger standipment andworth of sto
plane, the Cnfold. Evenmy apprehoportions ae early De
caught judgestination.
m the passst or watch
r nearby wing, it doesthe code times we abingo, som
ope that w
ek, as narroticed my bly a fellow
ut upon arious had owas the o
y to find alhe alarm aplane disestance from
een callednderstandincontrolling int three fe
any evidenc
ing black, ee if theyng in frontfalse docuolen goods
Captain hantually a pohending theand the aucember) o
ging by theThey sit i
sengers an movies, ta
watching fos not send through thll lock our d
meone has
we can frus
rated by abag being
w passeng
rrival in Hoccurred. Wonly one ol of my wif
and my wifeembarkingm the stew
d but passeng....they jthe passe
ellow travece from th
sporting y could re
of me, whments, runs.
ad been inoliceman be thief. I ha
uthorities caon flights in
e reports on the backnd systemake them t
or their nexthe secur
he airwavedoors withs our cod
strate thes
n affected g replaceder, moving
K, somethWhen I opeoccupying fe's jewelryfe and I qu....there w
wards and s
engers wejust wanteengers. I elers reporhe cabin cr
a white bemember aho once idenning into t
nformed anboarded thave since b
caught thrento HK, wit
of passengk row of th
matically puto the bac
xt victim, itity code, bs where it our remote...and po
se thieves
passenged in the og it to acce
hing told toened the othe space
y, along wiuickly blockwere aroustewardess
ere becomed to get pleaded w
rted they hrew that th
base-ball canyone fitentified protens of tho
nd was stae plane anbeen inform
ee thieves, th all the c
gers contache plane obull them fk of the pl
t will not but if you t can be te just to otentially
s.
er..."With verhead ess their
o me to verhead
e I knew th some
ked both und 120 ses.
ing very off the
with the had also hey were
cap and tting my oceeded ousands,
anding in nd I was med this just last
criminals
cting the bserving from the ane and
They prey on foreign airlines as the penalties are so lenient, the pay- off makes it worth the risk. I naively have never thought of robbers operating on planes, but now I have experienced it first hand, there are a few takeaways:
Hand luggage should always be locked. Do not assume luggage under your seat is safe....last week one passenger had her purse
stolen by the guy sitting next to her while she slept! If in doubt, wear or keep any valuables ON YOU at all times! Don't assume, like me, that everyone on a flight is a law-abiding citizen.
5. Do not assume business class travel is secure....robbers can be wealthy.
When Radha Baijal checked her email on November 3 last year to see if there was any response to her application for a job in the UN, she couldn't believe her eyes. In her inbox lay a letter saying she had landed her dream job. As it turned out, Radha shouldn't have believed her incredibly good luck. For though she had posted her application on the genuine UN site, the 24-year-old schoolteacher from the Capital today finds herself poorer by Rs 1.5 lakh and smarting with the realization that she' has been had. Here is what happened. Radha received a signed reply from one Dr Christy Owen, "Chief Administrative Officer, US Committee for the UN", confirming her appointment. The email communication carried the UN logo and address. As instructed, she contacted one Kate Bruce at the given email address for instructions before she was to fly off for a "training program in Seattle". Radha was instructed to transfer Rs 1.5 lakh into a US bank via a given swift account number. The unsuspecting victim delved into her father's retirement benefits and sent the money. Radha smelled a rat only when she responded to a second request for money - this time for Rs 70,000 – by saying she had none and asking that it be deducted from her promised salary of $152,678 per year. That's when all communication from the other end stopped. N.Y. Suresh Kumar, a zoology scholar in Kerala, received a similar letter saying he'd been "selected" for the post of environmental officer in the "United Nation Center for Development Initiative" and a request for $2,280. Luckily for him, Suresh Kumar got the letter checked by the UN Information Center’s office in Delhi and was told that the UN had no such outfit. In the last six months, a number of people from across the country have approached the Delhi office to verify the authenticity of "job confirmation letters" sent to them by email and post. These letters come complete with the UN logo and address of the United Nations headquarters in New York. In all cases, the letters have turned out to be fake. The Geneva office of UNAIDS' had in' September last year issued a worldwide alert warning people to verify the authenticity of emails and letters carrying its logo or address before meeting any request for money. It had also requested people to provide details of suspect communications to help investigate the fraud. How they're duped
All letters came with UN logo and address of UN headquarters in New York Job offers were followed by requests for money There were also invitations to conferences and training programme The Delhi office of UN Information Centre has received several requests for verification of
the authenticity of such 'job confirmation letters' in last six months
Prior warpeople to request fo
and preda
Protect yo
Social Sepersonal i
admissionyou post. want to bebe complcomputersUnderstan
judge peoin person,as the per
They mayinformatio“spoof,” oDon’t clicunexpectebefore clic
get. Anti-vsoftware, online acprevent hespeciallyInternet wadvantage
sorts of
rning: Theverify the
or money.
ators.
