Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Midstream Automation, Instrumentation & Control Congress 2015marketinglbcg
THE FIRST MIDSTREAM-SPECIFIC, OPERATOR LED FORUM FOCUSED ON RAPIDLY TRANSLATING ACCURATE FIELD DATA INTO MORE PROFITABLE BUSINESS DECISIONS
Regardless of market conditions the driving down of operational costs, improving safety and security and more precisely controlling flow to increase revenue are crucial challenges facing pipeline and facility operators. At a time of falling commodity prices, never has the role of automation and efficient data management been so critical.
To fully leverage the benefits of automation, operators need to benchmark the functionality, reliability and costs of SCADA and DCS systems, communication and measurement devices, control room software and PLCs to design an effective and secure network to speed up the process of gathering field data for the control room, business departments and revenue allocations.
However despite years of requests, midstream automation, SCADA, instrumentation, measurement and control professionals still require a vendor-neutral forum, facilitated and led by midstream operators in which they can share best practices and benchmark the cost-benefits of instrumentation on the market.
Welcome To The First Operator-Led Congress To Focus On Analyzing Automation Strategies Specific To The Midstream Industry
The inaugural Midstream Automation, Instrumentation & Control Congress 2015 will deliver 20+ operator case studies from communication strategies for remote locations and security standards to alarm management and leak detection. Speakers will unveil how to integrate new RTUs, PLCs and measurement devices with legacy systems, how to select and design a control system with the latest SCADA and DCS and how to ensure HMI meets PHMSA regulations. Throughout, discussions will focus on how to turn investment in automation into measurable improvements in safety, security, flow control and operational efficiency.
Midstream Automation, Instrumentation & Control Congress 2015marketinglbcg
THE FIRST MIDSTREAM-SPECIFIC, OPERATOR LED FORUM FOCUSED ON RAPIDLY TRANSLATING ACCURATE FIELD DATA INTO MORE PROFITABLE BUSINESS DECISIONS
Regardless of market conditions the driving down of operational costs, improving safety and security and more precisely controlling flow to increase revenue are crucial challenges facing pipeline and facility operators. At a time of falling commodity prices, never has the role of automation and efficient data management been so critical.
To fully leverage the benefits of automation, operators need to benchmark the functionality, reliability and costs of SCADA and DCS systems, communication and measurement devices, control room software and PLCs to design an effective and secure network to speed up the process of gathering field data for the control room, business departments and revenue allocations.
However despite years of requests, midstream automation, SCADA, instrumentation, measurement and control professionals still require a vendor-neutral forum, facilitated and led by midstream operators in which they can share best practices and benchmark the cost-benefits of instrumentation on the market.
Welcome To The First Operator-Led Congress To Focus On Analyzing Automation Strategies Specific To The Midstream Industry
The inaugural Midstream Automation, Instrumentation & Control Congress 2015 will deliver 20+ operator case studies from communication strategies for remote locations and security standards to alarm management and leak detection. Speakers will unveil how to integrate new RTUs, PLCs and measurement devices with legacy systems, how to select and design a control system with the latest SCADA and DCS and how to ensure HMI meets PHMSA regulations. Throughout, discussions will focus on how to turn investment in automation into measurable improvements in safety, security, flow control and operational efficiency.
Euphoric solves all the cloud complexities and helps setup intelligent observability across cloud and hybrid environments with continuous auto-discovery of hosts, VMs, serverless, cloud services, containers and Kubernetes, devices, logs, events and more.
Euphoric proactively discovers cloud performance bottlenecks and quickly resolve them before they impact end users
Using Predictive Analytics to Optimize Asset Maintenance in the Utilities Ind...Cognizant
Predictive analytics is a process of using statistical and data mining techniques to analyze historic and current data sets, create rules and predict future events. This paper outlines a game plan for effective implementation of predictive analytics.
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File SystemRadita Apriana
The preventive control is one of the well advance controls for recent security for protection of data
and services from the uncertainty. Because, increasing the importance of business, communication
technologies and growing the external risk is a very common phenomenon now-a-days. The system
security risks put forward to the management focus on IT infrastructure (OS). The top management has to
decide whether to accept expected losses or to invest into technical security mechanisms in order to
minimize the frequency of attacks, thefts as well as uncertainty. This work contributes to the development
of an optimization model that aims to determine the optimal cost to be invested into security mechanisms
deciding on the measure component of UFS attribute. Our model should be design in such way, the Read,
Write & Execute automatically Protected, Detected and Corrected on RTOS. We have to optimize the
system attacks and down time by implementing RWX ACM mechanism based on semi-group structure,
mean while improving the throughput of the Business, Resources & Technology.
You have been hired as a consultant to design BCP for SanGrafix, a v.docxshantayjewison
You have been hired as a consultant to design BCP for SanGrafix, a video and PC game design company. SanGrafix's newest game has become a hot seller, and the company anticipates rapid growth. It's moving into a new facility and will be installing a new network. Because competition is fierce in the game industry, SanGrafix wants to be fully secured, documented, and maintained while providing high availability, scalability, and performance.
Based on your current technology and information security knowledge, for this project you will design a BCP based off of the company profile below:
A. Primary location in San Francisco, CA
B. Secondary location/hot site in Sunnyvale, CA
C. Capable of supporting 220 users in these departments: Accounting and Payroll, 16; Research and Development, 48; Sales and Marketing, 40; Order Processing, Shipping, and Receiving, 36; secretarial and office management staff, 20; upper management (including the president, vice president, and general manager), 10; Customer Relations and Support, 30; Technology Support, 20.
