tracker

TQMC

TQMC has acquired wide Domain Knowledge and Experience. You can FREELY access it here and here

DISCLAIMER: This matter here is a guide only. For authentic and up-to-date information, please contact TQMC.

The DIRECTIVES and STANDARDS listed here may have been subsequently REVISED . You must refer to the CURRENT REVISION and AMENDMENTS if any.

Tuesday, March 31, 2009

ISO 9000 centre

ISO14000 - Environmental
OHSAS 18000 - H&S
Other Standards
Frequently Asked Questions
Access our databases
About Us

About The Centre


What is the Centre for ISO9000?

Answer : We are a group of Management System experts, led by Dr Terry Russell and working under his guidance. We aim to help clients set up and maintain simple but effective systems. 

We produce individual client-specific paperless web-based systems, rather than the tired, old, mass-produced printed paper systems that so many other Consultants seem to produce. These web based systems are much easier to use, easier to maintain and considerably more interesting for users of the systems.

BUT despite our name, we are expert in many other standards besides the ISO9000 family. 

  • EN45011 - Certification Bodies Certifying Products
  • BS5979 - Monitoring Centres
  • ISO9001 - Quality Management Standard
  • ISO14001 - Environmental Management Standard
  • ISO17021 - Certification Bodies Assessing Management Standards
  • ISO17024 - Certification Bodies Certifying Persons
  • ISO27001 - Data Security Management Standard
  • OHSAS18001 - Health & Safety Management Standard

And many others.

the Centre for ISO9000 Ltd is itself registered by UKAS-accredited Certification Bodies, for the provision of services relating to these standards.

However, we never undertake work in areas unless we are expert in those fields.

Note: Some Management Consultancies will claim that they can do everything from sorting out your accounts to providing legal advice and ISO 9000 Consultancy. They may also claim they can get you "free money" from the Government/EC/Leprechauns at the end of the rainbow (can you tell I'm not impressed by them?). No mater how big they are, they can't be as good as a dedicated specialist, so always look around and take up references before you commit yourself.

Who is Terry Russell?

Answer : Terry is the Managing Director of the Centre for ISO9000 Ltd.

He is an experienced Management Systems (ISO 9000, ISO14000, OHSAS18000, ISO27001, ISO17021, ISO 17024, EN45011) consultant, overseeing the operations of all of the offices and members of our group. He is a BSi Registered Advanced Lead Auditor.

Terry is based in the south of England, but through the intelligent use of modern IT systems, is able to  bring his expertise to clients all around the world.

Message from Terry: 

Since 1984, we have helped many hundreds of organisations to achieve ISO 9000 (formerly known as BS 5750 in the UK), and many other standards. As a testament to our friendly, efficient manner, most of these organisations continue to use our services (see list of Clients)

My team of expert consultants have expertise that covers almost every business sector known to mankind.

In all of our years of assisting our clients to become registered for their required standards, we HAVE NEVER HAD A FAILURE!

How is Centre for ISO 9000 organised?

Answer : The Centre for ISO9000 is organised into several geographical areas, with the head of each area reporting to the Chief Executive, Dr Terry Russell.

So as to ensure a consistent approach, whilst ensuring the highest possible levels of Customer Service, Terry has developed an effective methodology, which permits regional differences to be adequately covered.

When any of our Consultants visit our Clients, the regional office will ensure that they are equipped with a copy of the Quality Management System (e.g. the latest set of procedures, Quality Manual, Work Instructions, forms, etc) and any other documents that comprise the Clients ISO 9000 system.

Whenever changes are required, the Consultant will discuss the changes with the Client and will modify the relevant documents and then send them to the regional Office Manager, who checks them for errors and suitability, etc. The proposed changes are then reviewed by the regional Quality Manager to ensure that the requirements of ISO 9000 are still being met.

Finally, the documents are sent to Terry, who checks them so as to ensure that he is satisfied that the changes represent the best possible way of achieving the requirements and that there is no adverse impact upon the efficiency of the client's business. Following this check, the documents are then sent to the Client for use. 

Many of our Clients have entirely paperless systems, which are our speciality. Updates are generally emailed back to the Client for installation, but in a growing number of cases, we can install the updates directly onto their system for them, thus avoiding errors.