ourself by t
ecurity numinformation
ns personnDon’t disce made puletely erass. Some nd how the
ople by pho, do so durson’s plac
y contain von – incluor copy theck on linked messagcking on lin
virus softwwhich loo
ctivities withackers any importantwhenever e of free pa
scams, fr
e Geneva oe authentic
taking som
mber, addrn that could
nel, employclose anythublic. And rsed. Evensocial ne
e site work
otos or inforing the dace of emplo
viruses or ding your e email adks or dowge from snks or atta
ware, whichoks for prothout yournd unautht if you hait’s turned
atches thaC
rom phony
office of Ucity of ema
me common
ess, phoned be used
yers, stalkhing about remember if it’s motworking ss and wha
ormation thay in a puboyment.
spyware online pa
ddresses onload atta
someone wchments. A spam f
h scans inograms thar knowledghorized coave a broad on. Loot manufact
Criminals s
y lotteries
UNAID hadails/letters
Social netabout theworld usinemail, and While yonetworkinembarrasintentions
n-sense pr
e number,by crimina
kers, con ayourself, y
r that onceodified or sites allow
at privacy c
hey post abblic place,
that couldasswords of friends tachments whose add
filter can h
coming meat have bege, can p
ommunicatadband conok for proturers offescan socia
s to bogu
in Septemcarrying its
tworking sem and cng forumsd instant m
ou can mg sites, sing situa, such as
recautions.
, bank accals.
artists, nosyour friends
informatiodeleted,
w users tchoices you
bout themsand ask fo
damage and acco
to fool youin emails
dress you
elp reduce
essages foeen install
protect youions from nnection b
ograms thar to fix newl networkin
s employ
mber issues logo or a
ites enablecommunicas, interest messaging.
make newyou ma
ations andhackers,
.
count or cr
sy neighbos, or familyon appearsolder verso restrict u may have
selves. If yor informat
your compount numbu into think
from strarecognize
e the numb
or troublesled on youu from on
entering because yoat offer auwly discoveng sites to
ment and
ed a worldwaddress be
e people tate with ogroups, b
w friendsay also d people identity th
Never pro
redit card
ours – anyy memberss on a Websions mayaccess t
e. Af
you decidetion that yo
puter or stbers. Somking that tangers, ae, check w
ber of unw
some files,ur computline identiyour com
our compuutomatic uered probleo find pote
d business
wide alert efore mee
o post infoothers aroblogs, chat
s throughbe expowho ha
ieves, con
ovide or po
numbers,
Police,
one can ss that you wb site, it cay exist ono certain
fter all, it’s
e to meet sou can veri
teal your pe messagthey’re fromnd if you with them
wanted em
and anti-ster and traty theft. F
mputer – wuter is opeupdates aems. ntial victim
s opportun
warning ting any
ormation und the t rooms,
h social osed to ave bad n artists,
ost your
or other
college
ee what wouldn’t an never others’ people.
s hard to
omeone ify, such
personal ges may m them.
get an directly
mails you
spyware ack your Firewalls which is en to the nd take
ms for all
nities to
investmenexpenses
The “GlobThe eveninfrastructregional sbefore the There areConferencarising ouunparallelSecurity oA Synergsecurity s Internatioconferencspeaker aSecurity o
Su
P.S. - If youwill move it
nt fraud. Ins or other e
bal Energynt focusesture assetsspecific as e security p
e interactivce 2013 wut of civil led platforof Supply Cgy with HStructure &
onal Counce and Caand also wof Oil, Gas
uggestion
u don't like toout of our co
n some casemergencie
y Security Cs on minims. The conwell as glo
professiona
ve panel dill cover seunrest, te
rm for globChain and SE and Seintegrate i
ncil for Iapt SB Tyawill also ma
& Pipeline
ns & feedb
o receive our ontact list, tha
ses they faes, or to co
Conferencmizing thenference probal securials.
discussionsecurity issuerrorist actbal securitSecurity ofecurity, Crt into the b
ndustrial agi; Chief ake an ime Assets”. F
back may b
newsletter, wank you!
alsely befrome to the
ce 2013 is e risk of crovides a city issues a
s and inteues relatedtivities, anty professif Key Infrarisis Prepabusiness co
Security Councilor portant preFor details
be sent to
we apologize
iend peopUnited Sta
being orgacriminality comprehenand how to
ernational d to both ofnd a compionals, hig
astructure, aredness &ommunity.
& Safetyof ICISS
esentations use the lin
h
o us on e-m
for bothering
le and theates from a
anized fromand terro
nsive educo tackle div
case studffshore andpetitive gloghlighting bEnterprise& Training
y (ICISS) will particon the su
nk given behttp://pcstco
mail: capts
g you. Please
n ask for manother co
m 20-22 Morism for cational proverse and d
ies. Globad onshore obal markbest indus
e Security Rg, How to
is Event cipate in thubject of “Eelow - onsultant.c
sbtyagi@y
e let us know
money for ountry.
May 2013 adevelopm
ogram focudifficult cha
al Energy oil and gaet. It prov
stries pracRisk Manaform a co
partner whe event aEnergy Se
com/global-
yahoo.co.
w your mail ad
medical
at Dubai. ent and using on allenges
Security s assets
vides an tices on gement, orporate
with this as panel ecurity &
-security/
.in
ddress, we