D. Full OC3 Internet connection
First step is to issue a clear policy statement on the Business Continuity Plan. At a minimum, this statement should contain the following instructions:
The organization should develop a comprehensive Business Continuity Plan.
A formal risk assessment should be undertaken in order to determine the requirements for the Business Continuity Plan.
The Business Continuity Plan should cover all essential and critical business activities.
The Business Continuity Plan should be periodically tested in a simulated environment to ensure that it can be implemented in emergency situations and that the management and staff understand how it is to be executed.
All staff must be made aware of the Business Continuity Plan and their own respective roles.
The Business Continuity Plan is to be kept up to date to take into account changing circumstances.
BELOW IS THE EXAMPLE
Policy Statement
1. Agencies are required to develop, implement, test and maintain a Business Continuity Plan (BCP) for all Information Technology Resources (ITR) that deliver or support core systems and services on behalf of the Commonwealth of Massachusetts. For purposes of this policy, the BCP is the overall plan that facilitates sustaining critical operations while recovering from a disruption. BCP’s are required to include, at a minimum:
Standard Incident Response Procedures: An information system-focused set of procedures to be used when an event occurs that is not part of the standard operation of a service and may or does cause disruption to or a reduction in the quality of services and Customer productivity.
Disaster Recovery Plan (DRP): An information system-focused plan designed to restore operability of the target system, application, or computer facility infrastructure in the event of large scale disaster and/or other cataclysmic event.
Continuity of Operations Plans (COOP): An information system-focused pla.
Advanced Automated Approach for Interconnected Power System Congestion ForecastPower System Operation
system operators need the solution that
will allow them to keep the electrical grid secure in
spite of frequent changes in network loadings. The
Day-ahead congestion forecast (DACF) is a part of
congestion management process that becomes more
and more important. This paper contains the
description of an approach to automate the DACF for
an interconnected power system network. Using the
existing industrial tools and workflows automation
system, the congestion forecast system runs in fully
automatic mode, significantly reducing need of
specialist resources in operational congestion
management process. The realisation of the advanced
automated approach allows a quick, efficient and cost
effective method for energy management that could be
easily adopted by transmission system operators.
This CSC Trusted Cloud Services white paper explores the opportunities now presented to independent software vendors and developers thanks to cloud computing solutions. CSC is enabling ISVs to deliver Software-as-a-Service, creating new value and transforming business models.
Condition monitoring (or CM) is the process of monitoring a parameter of condition in machinery (vibration, temperature etc.) and identify a significant change which is indicative of a developing fault.
The use of condition monitoring allows maintenance to be scheduled, or other actions to be taken to prevent failure and avoid its consequences.
Euphoric solves all the cloud complexities and helps setup intelligent observability across cloud and hybrid environments with continuous auto-discovery of hosts, VMs, serverless, cloud services, containers and Kubernetes, devices, logs, events and more.
Euphoric proactively discovers cloud performance bottlenecks and quickly resolve them before they impact end users
Using Predictive Analytics to Optimize Asset Maintenance in the Utilities Ind...Cognizant
Predictive analytics is a process of using statistical and data mining techniques to analyze historic and current data sets, create rules and predict future events. This paper outlines a game plan for effective implementation of predictive analytics.
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File SystemRadita Apriana
The preventive control is one of the well advance controls for recent security for protection of data
and services from the uncertainty. Because, increasing the importance of business, communication
technologies and growing the external risk is a very common phenomenon now-a-days. The system
security risks put forward to the management focus on IT infrastructure (OS). The top management has to
decide whether to accept expected losses or to invest into technical security mechanisms in order to
minimize the frequency of attacks, thefts as well as uncertainty. This work contributes to the development
of an optimization model that aims to determine the optimal cost to be invested into security mechanisms
deciding on the measure component of UFS attribute. Our model should be design in such way, the Read,
Write & Execute automatically Protected, Detected and Corrected on RTOS. We have to optimize the
system attacks and down time by implementing RWX ACM mechanism based on semi-group structure,
mean while improving the throughput of the Business, Resources & Technology.
You have been hired as a consultant to design BCP for SanGrafix, a v.docxshantayjewison
You have been hired as a consultant to design BCP for SanGrafix, a video and PC game design company. SanGrafix's newest game has become a hot seller, and the company anticipates rapid growth. It's moving into a new facility and will be installing a new network. Because competition is fierce in the game industry, SanGrafix wants to be fully secured, documented, and maintained while providing high availability, scalability, and performance.
Based on your current technology and information security knowledge, for this project you will design a BCP based off of the company profile below:
A. Primary location in San Francisco, CA
B. Secondary location/hot site in Sunnyvale, CA
C. Capable of supporting 220 users in these departments: Accounting and Payroll, 16; Research and Development, 48; Sales and Marketing, 40; Order Processing, Shipping, and Receiving, 36; secretarial and office management staff, 20; upper management (including the president, vice president, and general manager), 10; Customer Relations and Support, 30; Technology Support, 20.
D. Full OC3 Internet connection
First step is to issue a clear policy statement on the Business Continuity Plan. At a minimum, this statement should contain the following instructions:
The organization should develop a comprehensive Business Continuity Plan.