For a rapidly growing number of Clients, we can conduct a lot of the required work via the Internet, telephone and fax, etc. This saves on travel costs and means that we can offer excellent rates for setting up and maintaining ISO 9000 systems for my Clients. It also enables us to "visit" a Client in Singapore, one in London on the next day and perhaps one in Mexico on the next day.




SOURCE

hacking the power grid


Experts hack power grid in no time

Basic social engineering and browser exploits expose electric production and distribution network
By Tim Greene , Network World , 04/09/2008
Newsletter Signup
SAN FRANCISCO -- Cracking a power company network and gaining access that could shut down the grid is simple, a security expert told an RSA audience, and he has done so in less than a day.
Ira Winkler, a penetration-testing consultant, says he and a team of other experts took a day to set up attack tools they needed then launched their attack, which paired social engineeringwith corrupting browsers on a power company's desktops. By the end of a full day of the attack, they had taken over several machines, giving the team the ability to hack into the control network overseeing power production and distribution.
Winkler says he and his team were hired by the power company, which he would not name, to test the security of its network and the power grid it oversees. He would not say when the test was done, but referred to the timeframe as "now." The company called off the test after the team took over the machines.
"We had to shut down within hours," Winkler says, "because it was working too well. We more than proved that they were royally screwed." In addition to consulting, Winkler is author of the books Spies Among Us and Zen and the Art of Information Security.
The problem is pervasive across the power industry, he says, because of how power company networks evolved. Initially their supervisory, control and data acquisition (SCADA) networks were built as closed systems, but over time intranets and Internet access have been added to the SCADA networks. Individual desktops have Internet access and access to business servers as well as the SCADA network, making the control systems subject to Internet threats. "These networks aren't enclosed anymore. They've been open for more than a decade," Winkler says.
The penetration team started by tapping into distribution lists for SCADA user groups, where they harvested the e-mail addresses of people who worked for the target power company. They sent the workers an e-mail about a plan to cut their benefits and included a link to a Web site where they could find out more.
When employees clicked on the link, they were directed to a Web server set up by Winkler and his team. The employees' machines displayed an error message, but the server downloaded malware that enabled the team to take command of the machines. "Then we had full system control," Winkler says. "It was effective within minutes."
Newsletter Signup
  • Share/Email
  •  
  • Tweet This
  •  
  • Print

COMMENTS (31)





SOURCE








Hackers Target U.S. Power Grid
Government Quietly Warns Utilities To Beef Up Their Computer Security
By Justin Blum
Washington Post Staff Writer
Friday, March 11, 2005; Page E01


Hundreds of times a day, hackers try to slip past cyber-security into the computer network of Constellation Energy Group Inc., a Baltimore power company with customers around the country.


"We have no discernable way of knowing who is trying to hit our system," said John R. Collins, chief risk officer for Constellation, which operates Baltimore Gas and Electric. "We just know it's being hit."


_____Cyber-Security_____


Hackers have caused no serious damage to systems that feed the nation's power grid, but their untiring efforts have heightened concerns that electric companies have failed to adequately fortify defenses against a potential catastrophic strike. The fear: In a worst-case scenario, terrorists or others could engineer an attack that sets off a widespread blackout and damages power plants, prolonging an outage.


Patrick H. Wood III, the chairman of the Federal Energy Regulatory Commission, warned top electric company officials in a private meeting in January that they need to focus more heavily on cyber-security. Wood also has raised the issue at several public appearances. Officials will not say whether new intelligence points to a potential terrorist strike, but Wood stepped up his campaign after officials at the Energy Department's Idaho National Laboratory showed him how a skilled hacker could cause serious problems.


Wood declined to comment on specifics of what he saw. But an official at the lab, Ken Watts, said the simulation showed how someone could hack into a utility's Internet-based business management system, then into a system that controls utility operations. Once inside, lab workers simulated cutting off the supply of oil to a turbine generating electricity and destroying the equipment.


Describing his reaction to the demonstration, Wood said: "I wished I'd had a diaper on."


