Security Management

Security Management is a magazine covering loss prevention and security. Since it was founded in 1957, it is published monthly. The magazine is published by ASIS International.Subjects for Security Management include building management and maintenance. The editor-in-chief is Sherry Harowitz.

Articles from Vol. 46, No. 2, February

Awards Presented in Third Annual ASIS Student Writing Competition. (ASIS News)
The winners of the Third Annual ASIS Student Writing Competition have been announced. The competition is co-sponsored by the ASIS Council on Academic Programs in Colleges and Universities and the ASIS Foundadon, Inc. The competition, which is designed...
Congressional Legislation. (Legal Reporter)
Computer security, Several bills that have been introduced in Congress since the terrorist attacks in September are designed to promote research into computer security. One would help government agencies improve computer security, while three others...
Facing Your Flaws: The Red Team Probes the Network for a Company to Identify Possible Vulnerabilities and Design Flaws. (Computer Security)
WHEN THE UNITED STATES military wants to test the security of a facility, it often calls in specialized teams to analyze, evaluate, and test the installation's perimeter. These "tiger teams" will look for potential weak points, such as easily scaled...
Faster, Stronger, Safer: The Mountains of Utah Are an Apt Backdrop for the Massive Security and Public Safety Effort Put into the Winter Olympics in Salt Lake City. (Special Events/The Winter Olympics)
THE WINTER OLYMPIC GAMES, one could say, are as pure as the driven snow. These games have traditionally been held in snug mountainside towns such as Lilehammer, Norway, Nagano, Japan, and Albertville, France, where access and attendance have been limited....
Fete Accompli: When Companies Hold International Events to Spur Sales, Fete Clients, or Boost Morale, Security Planning Is the Key to Ensuring Success. (Special Events/Corporate)
MILLIONS OF DOLLARS ARE invested annually in international meetings, conferences, special events, incentive trips, customer hospitality programs, and trade shows. These activities are important to business, but also entail considerable risk for the...
Government Infosec Gets Failing Grade. (Tech Talk)
The House Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations conducted an oversight hearing recently that asked the question, "Computer Security: How is the Government Doing?" The answer, unfortunately, was...
Home on the Page. (News and Trends)
www.securitymanagement.com September 11 has fueled an unprecedented amount of security-related activity in both the public and private sectors. Businesses, government agencies, associations, interest groups, and other entities are churning out surveys,...
Judicial Decisions. (Legal Reporter)
False imprisonment. The Utah Supreme Court has upheld a jury verdict that two grocery store employees who detained an intoxicated minor had falsely imprisoned the youth. On October 13, 1995, teenagers James Eddy and Will Emdin went to an Albertson's...
Let the Record Stand. (Legal Issues)
IN 1994, Mary J. Linnen died of a medical condition arising from her use of phen-fen--a diet drug combination. The drug was later pulled from the market after its side effects became public. Linnen's parents sued the drug manufacturer, Wyeth-Ayerst...
Partners in Protection: By Combining IT and Physical Security, This Company Saved Money and Improved Response Time to Incidents. (Management)
SUNDAY, 2:00 a.m. An intruder attempts to break into the network operations center by jimmying a door Forcing the lock triggers a silent door alarm and a digital video camera that records the scene. The alarm instantly provides a zone alert, including...
Poison Pen E-Mail: A Newly Discovered Vulnerability Makes It Possible for a Hacker to Send E-Mail to a Computer without the User's Knowledge. (Tech Talk)
Bunratty. Sounds like a harmless epithet, along the lines of drat. Actually, it's the name given to a not-so-harmless vulnerability discovered in e-mail protocols by engineer Vince Gallo. He named what he calls the "Bunratty Attack" after the Irish...
Router of Least Resistance. (Tech Talk)
Routers are frequently referred to as the "air traffic controllers" of the Internet. They connect networks by examining the data packets traveling in cyberspace and then guiding the data towards its target on the most efficient route possible. But...
Self-Surveilling Systems. (Working Wise)
Audio Adventures, Inc./Landmark Audiobooks, based in Boulder, Colorado, has divisions throughout the United States that market its products. One division is a rental service through which customers rent and return audiobooks at about 650 outlets located...
Study Finds Antidote for Healthcare Fraud. (News and Trends)
The U.S. government is notorious for squandering money. But one program is showing remarkable returns; for each dollar that the government invests in the enforcement of healthcare fraud cases through the False Claims Act (FCA), it receives at least...
The Robber Wore Plaid: Training Employees to Be Subtly Observant Is One Part of Helping Them Safely Handle Robberies While Taking Steps That Will Later Help Police. (Financial Services)
On a quiet September afternoon in 1876, cashier Joseph Lee Heywood bravely confronted robbers at the First National Bank in Northfield, Minnesota. The safe was unlocked, but Heywood told the robbers it was on a timer and impossible to open. They threatened...
Wanted: Information Security Experts. (Tech Talk)
The United States faces a growing shortage of information security professionals, warns Dr. Eugene Spafford, director of Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS). For example, out of the 23...
Web Sites Should Plan for Disruption. (News and Trends)
As cities, states, and other jurisdictions take advantage of the Web to communicate information to constituents, they must also take the time to prepare for the possibility of disruptions to those information portals, says Herb VanHook, senior vice...