A formal risk assessment should be undertaken in order to determine the requirements for the Business Continuity Plan.
The Business Continuity Plan should cover all essential and critical business activities.
The Business Continuity Plan should be periodically tested in a simulated environment to ensure that it can be implemented in emergency situations and that the management and staff understand how it is to be executed.
All staff must be made aware of the Business Continuity Plan and their own respective roles.
The Business Continuity Plan is to be kept up to date to take into account changing circumstances.
BELOW IS THE EXAMPLE
Policy Statement
1. Agencies are required to develop, implement, test and maintain a Business Continuity Plan (BCP) for all Information Technology Resources (ITR) that deliver or support core systems and services on behalf of the Commonwealth of Massachusetts. For purposes of this policy, the BCP is the overall plan that facilitates sustaining critical operations while recovering from a disruption. BCP’s are required to include, at a minimum:
Standard Incident Response Procedures: An information system-focused set of procedures to be used when an event occurs that is not part of the standard operation of a service and may or does cause disruption to or a reduction in the quality of services and Customer productivity.
Disaster Recovery Plan (DRP): An information system-focused plan designed to restore operability of the target system, application, or computer facility infrastructure in the event of large scale disaster and/or other cataclysmic event.
Continuity of Operations Plans (COOP): An information system-focused pla.
Advanced Automated Approach for Interconnected Power System Congestion ForecastPower System Operation
system operators need the solution that
will allow them to keep the electrical grid secure in
spite of frequent changes in network loadings. The
Day-ahead congestion forecast (DACF) is a part of
congestion management process that becomes more
and more important. This paper contains the
description of an approach to automate the DACF for
an interconnected power system network. Using the
existing industrial tools and workflows automation
system, the congestion forecast system runs in fully
automatic mode, significantly reducing need of
specialist resources in operational congestion
management process. The realisation of the advanced
automated approach allows a quick, efficient and cost
effective method for energy management that could be
easily adopted by transmission system operators.
This CSC Trusted Cloud Services white paper explores the opportunities now presented to independent software vendors and developers thanks to cloud computing solutions. CSC is enabling ISVs to deliver Software-as-a-Service, creating new value and transforming business models.
Condition monitoring (or CM) is the process of monitoring a parameter of condition in machinery (vibration, temperature etc.) and identify a significant change which is indicative of a developing fault.
The use of condition monitoring allows maintenance to be scheduled, or other actions to be taken to prevent failure and avoid its consequences.
It is still missing! Could the search for the missing Malaysia Airlines plane have gone much faster? I think this will become the "Natalee Holloway" (http://en.wikipedia.org/wiki/Disappearance_of_Natalee_Holloway) of air disasters - lots of breathless reports, ‘breaking news’ of no consequence coupled with gobs of bad science & bizarre theories - and no jet found!
It will be quite by accident that a pieces of debris wash-up that can once & for all confirm that it did indeed crashed -- but the bulk of the wreckage is probably entombed in 15000 feet of Indian Ocean water--never to be found. As a growing number of airplanes scoured the southern Indian Ocean in the search for Malaysia Airlines Flight 370, authorities released new details that paint a different picture of what may have happened in the plane's cockpit.
Military radar tracking shows that the aircraft changed altitude after making a sharp turn over the South China Sea as it headed toward the Strait of Malacca, a source close to the investigation into the missing flight told CNN. The plane flew as low as 12,000 feet at some point before it disappeared from radar, according to the source. And imagine that each neighboring country very aggressively monitors not only its own air-space but that of all the countries it shares boundaries of its air-space and not a bird should ideally fly without their coming to know of it. The mystery deepens on each passing days and yet there is no trace of ill-fated flight!
Back home, there were two noteworthy events for which ICISS was the event partner. In Mumbai two days seminar called Secutech India Security & Safety Conclave 2014 held from 6-7 March 2014. There were four tracks of seminars. Alongside the seminar there was well planned exhibition having latest security and safety related gadgets and systems on display from highly reputed companies. First day's seminar was inaugurated by Shri Maninderjit Singh Bitta and second day's seminar was opened by Shri Satej D Patil, the Minister of State for Home in Govt. of Maharashtra. On 21st March 2014 at Delhi, there was release of India Risk Survey 2014 which was conducted jointly by FICCI & Pinkerton. The survey report is enclosed for our esteemed members and readers.
Capt S B Tyagi
For ICISS
This month, there are two important events taking place – one in Mumbai (India) and other one in Abu Dhabi (UAE) and ICISS is Event Partner for both of them! While the seminar in Mumbai, “Secutech India Safety & Security Conclave 2014” is focusing on Security Solutions for Vertical Markets, the “Global Energy Security Conference 2014” in Abu Dhabi will have in-depth discussions on Corporate Security Integration with the Business, Security Mitigation Measures for International Companies and Ensuring Security at Oil & Gas Infrastructure in High Risk Areas against Terrorism.
The Pinkerton initiatives in India have been very useful in identifying the real threats faced by various sectors and strategies to mitigate them. The past survey results have been found very useful by the Corporates operating in India and for those wishing to set-up their operations in India in formulating their Security & Risk Policies and the measures to counter the treats. Like last year, the ICISS has partnered in this survey and we request all our readers to positively respond to this survey.