Many electric industry representatives have said they are concerned about cyber-security and have been taking steps to make sure their systems are protected. But Wood and others in the industry said the companies' computer security is uneven.


"A sophisticated hacker, which is probably a group of hackers . . . could probably get into each of the three U.S. North American power [networks] and could probably bring sections of it down if they knew how to do it," said Richard A. Clarke, a former counterterrorism chief in the Clinton and Bush administrations.


Clarke said government simulations show that electric companies have not done enough to prevent hacking. "Every time they test, they get in," Clarke said. "It's nice that the power companies think that they've done things, and some of them have. But as long as there's a way to get into the grid, the grid is as weak as its weakest company."


Some industry analysts play down the threat of a massive cyber-attack, saying it's more likely that terrorists would target the physical infrastructure such as power plants and transmission lines. James Andrew Lewis, director of technology policy at the Center for Strategic and International Studies in the District, said a coordinated attack on the grid would be technically difficult and would not provide as much "bang for the buck" as high-profile physical attacks. Lewis said the bigger vulnerability may be posed not by outside hackers but by insiders who are familiar with their company's computer networks.


But in recent years, terrorists have expressed interest in a range of computer targets. Al Qaeda documents from 2002 suggest cyber-attacks on various targets, including the electrical grid and financial institutions, according to a translation by the IntelCenter, an Alexandria firm that studies terrorist groups.


A government advisory panel has concluded that a foreign intelligence service or a well-supported terrorist group "could conduct a structured attack on the electric power grid electronically, with a high degree of anonymity, and without having to set foot in the target nation," according to a report last year by the Government Accountability Office, the investigative arm of Congress.


Cyber-security specialists and government officials said that cyber-attacks are a concern across many industries but that the threat to the country's power supply is among their top fears.


Hackers have gained access to U.S. utilities' electronic control systems and in a few cases have "caused an impact," said Joseph M. Weiss, a Cupertino, Calif.-based computer security specialist with Kema Inc., a consulting firm focused on the energy industry. He said computer viruses and worms also have caused problems.


Weiss, a leading expert in control system security, said officials of the affected companies have described the instances at private conferences that he hosts and in confidential conversations but have not reported the intrusions publicly or to federal authorities. He said he agreed not to publicly disclose additional details and that the companies are fearful that releasing the information would hurt them financially and encourage more hacking.


Weiss said that "many utilities have not addressed control system cyber-security as comprehensively as physical security or cyber-security of business networks."


The vulnerability of the nation's electrical grid to computer attack has grown as power companies have transferred control of their electrical generation and distribution equipment from private, internal networks to supervisory control and data acquisition, or SCADA, systems that can be accessed through the Internet or by phone lines, according to consultants and government reports. That technology has led to greater efficiency because it allows workers to operate equipment remotely.


Other systems that feed information into SCADA or that operate utility equipment are vulnerable and have been largely overlooked by utilities, security consultants said.


Some utilities have made hacking into their SCADA systems relatively easy by continuing to use factory-set passwords that can be found in standard documentation available on the Internet, computer security consultants said.


The North American Electric Reliability Council, an industry-backed organization that sets voluntary standards for power companies, is drafting wide-ranging guidelines to replace more narrow, temporary precautions already on the books for guarding against a cyber-attack. But computer security specialists question whether those standards go far enough.


Officials at several power companies said they had invested heavily in new equipment and software to protect their computers. Many would speak only in general terms, saying divulging specifics could assist hackers.


"We're very concerned about it," said Margaret E. "Lyn" McDermid, senior vice president and chief information officer for Dominion Resources Inc., a Richmond-based company that operates Dominion Virginia Power and supplies electricity and natural gas in other states. "We spend a significant amount of time and effort in making sure we are doing what we ought to do."


Executives at Constellation Energy view the constant hacking attempts -- which have been unsuccessful -- as a threat and monitor their systems closely. They said they assume many of the hackers are the same type seen in other businesses: people who view penetrating corporate systems as fun or a challenge.


"We feel we are in pretty good shape when it comes to this," Collins said. "That doesn't mean we're bulletproof."


The biggest threat to the grid, analysts said, may come from power companies using older equipment that is more susceptible to attack. Those companies many not want to invest large amounts of money in new computer equipment when the machines they are using are adequately performing all their other functions.


