Defence gives its security pass card a fail
- 13 May, 2011 09:11
Defence is to overhaul the electronic access card system which controls staff access to facilities in the Canberra region amid decreasing overall performance of the security system.
According to Defence documents, the agency introduced an electronic access control system (EACS) to the Defence Canberra Region in 2005 to support positive identification and physically control access to designated restricted areas within the Defence estate in the ACT.
The Defence Canberra Region EACS Network, also referred to as the Defence ACT Common EACS Network, operates across a number of locations throughout the ACT.
The system is based on Cardax’s FT Command Centre v4.2 access control product and works in conjunction with a Defence Common Access Card system, which combines visual photo recognition and physical access control.
“Defence’s Cardax v4.2 system, and associated ICT infrastructure, is characterised by a decreasing mean time between failure and decreasing overall System performance,” the documents read.
In order to counter this decreasing overall system performance, a technology refresh of the current system will replace end-of-life server hardware and upgrade its CardaxFT Command Centre software to version 6.0.
It will also replace end-of-life guard station desktop computers that manage positive identification and visitor management access control credentials, and introduce a “fully integrated” visitor management solution.
The overhaul comes at a time when spending on ICT projects has accelerated dramatically.
Already this month defence minister, Stephen Smith, has given “first pass” approval to a Battlespace Communications System project, costing up to $500 million, and aimed at providing the ADF with a next generation telecommunications network capability. Smith has also given “pre-first pass analysis” into the costs and risks associated with streamlining and improving its human resources and payroll systems for military and civilian personnel. The project is also expected to cost up to $500 million.
First pass approval for a pilot of Defence’s next-generation desktop project has also been given.
The project, first flagged in April last year, is expected to allow 15,000 of the agency’s 75,000-strong user base to access systems classified as “restricted” and “secret” under current security clearances on a single desktop, rather than two separate machines as is currently practice.
Follow Tim Lohman on Twitter: @Tlohman
Follow Computerworld Australia on Twitter: @ComputerworldAU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
World Quality Report - The State of Quality 2012
The most comprehensive assessment of the current state of enterprise application quality and testing practices available from around the world. With our 1550 respondents, Capgemini, HP & Sogeti bring you the full report. Download today.
CSO Spotlight: Security-as-a-Service Gaining Popularity
Organizations that are looking for security features including identity management, encryption and access control — and at the same time want to take advantage of the cost and flexibility benefits of the cloud —might check into security-as-a-service offerings available now from several vendors. Download now to find out more.
Spear-Phishing Email: Most Favored APT Attack Bait
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.