Capt S B Tyagi
For ICISS
Security professionals in general and Indian security professionals in particular have reasons to rejoice as doyen of Indian Industrial Security has achieved the positions in the governance and decision-making where his rich experience, profound industrial insight and deep-rooted commitment for the betterment of the Indian Security Industry will see some long term initiatives and beginning of new policies aimed to strengthen the overall position and future development of the Industry.
Shri RK Sinha has been nominated as candidate for election as member of the Rajya Sabha (Upper House of Indian Parliament) recently. Shri R K Sinha, fondly known as RK in the security fraternity is a man of many hues. Mr. Sinha started Security & Intelligence Services (India) Limited with a team of two persons from a small rented office in the eastern parts of India in 1974. Today, SIS Group is recognized as one of the leaders in manpower security business in Asia Pacific with over 36,000 permanent employees and 3000 corporate customers.
Mr. Sinha is widely recognized as a pioneer and Industry leader. He represents the private security industry before government bodies for legislation and regulatory matters regularly. Mr. Sinha also served as an Advisor to Ministry of Human Resource Development, Government of India (1999 - 2004).
Capt S B Tyagi
For ICISS
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
Monthly newsletter of International Council of Security and Safety Management .
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
How to Build a Module in Odoo 17 Using the Scaffold Method
News letter april 13
1. Newsle
N
etter: April 20
A
013
Let’s profe
s
essionalize the pro
t
ofessio
onals…
…
http://www
ww.wix.com
m/sbtyagi/ic
ciss
The alarm m
monitoring and resp
g
ponse is p
probably th most c
he
complex
and tedious function of security manag ement. Fr
s
raught wit False
th
Ala
arms and resultan unnecessary res
d
nt
source-mo
obilization alarm
n,
mo
onitoring also me
eans that systems need to be con
s
o
nstantly
upgraded an proced
nd
dures chec
cked.
There is als need to constant audit t
so
o
tly
the efficac of the s
cy
system,
turn-on-in vestment and the in
ntegrity of the data for very e
f
efficient
ret
ala
arm monit
toring. Sin all the activit
nce
ese
ties occup lot of at
py
ttention
and priorit
ties of the orga
anizations the forward looking
s,
f
ma
anagemen started off-loading these activities to third-p
nts
d
parties –
eld.
t
to
t
e
y
able option which
n
specialist in the fie This turns out t be cost effective and very dependa
s
l
ity
edness.
enhances the level of securi prepare
ading this phenome
enon are f
few securi agencies in som metros where the have
ity
me
ey
Spearhea
establish
hed their C
Central Mo
onitoring Stations. These me
etros cate to big offices, ind
er
o
dustries
as well as individ
dual resid
dents wh o wish to avail th
heir servi
ices. Lead article of this
er
he
ishing Cen
ntral Moni
itoring Sta
ations.
newslette is on th subject of establi
Capt S B Tyagi
C
For ICISS
r
2. m
ng
very comple and ted
ex
dious functiion of secu
urity management.
The alarm monitorin and response is v
Fraught w False Alarms an resourc
with
nd
ce-mobiliza
ation, alarm monitorin also me
m
ng
eans that systems
need to b constan upgraded and pr
be
ntly
rocedures checked. There is a
T
also need to constan audit
t
ntly
the efficac of the sy
cy
ystem, retu
urn-on-inve
estment an the integrity of the data for very efficient alarm
nd
e
v
monitoring Since a these activities oc
g.
all
ccupy lot attention and prioritie of the organizatio
a
a
es
ons, the
forward lo
ooking man
nagements started o
s
off-loading these activ
vities to th ird-parties – specialist in the
field. This turns out to be cos effective and very dependab option w
s
t
st
ble
which enhances the level of
security p
preparedne
ess.
Security s
systems se their signals ove telephon line to a central m
end
s
er
ne
monitoring station-the facility
e
that acts as the link betwee homes or any premises and the p
en
p
a
police, fire departme
ent, and
emergenc respons authorities. A cent monito
cy
se
tral
oring station is manne 24 hours a day, 7 days a
ed
week by h
highly skille operato trained to respond to emerg
ed
ors
d
gencies. Th station operator a
he
alerts the
proper authorities an dispatches help.
nd
Central Station softw
ware has to meet ve special requireme
t
ery
ents proce
essing and storing ve large
ery
and integr
ration with many different ala
h
arm proto
ocols. Inco
oming sign
nals are
amounts of data a
processed by digita alarm receivers; th
d
al
hese conve the incoming eve packets to serial or TCP
ert
ent
packets w
which are then analyzed by the Cen
e
y
ntral Statio softwa re. Event packets can be
on
communic
cated over any trans
r
smission m
medium: PSTN, GSM Radio, d
M,
direct line, Ethernet, GRPS,
,
,
etc.
Spearhea
ading this p
phenomen
non are few security agencies in some metros in India, whe they
w
y
ere
establishe their Ce
ed
entral Monitoring Sta
ations. The metros cater to b offices, industries as well
ese
big
s
as individu residen who wish to avail their services. The field is wide open and new entr
ual
nts
f
e
d
rants will
have head start and surly benefit from th lead tak by them
d
d
he
ken
m.
"Licensed compan
d"
nies typica offer h
ally
higher leve of serv
els
vice and r
reliability because t
b
they are
mandated to follow c
d
certain reg
gulations.