Security consulting firms said that they have hacked into power company networks to highlight for their clients the weaknesses in their systems.


"We are able to penetrate real, running, live systems," said Lori Dustin, vice president of marketing for Verano Inc., a Mansfield, Mass., company that sells products to companies to secure SCADA systems. In some cases, Dustin said, power companies lack basic equipment that would even alert them to hacking attempts.


O. Sami Saydjari, chief executive of the Wisconsin Rapids, Wis.-based consulting firm Cyber Defense Agency LLC, said hackers could cause the type of blackout that knocked out electricity to about 50 million people in the Northeast, Midwest and Canada in 2003, an event attributed in part to trees interfering with power lines in Ohio. He said that if hackers destroyed generating equipment in the process, the amount of time to restore electricity could be prolonged.


"I am absolutely confident that by design, someone could do at least as [much damage], if not worse" than what was experienced in 2003, said Saydjari, who was one of 54 prominent scientists and others who warned the Bush administration of the risk of computer attacks following Sept. 11, 2001. "It's just a matter of time before we have a serious event."








SOURCE










Hacking the Power Grid
Gene J. Koprowski 06.04.98
Could hackers flip the switch on the US electric-power grid and leave the country in the dark, as if a national natural disaster had occurred? The question is not as absurd as it sounds, computer experts say.



As electric utilities from California to Maine prepare for the era of deregulated competition, many are adopting customer-friendly Web sites. Some of these sites are integrated with databases inside the utilities themselves, leaving them potentially vulnerable to penetration by hackers.




But the highly decentralized structure of the power plants -- generators are not connected to the networks which are hooked to the Internet -- means that the damage hackers can cause is limited, says Bruce Wallenberg, a professor of electrical engineering at the University of Minnesota, who has worked extensively with utilities.




"The government recently put together a group which claimed that they hacked into computers controlling the entire electric power grid of the US, and then claimed they could have shut it down," said Wallenberg, referring to recent press accounts. "My contention with that is just because you can break into a computer, it does not mean that you have suddenly acquired the ability to shut the process of controlling the plant."




Power plants are complex technological organizations, Wallenberg explained. To shut down a generator, one has to open circuit breakers and instruct generators to lower the "set points," the levels at which they are transmitting power. This is not something that can be done solely via a computer network. Often the task is done manually through process controls, or, if computerized, requires smart-card access.




"To change our computers you would physically have to be there," said Mark DuBois, the technical team leader for Web development at the Central Illinois Power Co., an electric utility located in Peoria. "Someone would notice."




The fact that hackers have gotten into power plants, Wallenberg said, simply proves what everybody already knew: Networks linked to the Web are vulnerable.



Still, Wallenberg and others, like Nick Simicich, a senior consultant with Florida's IBM Consulting, Inc., think that there are dangers for the electric-power industry now that they are online. Companies like Central Illinois Light Co. recently launched a Web-based service for its customers, which will eventually offer services including online bill payment. This is where the companies are vulnerable, Simicich believes. A hacker could break into the network and wreak havoc with the billing system.



The Central Illinois site, which uses an Integraph server with one gigabyte of memory and 10 gigabytes of disk space, is linked to seven Sybase databases and located offsite, in Arlington, Va., at a Web-hosting service.



"We did physically locate it offsite to keep them separate from our network," said DuBois, the technical team leader for the Web project at CILCO. "There is still a fair amount of security, but hackers would go nowhere if they break in there. I can guarantee that."




There's another concern for these energy computing experts. With deregulation, there is an increasing interest in energy futures trades at the commodities exchange on Wall Street. Simicich said hackers might use social engineering techniques to obtain passwords to computers with access to the networks containing sensitive information from these sources.




Others in the computer-security industry have raised concerns about the government simulating attacks on these kinds of systems, and whether or not that was proper. But Susan Hansen, a spokeswoman for the Office of the Secretary of Defense, defends the practice and says that most information remained secure. But a government source claims that government hackers were able to penetrate beyond the Web site in their tests of utility networks.




