SlideShare uma empresa Scribd logo
1 de 28
Baixar para ler offline
Critical
Infrastructure
Protection
David Alexander
University College London
“Those facilities, systems, sites and
networks necessary for the functioning
of society and the delivery of essential
services upon which daily life depends.”
What is critical infrastructure?
"Those infrastructure assets (physical
or electronic) that are vital to the
continued delivery and integrity of the
essential services upon which society
relies, the loss or compromise of which
would lead to severe economic or social
consequences or to loss of life."
What is critical infrastructure?
The sectors of critical infrastructure
• water
• energy
• food
• health
• transport
• communications
• finance
• government
• emergency
services
Elements of critical infrastructure
Water: dams, treatment plants, pipelines, sewers
Energy: power stations, transmission lines
Food: distribution networks, warehouses and sales points
Health: hospitals, emergency systems, pharmaceuticals
Transport: road, rail, air, water
airports, sea ports, roads, railways, bridges
Communications: telephone, radio, cyber
Finance: banks, money supply, financial services
Government: national, regional, local
Emergency services: fire, police, ambulance, specialist.
• national - of importance to the
functioning of national life and affairs
• local - of importance to the
functioning of local life and affairs.
The divisions of critical infrastructure
• natural events (floods, storms, etc.)
• technological failures and human error
• terrorism and sabotage.
Hazards to critical infrastructure
Water
treatment works Railway station
Fire station
Electricity sub-station
Broadband antenna
Hospital
Supermarket
Power station
Waste water
treatment works
FLOOD SITUATION
Generation
output
restricted
Generator
out of service
Generator
out of service
Generator
out of service
Generation
output
increased
Additional
generator
on stand-by
Example of regional flood impact on electricity grid
Previously affected
Near misses
At risk
(1 in 100)
Low risk
Risk exposure level
Low
Medium
High
Threat
Historic
Predicted
Low
Criticality scale
Impact
on life
Economic
impact
Impact on
essential
services
Impactcategories
5
4
3
2
1
Critical threshold
Critical national
infrastructure
Other national
infrastructure
Virtually
certain
HIGH
Probable
SIGNI-
FICANT
Possible
Improbable
INTER-
MEDIATE
Highly
unlikely
LOW
Trivial Low Moderate Extensive Catastrophic
Failureprobability
Effects and degree of damage
Infrastructure criticality matrix
HAZARD
VULNERABILITY
EXPOSURE
A simple
risk assessment
matrix
Different definitions of exposure:
• under threat for a
given period of time
• at risk to a given extent
of possible loss.
A person who spends five minutes
twice a day crossing a bridge that
is at risk of collapse is exposed
to that risk for 10/(60x24x7)=
0.00098 of a week
Command
& control
Delegation
to agency
Delegation
to agency &
negotiation
Enforced
self-
regulation
Voluntary
self-
regulation
More
interventionist
Less
interventionist
The regulatory continuum
Government
ownership
Market
forces
The ALARP concept
Negligible risk
Unacceptable risk
Broadly acceptable
region (no need for
detailed work to
demonstrate ALARP)
Unacceptable region
ALARP or tolerability
region: risk assumed
only if benefit warrants it
Cost of risk reduction
Risk Inefficient
measures
Disproportionate
measures
Insufficient
measures
Optimal
measures
Critical infrastructure
Safeguarding critical infrastructures
• redundant systems
• adequate levels of operating supplies
• fault-tolerant design
• "fail-safe" design
• adequate and reserve manpower
• scenarios for failures and disasters
• contingency and emergency plans
- kept current
• involvement of top management
• measuring weaknesses
• creating resilience and redundancy
• restoring essential services.
Critical infrastructure protection:
a programme, a plan or an activity
SMART criteria:
S - specific
M - measurable
A - attractive,
acceptable
R - realistic,
realisable
T - timing.
The risk management process
Establish
the context
Identify hazards
and threats
Analyse risks
Evaluate risks
Manage risks
Accept
risks
Communicateandconsult
Monitorandreview
Yes
No
1
2
3
Fully
opera-
tional
Opera-
tional
Life safe
Near
collapse
Frequent
Occa-
sional
Rare
Very
rare
Performance level
Design standards versus performance levels
Designlevel
Unacceptable
performance
for new
construction
• measure interdependency
• adopt design standards
• create resilience.
Protection strategies
Policy
adoption
Risk assessment
• hazard
• vulnerability
• exposure
Policy assessment
• costs
• benefits
• consequences
Disaster
Expected
losses
Risk Policy
Assessment
Cyber
Human
Physical
Set goals and objectives
Identify assets, systems and networks
Assess risks: vulnerabilities,
threats, consequences
Prioritise
Implement programmes
Measure effectiveness
Continuous
improvement
to enhance
protection
of
critical
infrastructure
and key
resources
Feedback loop
interim.cabinetoffice.gov.uk/media/349103/strategic-framework.pdf
http://www.bmi.bund.de/SharedDocs/Downloads/EN/Broschueren/
Basisschutzkonzept_kritische_Infrastrukturen_en.html?nn=441658