3. In Austra
alia Centra Stations are grad
al
s
ded on 2 areas: op
perational and phys
sical performance.
Operation perform
nal
mance incl
ludes the ability of the monitoring syst
tem to res
spond to e
events generated by custom
d
mers' secu
urity system operational reliab
ms,
bility, data r
retrieval, etc.
e
Physical p
performanc includes measure such as the constr
ce
s
es
ruction of m
monitoring rooms - m
most high
security ro
ooms have airlocks which can only be operated internally. T
e
w
The highest standard is 1a to
t
3c. To be graded at 3c central stations s meet ve high standards.
l
still
ery
There are no such requireme
e
ents in Indiia and PSA Act 20 has no reference of such services
AR
005
o
e
and need for licensing thereof
f.
Ce
entral Mon
l
nitorin St
ng tation
ns
A monito
oring cente must pro
er
ovide timel y, consiste high-q
ent,
quality serv
vices utilizi state-o
ing
of-the-art
technolog to custo
gy
omers 24 hours a d ay, 365 days a yea Keeping pace with the cha
ar.
g
anges in
technolog and ma
gy
aintaining alarm sys
stem data integrity were cru cial to ma
a
aintaining goal of
providing best-in-cla alarm monitoring service.
ass
m
n
pment need
ded, enhan
ncing alarm data integrity is allso necess
m
sary to ens
sure the
In addition to equip
highest le
evel of sec
curity is co
ontinuously maintaine The planning pha
y
ed.
ase may include five critical
e
elements which wo
ould becom founda
me
ation to successfully convert in-house alarm mo
s
onitoring
platform to a third-pa supplier:
o
arty
-
Tra
ansition tea identific
am
cation
De
ecision proc
cess to det
termine the service provider
e
p
oject plann
ning
Pro
Imp
plementation
Post impleme
entation (continuous improvement)
Transition Team
To succes
ssfully con
nvert alarm monitorin to a third-party su
m
ng
upplier, a t
transition team of cu
t
ustomerfocused l
leaders m
may be se
elected to design, analyze, and implem
a
a
ment the alarm mo
onitoring
transition project. In addition to loss prev
n
vention, tra
ansition team is to in
nclude stak
keholders f
from the
following d
departmen procurement, fina
nts:
ance, business unit leaders, IT real esta legal, f
l
T,
ate,
facilities,
and operations etc This tea must m
c.
am
meet regu
ularly, defin
ning the o
objectives, building success
criteria, creating pe
erformance metrics, and repre
e
esenting th organiza
he
ation to ensure a se
eamless
transition of alarm m
monitoring.
4. Any plan f the alar monitor
for
rm
ring transit
tion may in
nclude:
-
Understand t buy – in
the
nterview st
takeholder
rs
tablish ope
erating procedures fo supplier
or
Est
De
evelop draft scope of work for re
t
eview by st
takeholder
rs
Pre
esent sou
urcing stra
ategy (sco
ope of work, list of
w
sup
ppliers, and timeline)
d
)
De
evelop, dist
tribute, and analyze r
d
request for informatio
r
on
Co
omplete sup
pplier bid meetings a site vis
m
and
sits
Suppliers com
mplete and return req
d
quest for in
nformation
Pre
esent requ
uest for pr
roposal (R
RFP) suppl
lier short list
l
rec
commenda
ations to sta
akeholders
s
Analyze RFP
P
egotiate wit suppliers
th
s
Ne
Pre
esent overv
view to sta
akeholders
s
No
otify supplie and sta
ers
akeholders of contrac award
s
ct
Exe
ecute cont
tract
De
evelop perfo
ormance metrics
m
tablish qua
arterly perf
formance m
meetings to review and
o
Est
trac perform
ck
mance metr
rics
Determin
ning the Se
ervice Pro
ovider
Collective transition team needs to iidentify su
ely,
n
uppliers tha provided the mos compreh
at
d
st
hensive,
customer-focused c
capabilities. Criteria fo a successful servic provide are as fo
or
ce
er
ollowing:
-
Fitn
ness to tec
chnical and functiona requirem
d
al
ments
Tot cost of ownership
tal
p
The ability to support cu
e
urrent and emerging equipment
Ind
dustry repu
utation and experienc
ce
Exp
perience a qualific
and
cations of t compan and res
the
ny
sources
Qu
uality assur
rance commitment
Fin
nancial stre
ength
Pro
oven metho
odologies, tools, and value add service
d
ded
es
Sourcing decision m
must be based on t he “best value/total cost” prin ciple. While cost remains a
v
critical de
ecision fac
ctor, the quality of t
q
the equipm
ment, and operating efficienc
d
g
cies would be the
primary an most cr
nd
ritical aspe
ects.
Project P
Planning
A project task list ca be created to iden
an
ntify key issues that can affect the overall project and allow
c
assignme of tasks Tasks ca be assig
ent
s.
an
gned miles
stones in th project f to help balance w
he
file
workload
for projec planning Clear co
ct
g.
ommunica
ation, preci
ise operating proced
dures, and partnership with
d
selected s
solutions p
provider are the build ing blocks of our tran
e
nsition plan
n.