Security experts say that energy companies are becoming increasingly sophisticated with network security, and have software systems in place allowing them to monitor any suspicious activity. That's important, because while the networks controlling power grids are currently offline, the utilities will come to rely more and more on the Internet. As they do, their vulnerability will increase.




"With deregulation, as the separation of power from transmission grows, companies are going to be sharing information with each other and with customers over networks," says Patrick Taylor, a consultant at Internet Security Systems, an Atlanta-based security software vendor. "You are opening up the systems. It is no longer just PG&E or another utility running everything. It is Bill's Power Co., too. So Net security is now on the radar screen of the electric industry."








SOURCE












BSI warns that UK business ignoring terrorist threat to information security






'Laptop' terrorism & cybercrime pose major threat to UK businesses but international standard to protect companies is little used


BSI warns that business at risk from 25 'Attack Threats'


In the wake of comments that only 85 (now 169) UK companies have followed DTI and security service advice to meet the BS7799 Information Security (Infosec) Standard, and that the Government may fine businesses that fail to put infosec systems in place, BSI (the leading authority on BS7799) is calling for action.


Developed by BSI, BS7799 is the internationally recognised standard for information security management. Both the DTI and MI5 promote the use of BS7799 and were involved in its development from the start.


In Whitehall and Washington there is increasing concern about the new threat from terrorists who target companies' information systems. In particular the threat posed to the 'Critical National Infrastructure' (CNI), which includes Telecoms, Utilities, Financial Services, Health Service and Emergency services.


In the UK the little known NISCC (National Infrastructure Security Co-ordination Centre) has responsibility for CNI protection. On its website the NISCC describes the threat:


"There can be little doubt that the incidence and severity of electronic attacks will increase and the threat will rise for the foreseeable future. Any system connected to the Internet or other public network is a potential target for attackers."


One major focus of concern is The City of London as Europe's main financial services centre. Given that only 85 (now 169) companies UK-wide are certified to the Standard, the vast majority of companies in the City are potentially ill prepared and exposed.


Commenting on the real nature of the risk, Peter Murray, BSI special consultant, and former information extraction expert who conducted covert operations on behalf of UK governmental organisations, said:


"BS7799 will go a long way to solving the problem. When BSI developed the standard they were looking into the future and predicting an essential business requirement. That future has now arrived but companies are failing to act.


"Whether it is a terrorist threat or commercial cybercrime, there is a genuine risk.


"US Security services in Afghanistan found laptops and documents which showed that attacks of this kind were being planned.


"In one recent example in Australia the Queensland water company fell victim to an electronic attack which, over several months, overrode its computerised sewerage system and released sewerage causing environmental damage, prosecution and major reputation damage to the company.


"One of the main problems is that companies feel their information is safe because they have IT 'firewalls' or because they have not had any reported incidents. The reality is that if information has been breached successfully companies won't even know it has happened.


"Reported incidents are probably only 10% of the number which actually occur."


"The US may have set up a whole department of national security with 170,000 personnel to implement Operation Liberty Shield, but the UK has the best practical solution with BS7799.


Giles Grant MD of BSI Business Information, added


"The Government, by its engagement in the Standard from the outset, has laid the ground. It is now for companies to take action and put in place infosec systems."




SOURCE




HOW to HACK?




Ethical Hacker




Certified Ethical Hacker




Ethical Hacker DIRECTORY

fake Test Certificates


Search Results

  1. Flameproof Expert: Flameproof failure and Disasters

     - 6 visits - Mar 30
    So some manufacturers will issue a fake TC testifying to 100% hydraulic testing ... At an underground coal mine a flameproof headlight on a personnel transporter was .... other expert reports · are Exd products really safe? ...
    flameproofexpert.blogspot.com/2007/12/disasters.html - 93k - Cached - Similar pages - 
  2. Flameproof Expert

     - Mar 30
    every flameproof cable gland needs to be. inspected (after installation) by a registered. .... So some manufacturers will issue a fake TC testifying to 100% hydraulic testing ..... other expert reports · are Exd products really safe? ...
    flameproofexpert.blogspot.com/ - 157k - Cached - Similar pages - 
    More results from flameproofexpert.blogspot.com »