The London 2012 Olympics will present significant security challenges its prime contractor, Atos Origin, told the RSA Europe conference, being held a few miles from the games’ venue in east London.
Atos Origin has managed end-to-end IT infrastructure, including the security of the systems, for six Olympic Games and Vladan Todorovic, information security manager at the Beijing Olympic Games, was confident of success in 2012.
Speaking at the RSA conference he detailed how the security team monitored more than 12,000 devices - including 4,000 PCs, 4,000 servers and 4,000 network devices - across 70 venues in different locations in real time during the Beijing Olympic Games 2008.
"The systems needed to be available and work in real time. It was highly visible, critical and there was no room for human error, and no second chances," said Todorovic.
The IT infrastructure had to support three broad areas. The first was the system through which the organisers and IOC run the games, which includes accreditation, arrivals, protocol and staffing and all back office operations.
Secondly, the IT had to support the transmitting of real-time results as well as timing and scoring technology to scoreboards, commentators and judges in real time. Finally these scores need to be transmitted into television graphics for broadcasters.
Security is a major factor in helping the event and technology run smoothly and Atos Origin tested its systems extensively during the preparation period to create different security scenarios around the IT infrastructure, define the processes and audit the 70 venues.
This was all completed within tight time frames. When the Atos Origin team arrived in the host city, it had to build the infrastructure from scratch, even if construction work on the venues had only been completed weeks before the games.
Over the 17 days of competition, the team logged 12 million "suspicious" events per day, around 201 million in total. The 80-strong security team then had to filter these events in real time to separate serious security threats from minor technical notices.