Implemen
ntation
system mo
onitoring, w
whether fro in-house to third party or third part to inom
d
r
ty
Converting alarm s
equires ab
bsolute und
derstandin of a de
ng
efined scope of wor To imp
rk.
plement th alarm
he
house, re
system m
monitoring change, the data fr
rom the existing mo
onitoring fa
acility can be gathered and
scrubbed to determine its accuracy and freshness The data then nee to be for
s.
a
ed
rmatted in order to
5. be inserte into new monitorin systems and revie
ed
w
ng
s
ewed again for accura
n
acy. Once all data is in place
in new mo
onitoring sy
ystems, the stage is set to deve
elop the sc
chedule for the chang over.
r
ge
on
mprovement
Post Implementatio – Continuous Im
The alarm monitorin convers
m
ng
sion from p
proprietary monitoring platform to the Thir party Mo
g
rd
onitoring
Center ha to be a seamless, successfu event. Metrics nee to be as
as
ul
M
ed
ssigned to all the alarms and
responses Each m
s.
metric was assigned a target goal, for example 90 percent of burglar alarms
g
e
0
r
within 60 seconds. To ensu continu
.
ure
uous impr
rovement, it is adviisable to develop q
quarterly
performan
nce busine
ess review Busine
ws.
ess review provide the aven
ws
e
nue to ass
sess perfo
ormance
metrics, id
dentify opp
portunities to strengt
then partnership, and continue to focus on achieving both
e
organizati
ions’ intern and ext
nal
ternal goal s.
Cour
rtesy: Col Deepak Behl
B
As
d
heard my car door un
c
nlock''. I w
went back and locked my car
a
d
"I locked my car. A I walked away I h
ree times. Each tim as so
me,
oon as I started to walk aw
s
way, I could hear it unlock
t
again thr
again!! N
Naturally a
alarmed, I looked aro
ound and there were two men sitting in a car nex to the
n
xt
Store. The were ob
ey
bviously watching me intently, and there seemed no doubt they were so
e
o
omehow
involved in this very weird situation.
n
y
I quickly a
abandoned my erran jumped into my car and sp away. I went str
d
nd,
d
c
ped
raight to th police
he
station, to them w
old
what had happened, and found out I was part of a new, and very suc
h
d
d
ccessful,
scheme b
being used to gain en into pa
ntry
arked cars.
Two weeks later, m friend's son had a similar experienc
my
s
ce....While travelling; he stopp
;
ped at a
motorway service a
y
area to use the toilet When he came ou to his ca less tha 5 minutes later,
e
t.
e
ut
ar
an
someone had mana
aged to get into his c and had stolen hi mobile p
car
is
phone, laptop compu
uter, satnav, briefc
case and o
other belon
ngings.
He called the police and since there we no sign of his car having been brok into, th police
e
e
ere
ns
ken
he
told him h had probably been a victim of the late robbery tactic – th
he
n
est
y
here is a device that robbers
d
are using now to clo your se
one
ecurity cod when yo lock you doors on your car using your remote
de
ou
ur
n
r
locking de
evice. They sit a distance away and watc for their next victim They kn
y
y
ch
r
m.
now you are going
inside the Store, res
e
staurant, or whatever and that they now have a few minutes to steal and run.
r
r
t
h
o
d
The police officer s
e
said, “Alwa to lock your car manually with the ke when parking in a public
ays
k
w
ey
p
6. area. Tha way if there is som
at
meone sittin in a car nearby watching fo their nex victim, it will not
ng
w
or
xt
t
be you.” W
When you lock up with the key upon exiti
ing, it does not send the security code, b if you
s
but
walk away and use the remo button, it sends the code through th airwaves where it can be
e
ote
t
t
he
t
easily inte
ercepted by the devic Look ho many times we all lock our d
y
ce.
ow
doors with our remot just to
te
be sure w remem
we
mbered to lock them - and bingo, som
m
b
meone has our code...and po
s
otentially
whatever is in our ca
ar."
Please sh
hare with e
everyone you know in the ho that we can frus
w
ope
w
strate thes thieves
se
s.
Details of theft on a flight into Hong Kon last wee as narr
f
ng
ek,
rated by a n affected passenge
er..."With
an hour t go, dur
to
ring the flight, I tho
ought I no
oticed my bag being replaced in the overhead
g
d
locker...... wasn't su and de
.I
ure
ecided it w probab a fellow passeng er, moving it to acce their
was
bly
w
g
ess
own bag.
I dismisse any tho
ed
ought of any wrong doing, bu upon ar
a
ut
rrival in H K, someth
hing told to me to
o
retrieve th bag, jus to make sure nothiing suspici
he
st
ious had occurred. W
o
When I ope
ened the overhead
locker (no above m and saw my lea
ot
me)
ather bag was the only one o
o
occupying the space I knew
e
there was a problem I examin the co
s
m.
ned
ontent, only to find all of my wif
y
fe's jewelry along with some
y,
cash had been stole during the flight. I raised th alarm and my wife and I qu
en,
he
a
fe
uickly block both
ked
aisles to stop any
yone at the back of the plane dise
p
embarking ....there were arou
w
und 120
passenge
ers.... My w and I both shoute for assis
wife
b
ed
stance from the stew
m
wards and stewardess
s
ses.
Eventually a stewar told me that secu
y
rd
urity had been called but passe
d
engers we becoming very
ere
agitated a
and unwilling to sh
how patien
nce or un
nderstandin
ng....they jjust wante to get off the
ed
plane....m wife an I were the only people controlling the passe
my
nd
c
engers. I pleaded w
with the
passenge to chec their ow bags at which point three fe
ers
ck
wn
t
ellow trave
elers repor
rted they h also
had
been robb
bed. It was only at th point, d I see any evidenc from th cabin cr
s
his
did
a
ce
he
rew that th were
hey
willing to p
provide any meaning suppor
gful
rt.
