Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 14 January 2010

Creating uniform security across the police force

Posted on 10:44 by Unknown

By Holly Sacks, Senior VP, Marketing and Corporate Strategy, HID Global

Identity and access management (IAM) continues to a huge challenge for police forces throughout the country. Enabling employees to quickly and securely access data and facilities has always been a high priority. The growing number of data sources now available to police is making it more critical than ever that the right people have access to the information they need, and that this data can be assessed and monitored in a secure way.

However, a legacy of disparate IT systems with little ability to work together means that this is no small undertaking. Police forces in different regions currently have different levels of access to different systems, each of which has its own IT platform and its own access control platform. The National Policing Improvement Agency (NPIA) has launched a review of IAM processes within the police force that is designed to bring these systems together in the best way possible. As a core part of the review, the NPIA is aiming to provide every police officer in the UK with a multi-application smart card that can combine logical and physical security.

The project focuses on authenticating the identity of officers and civilian staff who access police systems via a single user identity that can work across all police systems. With police increasingly accessing confidential data via mobile devices, in-car units and station-based PCs, the ability to safely access systems from any location will also cut costs incurred through travel while boosting the time available for frontline policing.

A nationally aligned smart card system would also reduce the IT and administrative costs associated with resetting forgotten usernames and passwords, and it would conserve man hours spent on these tasks. The police face constant demands to be a more visible presence on our streets and the ability to access IT systems with a single smart card minimises downtime spent on administrative tasks, and freeing up bobbies to get on the beat.

Another interesting potential application for smart card technology is in securely checking out firearms from a police station. Every time a police officer takes a weapon out of the police station, he or she has to show a warrant card to the person in charge of the armoury; that person will inspect the warrant card and sign a piece of paper; the paper is countersigned by the officer in charge; and only then does the requesting officer take receipt of the weapon. When the weapon is returned, the process is repeated. This kind of convoluted process is a prime example of one that could be handled electronically with a combination of radio frequency identification (RFID) tags on the firearms themselves, a contactless smart card for the officer and a contactless card smart reader at the checkout point.

As police forces across the country look to combine their logical (IT) security and physical access control into one multi-purpose system, there are several options open to them. The most basic form of secure access control is the magnetic stripe – or ‘mag-stripe’ – card, where magnetic data is stored on the back of the card. While mag-stripe cards are inexpensive to produce, they can be more costly in terms of maintenance. Magnetic stripe cards come in contact with the reader when inserted, and any debris that collects on the card inevitably ends up inside the reader and on its contact pins. They are also susceptible to magnetic interference and wear and tear: constant swiping through the card reader causes the stripe to deteriorate and eventually fail. This type of card is also extremely restricted in terms of its data storage capacity compared to that of smart cards, some of which now have up to 164K of memory.

But perhaps their biggest disadvantage is that they are very easy to clone. You can even buy a mag-stripe reader from a high-street store that will let you take data off one of these cards and use it to create an unlimited number of clones. This is clearly an unacceptable risk for the police force where officers have access to the personal details of criminals like terrorists and paedophiles. The consequences of this information being released into the public domain by someone with unauthorised access are easy to imagine.

A far more secure and flexible option is the new generation of contactless smart cards that use encryption and the internal computing power of a smart chip, reducing the risk of data being compromised or cards being duplicated. Contactless cards can offer three levels of security: single, dual or three-factor authentication. With single-factor authentication, using the card on its own will grant access to a system or open a door. Dual-factor authentication adds an extra level of security in the form of a PIN code. Three-factor authentication goes a step further, using a PIN code and an extra security measure such as a biometric scan. Contactless smart cards are traditionally used for physical access control and are now being adopted for logical access control as well.

The other advantage of contactless smart cards is the possibility for adding other applications such as contactless payments for the staff canteen, time and attendance records and authorised equipment check out.

As with all areas of the civil service, the cost of implementing and deploying a new, nationwide IAM system is a key consideration. However, the need to identify, authorise and authenticate users is a critical one. It’s clear that government and police see this drive as one that is definitely worthy of investment.

Portable and secure, contactless smart cards are fast becoming a valuable tool for safeguarding physical security and guaranteeing the privacy of sensitive electronic information across many sectors. When weighing up the costs of smart card technology against the benefits, it’s obvious that they can offer considerable value to the UK police force, saving time and money, protecting officers and civilian staff and safeguarding the public’s data.

HID Global is exhibiting at Infosecurity Europe 2010, the No. 1 industry event in Europe held on 27th – 29th April in its new venue Earl’s Court, London. The event provides an unrivalled free education programme, exhibitors showcasing new and emerging technologies and offering practical and professional expertise. For further information please visit www.infosec.co.uk

HID Global is the trusted source for secure identity solutions for millions of customers around the world. Recognised for robust quality, innovative designs and industry leadership, HID Global is the supplier of choice for OEMs, system integrators, and application developers serving a variety of markets, including physical and logical access control, card personalization, eGovernment, cashless payment and industry and logistics.

Article supplied by InfoSecurity PR

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ►  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ►  February (30)
    • ►  January (21)
  • ▼  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ▼  January (27)
      • Novatel Wireless Announces Successful HSPA+ Dual-C...
      • Origin says Swiss Army encryption challenge worth ...
      • RockYou hack reveals world's most popular passwords
      • FalconStor® FDS Version 2.0 Delivers Enterprise-Cl...
      • Data hung out to dry as 4,500 USBs are left in Dry...
      • 8,378 reasons for better banking security
      • MiFi security weakness highlights need for code au...
      • CTO Doubts Internet Explorer Vulnerability Was Beh...
      • New Security Score Offers Snapshot of Firewall Ris...
      • 360°IT Event gives thumbs up on IBM/Panasonic clou...
      • Lighting Down the Line
      • German Government advice on web security not optimal
      • Oaklee Housing Association protect sensitive data ...
      • False Advertising by Vodaphone
      • Time for multi-factor security on portable data as...
      • Cyber-Ark Labs launched to combat emerging threats...
      • Where Does the Ownership Lie?
      • Creating uniform security across the police force
      • Modified portable devices create significant secur...
      • Serious SQL flaw could have compromised millions
      • Logitech Speaker Lapdesk N700 Brings the Cinema Home
      • Did Santa bring you a Netbook?
      • Police force computer misuse investigation "no sur...
      • Companies advised to code audit open source applic...
      • Securing Web 2.0 in the workplace
      • Kingston Datatraveler security flaws highlight nee...
      • Credant says MoD laptop theft highlights dangers o...
  • ►  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile