A lot of the security is related to processes. We try to design a system that's secure, to prevent people from processing, entering or modifying data. |
All of the situations we encountered, we'd anticipated because of all the testing and rehearsals we did. We were never taken by surprise. |
Don't rely only on designing a system and hoping it's going to work. Test it, and test it with real problems. |
In an environment providing real-time information to media, any security incident, triggered with malicious intent or not, can have disastrous consequences. For a highly visible event like the Olympic Games, the challenge of IT security is not only to prevent unauthorized people from accessing the systems, but to control the activity of authorized people inside the games' network. |
It's very important when we measure an event to recognize its impact on time. For example, an event eight hours before a competition may not be major, but if it happens 10 minutes [before] or during a competition, it's critical we do something. |