I vaguely remembe seeing a passen
y
er
nger weari
ing black, sporting a white base-ball c
b
cap and
pleaded w
with the r
rest of the passeng
e
gers to se if they could re
ee
y
emember anyone fit
a
tting my
descriptio It turned out to be a passen
on.
d
e
nger standing in front of me, wh once ide
ho
entified pro
oceeded
to offload money, jewelry, cam
mera equip
pment and false documents, run
nning into tens of tho
t
ousands,
if not hund
dreds of th
housands of dollars’ w
o
worth of sto
olen goods
s.
By this tim security had boarded the p
me
y
plane, the Captain ha been in
C
ad
nformed an was sta
nd
anding in
the rear s
section wat
tching the events un
nfold. Even
ntually a po
oliceman b
boarded the plane an I was
nd
able to ex
xplain the e
events lead
ding up to my appreh
hending the thief. I ha since been inform this
e
ave
b
med
criminal a
activity is re
eaching ep
pidemic pro
oportions and the au
a
uthorities ca
caught thre thieves, just last
ee
week, (with 30 alrea on rem
ady
mand since early December) on flights in HK, wit all the c
e
o
nto
th
criminals
coming fro the sam town in China.
om
me
n
It is estim
mated that o
only 5% are being c
caught judg
ging by the reports o passeng
e
of
gers contac
cting the
police afte they hav arrived at their de
er
ve
estination. They sit in the back row of th plane ob
k
he
bserving
where ba
ags are be
ehind or away from the pass
a
m
sengers an system
nd
matically pu them f
ull
from the
overhead lockers, w
while passe
engers res or watch movies, ta them t the back of the plane and
st
ake
to
steal any valuable c
contents.
7. They prey on foreign airlines as the penalties are so lenient, the payoff makes it worth the risk. I naively have never thought of robbers operating on planes, but now I
have experienced it first hand, there are a few takeaways:
Hand luggage should always be locked.
Do not assume luggage under your seat is safe....last week one passenger had her purse
stolen by the guy sitting next to her while she slept!
If in doubt, wear or keep any valuables ON YOU at all times!
Don't assume, like me, that everyone on a flight is a law-abiding citizen.
5. Do not assume business class travel is secure....robbers can be wealthy.
When Radha Baijal checked her email on November 3 last year to see if there was any response
to her application for a job in the UN, she couldn't believe her eyes. In her inbox lay a letter saying
she had landed her dream job. As it turned out, Radha shouldn't have believed her incredibly good
luck. For though she had posted her application on the genuine UN site, the 24-year-old
schoolteacher from the Capital today finds herself poorer by Rs 1.5 lakh and smarting with the
realization that she' has been had. Here is what happened. Radha received a signed reply from
one Dr Christy Owen, "Chief Administrative Officer, US Committee for the UN", confirming her
appointment. The email communication carried the UN logo and address. As instructed, she
contacted one Kate Bruce at the given email address for instructions before she was to fly off for a
"training program in Seattle".
Radha was instructed to transfer Rs 1.5 lakh into a US bank via a given swift account number. The
unsuspecting victim delved into her father's retirement benefits and sent the money. Radha
smelled a rat only when she responded to a second request for money - this time for Rs 70,000 –
by saying she had none and asking that it be deducted from her promised salary of $152,678 per
year. That's when all communication from the other end stopped. N.Y. Suresh Kumar, a zoology
scholar in Kerala, received a similar letter saying he'd been "selected" for the post of
environmental officer in the "United Nation Center for Development Initiative" and a request for
$2,280. Luckily for him, Suresh Kumar got the letter checked by the UN Information Center’s office
in Delhi and was told that the UN had no such outfit.
In the last six months, a number of people from across the country have approached the Delhi
office to verify the authenticity of "job confirmation letters" sent to them by email and post. These
letters come complete with the UN logo and address of the United Nations headquarters in New
York. In all cases, the letters have turned out to be fake. The Geneva office of UNAIDS' had in'
September last year issued a worldwide alert warning people to verify the authenticity of emails
and letters carrying its logo or address before meeting any request for money. It had also
requested people to provide details of suspect communications to help investigate the fraud.
How they're duped
All letters came with UN logo and address of UN headquarters in New York
Job offers were followed by requests for money
There were also invitations to conferences and training programme
The Delhi office of UN Information Centre has received several requests for verification of
the authenticity of such 'job confirmation letters' in last six months
8. Prior war
rning: The Geneva office of U
e
o
UNAID had in Septem
mber issue a worldw
ed
wide alert warning
people to verify the authentic of ema
e
city
ails/letters carrying its logo or a
s
address be
efore meeting any
request fo money.
or
Social net
tworking sites enable people to post info
e
ormation
about the and communica
em
c
ate with others around the
o
world usin forums interest groups, blogs, chat rooms,
ng
s,
b
t
email, and instant messaging.
d
m
While yo
ou can make new friends through social
m
w
s
h
networking sites, you ma
ay also be expo
osed to
ations and people who ha
d
ave bad
embarrassing situa
n
intentions, such as hackers, identity thieves, con artists,
and preda
ators.
