Cyber security and Homeland security

40
CYBER SECURITY & HOMELAND SECURITY

description

Cyber security and Homeland security

Transcript of Cyber security and Homeland security

Page 1: Cyber security and Homeland security

CYBER SECURITY &

HOMELAND SECURITY

Page 2: Cyber security and Homeland security

CYBER SECURITY

SINGLE BIGGEST EMERGING THREAT

Page 3: Cyber security and Homeland security

Cyber SecurityWhat is virtual about it today

FROM ARAB SPRINGS

TO

WIKI LEAKS

Page 4: Cyber security and Homeland security

Cyber Space

2008 Pentagon Definition

The global domain within the information environment consisting of interdependent network of information technology infrastructures, including the internet, telecommunications networks, computer systems, and embedded processors and controllers.

Page 5: Cyber security and Homeland security

Cyber Space

How big is the Space and the Issue?

1971 – first emailToday – 40 trillion emails

1991 – first websiteToday – 30 trillion individual web pages

2012 – 8.7 billion devices connected to internet2020 – 40 billion

Page 6: Cyber security and Homeland security

FORTUNE 500 COMPANIES

97% HAS BEEN HACKED

Page 7: Cyber security and Homeland security

Cyber Security

How big is the domain and the Issue?

2009 – US Cyber Command Created

A military organization with the mission to use information technology and the Internet as a weapon

CYBER WAR IS A REALITY WE LIVE WITH

Page 8: Cyber security and Homeland security

Cyber Security

How big is the domain and the Issue?

The Knowledge Gap

Page 9: Cyber security and Homeland security

Cyber Security

Trust is the key

Page 10: Cyber security and Homeland security

Cyber Security

Cryptography

Page 11: Cyber security and Homeland security

World’s Largest Zoo

110 million different species

McAfee’sMalware Zoo

Page 12: Cyber security and Homeland security

Cyber Security

FirewallsIntrusion Detection

SystemsSoftware Patch

Air Gap

Page 13: Cyber security and Homeland security

Cyber Security

Attribution

Page 14: Cyber security and Homeland security

Cyber Security

WEAKEST LINK

the human factor

Page 15: Cyber security and Homeland security

HOMELAND SECURITY IS THE PHILOSOPHY,

BLUEPRINT AND FUTURE OF POLICING ,GLOBALLY!

Page 16: Cyber security and Homeland security

TECHNOLOGICAL FRAMEWORK FOR SAFE

AND SECURE CITIES IN INDIA

Page 17: Cyber security and Homeland security

FIRST ENUNCIATED IN FICCI CONFERENCE ON

HLSJULY 2011

Page 18: Cyber security and Homeland security

Homeland Security A Robust Counter Terrorism Mechanism

Watershed in Modern Human

History

Page 19: Cyber security and Homeland security

Homeland Security A Robust Counter Terrorism Mechanism

The attack on the World Trade Center in 2001 has been by far the single most important event in the history of the modern world and more so because it forced the world to change its perception on the nature of organization, the usage of technology, the responses, the consolidation of activities and spread of mechanisms needed to thwart the ever growing terrorism the world over.

Page 20: Cyber security and Homeland security

Mega City Policing Project

Page 21: Cyber security and Homeland security

Mega City Policing Project

Criticality of mega cities as economic growth engines

Formidable beginning for war against terrorism

Connecting the cities would lead to a national network

Returning to normalcy insurmountable

Page 22: Cyber security and Homeland security

Leveraging Technology for HLS

Gaping holes in technology

Functionalities cannot be achieved when basic issues related to execution, back end processes and its robustness is still in question

Need of the hour: identification of technological platforms as first foundation stones of HLS in India

Page 23: Cyber security and Homeland security

Technological Framework

Command and Control Centre (CCC)

Interception Systems (IS)

City Based Video Surveillance System (CBVSS)

Page 24: Cyber security and Homeland security

Command and Control Center (CCC)

Integrating all fields – radio, audio, video, text, data, images and graphics

Through a viable command and control center software

Creation of a state of the art C4i

Page 25: Cyber security and Homeland security

Interception Systems( IC)

Capability to monitor and penetrate any mode of communication/storage

Connect to HLS specific requirements

Analyse on a real time basis

Up-gradation and Scalability inbuilt

Page 26: Cyber security and Homeland security

City Based Video Surveillance System (CBVSS)

Proven track record of providing best possible information ( video footage )

Ajmal Kasab

Technologically way ahead of CCTV networks

Inbuilt video analytics provides the connects

Integrated system. Deterrent and a must!!!

Page 27: Cyber security and Homeland security
Page 28: Cyber security and Homeland security

Technological Framework

TETRA Radio Network (TRN)

Geospatial Technology for HLS (GTHLS)

ERP Solution, RDBMS and Integration (ERI)

Page 29: Cyber security and Homeland security

TETRA Radio Network (TRN)

TETRA – A Public Safety Network

Fully digital mode

Complete integration of all communication gadgets

Delivery of high quality voice/data/other outputs

Page 30: Cyber security and Homeland security

TETRA eludes India

Page 31: Cyber security and Homeland security

Geospatial Technology for HLS

Conventional inputs are unable to provided actionable data

Map of today is Geospatial imagery/GIS

Third Eye

Critical for planning, preparation & response

Page 32: Cyber security and Homeland security

Geospatial Technology for HLS

Supports incident management

Great tool for regulation, enforcement, monitoring and supervision

Page 33: Cyber security and Homeland security

ERP, RDBMS & Integration

Complete functioning of the department on ERP

To be populated in a real time and dynamic mode

RDBMS

Integration of the legacy systems

On single sign in / sign off concept

Page 34: Cyber security and Homeland security

Managerial Response to War on

Terror

Page 35: Cyber security and Homeland security

Managerial Response to War on Terror

HUGE GAPS in learning, skills and attitudes of internal security managers

Human resources should outmatch the technical system

Utility is how best we utilize

Innovative methods inclusive of outbound learning

Change management is the most critical component

Page 36: Cyber security and Homeland security

National Homeland SecurityResource Base & Incident Support System

Differential levels of technologies & differential levels of mental frames

Executed at the division level in a city / then seven cities integrated at the national level

Six technologies having their national control centers at any location

Six of the these control centers gets integrated into NHLSRB - ISS

Page 37: Cyber security and Homeland security

Integration  National Homeland Security – Resource Base

and Incident Support System (NHLS – RBISS)

 

Page 38: Cyber security and Homeland security

National Homeland Security Blueprint

The beginning of this grandiose plan set to have a transformational impact on the Homeland Security scenario of the country is yet to be made. The world’s best buildings were a blueprint one day. A blueprint is the first to crystallize our thoughts, it could take a large number of revisions, nonetheless it has to start. Time seems to be running out.

Page 39: Cyber security and Homeland security

Overall Framework

Page 40: Cyber security and Homeland security

Sincere

thanks for

your rapt

attention