Protect yo
ourself by t
taking som common
me
n-sense pr
recautions.
.
Never pro
ovide or po your
ost
Social Se
ecurity num
mber, address, phone number, bank acc
e
,
count or cr
redit card numbers, or other
personal i
information that could be used by crimina
n
d
als.
Police, college
admission personn employ
ns
nel,
yers, stalk
kers, con artists, nos neighbo
a
sy
ours – anyone can see what
you post. Don’t disc
close anyth
hing about yourself, your friends or family members that you w
y
s,
y
s
wouldn’t
want to be made pu
e
ublic. And remember that once informatio appears on a Web site, it ca never
r
r
on
s
b
an
be compl
letely eras
sed. Even if it’s mo
odified or deleted, older vers
sions may exist on others’
y
computers Some social networking s
s.
sites allow users to restrict access to certain people.
w
Understan how the site works and wha privacy choices you may have
nd
e
at
c
u
e.
Af all, it’s hard to
fter
s
judge peo
ople by pho
otos or info
ormation th post ab
hey
bout thems
selves. If y decide to meet someone
you
e
in person, do so during the da in a pub place, and ask fo informat
,
ay
blic
or
tion that yo can veri such
ou
ify,
as the per
rson’s plac of emplo
ce
oyment.
They may contain v
y
viruses or spyware that could damage your comp
puter or st
teal your p
personal
informatio – including your online pa
on
asswords and acco
ount numb
bers. Some messag
ges may
“spoof,” o copy the email ad
or
e
ddresses o friends to fool you into think
of
t
u
king that they’re from them.
t
m
Don’t clic on link or download atta
ck
ks
achments in emails from stra
angers, and if you get an
unexpecte messag from someone w
ed
ge
s
whose add
dress you recognize check with them directly
e,
w
before clic
cking on lin or attachments.
nks
A spam f
filter can help reduce the numb of unw
e
ber
wanted em
mails you
get. Anti-v
virus softw
ware, which scans in coming me
h
essages fo troubles
or
some files, and anti-s
spyware
software, which loo for pro
oks
ograms tha have be
at
een install
led on you comput and tra your
ur
ter
ack
ctivities wit
thout your knowledg can protect you from on line identity theft. F
r
ge,
p
u
Firewalls
online ac
prevent h
hackers an unauth
nd
horized co
ommunications from entering your com
mputer – w
which is
especially important if you ha a broa
y
t
ave
adband con
nnection because yo compu
b
our
uter is ope to the
en
Internet w
whenever it’s turned on. Loo for pro
d
ok
ograms tha offer au
at
utomatic updates and take
u
advantage of free pa
e
atches that manufact
turers offer to fix new discove
wly
ered proble
ems.
Criminals s
C
scan social networkin sites to find potential victim for all
ng
o
ms
sorts of scams, fr
rom phony lotteries to bogus employment and business opportun
y
s
d
s
nities to
9. investmen fraud. In some cas they fa
nt
n
ses
alsely befriend people and the n ask for money for medical
m
expenses or other e
s
emergencie or to co
es,
ome to the United Sta
ates from a
another co
ountry.
The “Glob Energy Security Conferenc 2013 is being orga
bal
y
C
ce
anized from 20-22 May 2013 a Dubai.
m
M
at
The even focuses on minim
nt
s
mizing the risk of criminality and terro
e
c
orism for development and
infrastruct
ture assets The con
s.
nference pr
rovides a comprehen
c
nsive educ
cational pro
ogram focu
using on
regional s
specific as well as glo
obal securiity issues and how to tackle div
a
o
verse and difficult cha
d
allenges
before the security p
e
professiona
als.
There are interactiv panel discussions and inte
e
ve
d
s
ernational case stud ies. Globa Energy Security
al
Conferenc 2013 will cover se
ce
ecurity issu related to both of
ues
d
ffshore and onshore oil and gas assets
d
arising ou of civil unrest, te
ut
errorist act
tivities, an a comp
nd
petitive glo
obal market. It prov
vides an
unparallel
led platfor for glob securit professi
rm
bal
ty
ionals, hig
ghlighting b
best indus
stries practices on
Security o Supply C
of
Chain and Security of Key Infra
f
astructure, Enterprise Security Risk Management,
e
R
A Synerg with HS and Se
gy
SE
ecurity, Cr
risis Prepa
aredness & Training How to form a co
g,
orporate
security structure & integrate it into the b
business co
ommunity.
Internatio
onal Coun
ncil for Industrial Security & Safety (ICISS) is Event partner w
y
with this
conferenc and Ca SB Tya Chief Councilor of ICISS will partic
ce
apt
agi;
cipate in th event a panel
he
as
speaker a
and also w also ma an im portant pre
will
ake
esentation on the su
ubject of “E
Energy Se
ecurity &
Security o Oil, Gas & Pipeline Assets”. F details use the lin given be
of
e
For
s
nk
elow http://pcstco
h
onsultant.c
com/global-security/
Su
uggestion & feedb
ns
back may b sent to us on e-m
be
o
mail: capts
sbtyagi@y
yahoo.co.
.in
u
o
we
g
e
w
ddress, we
P.S. - If you don't like to receive our newsletter, w apologize for bothering you. Please let us know your mail ad
will move it out of our co
ontact list, tha you!
ank