Mais conteúdo relacionado

Mais procurados

Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
PECB
 

Mais procurados (20)

cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Cyber security
Cyber securityCyber security
Cyber security
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Information security
Information securityInformation security
Information security
 
Cyber security
Cyber securityCyber security
Cyber security
 
What is cyber resilience?
What is cyber resilience?What is cyber resilience?
What is cyber resilience?
 

Destaque

DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
docomusa
 
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
tmuehleisen
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
Kyle Lai
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Juniper Networks
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Positive Hack Days
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
wardjo
 

Destaque (20)

Symantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection StudySymantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection Study
 
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
 
A Critical Overview of Disaster Theory
A Critical Overview of Disaster TheoryA Critical Overview of Disaster Theory
A Critical Overview of Disaster Theory
 
Crisis communication
Crisis communicationCrisis communication
Crisis communication
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
Hacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00bHacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00b
 
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
 
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Presentation
Presentation Presentation
Presentation
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure Cybersecurity
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
 
Bio Daniel Donatelli
Bio Daniel DonatelliBio Daniel Donatelli
Bio Daniel Donatelli
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 
U.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceU.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity Governance
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
Trauma in Disaster
Trauma in DisasterTrauma in Disaster
Trauma in Disaster
 

Semelhante a Critical infrastructure

Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
Adhar kashyap
 
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docxAppendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
justine1simpson78276
 
noaa_csc1231455445156555455656666566.ppt
noaa_csc1231455445156555455656666566.pptnoaa_csc1231455445156555455656666566.ppt
noaa_csc1231455445156555455656666566.ppt
PapuKumarNaik1
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Candice Tang
 
CS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructureCS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructure
John Rooksby
 

Semelhante a Critical infrastructure (20)

Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
 
CIP eu 2016 114(-8)
CIP eu 2016 114(-8)CIP eu 2016 114(-8)
CIP eu 2016 114(-8)
 
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docxAppendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
 
Cascading Disasters
Cascading DisastersCascading Disasters
Cascading Disasters
 
noaa_csc1231455445156555455656666566.ppt
noaa_csc1231455445156555455656666566.pptnoaa_csc1231455445156555455656666566.ppt
noaa_csc1231455445156555455656666566.ppt
 
Disaster Resilient Critical Infrastructure
Disaster Resilient Critical InfrastructureDisaster Resilient Critical Infrastructure
Disaster Resilient Critical Infrastructure
 
2015.10.06 emerging risks
2015.10.06 emerging risks2015.10.06 emerging risks
2015.10.06 emerging risks
 
CMD OTC Mitigation
CMD OTC MitigationCMD OTC Mitigation
CMD OTC Mitigation
 
Disaster Management Plan for Metro Railway
Disaster Management Plan for Metro RailwayDisaster Management Plan for Metro Railway
Disaster Management Plan for Metro Railway
 
Infrastructure Interdependencies: Connections that Alter Consequences
Infrastructure Interdependencies: Connections that Alter ConsequencesInfrastructure Interdependencies: Connections that Alter Consequences
Infrastructure Interdependencies: Connections that Alter Consequences
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
 
DISASTER MANAGEMENT
DISASTER MANAGEMENT DISASTER MANAGEMENT
DISASTER MANAGEMENT
 
Vulnerability to Disasters
Vulnerability to DisastersVulnerability to Disasters
Vulnerability to Disasters
 
CS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructureCS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructure
 
Public Health Preparedness for Disaster Management
Public Health Preparedness for Disaster ManagementPublic Health Preparedness for Disaster Management
Public Health Preparedness for Disaster Management
 
Disaster management approaches in chhattishgarh
Disaster management approaches in chhattishgarhDisaster management approaches in chhattishgarh
Disaster management approaches in chhattishgarh
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Bay - The Incident Command System.pptx
Bay -   The Incident Command System.pptxBay -   The Incident Command System.pptx
Bay - The Incident Command System.pptx
 
Blackoutslidesharefinalfinal 150610082252-lva1-app6892
Blackoutslidesharefinalfinal 150610082252-lva1-app6892Blackoutslidesharefinalfinal 150610082252-lva1-app6892
Blackoutslidesharefinalfinal 150610082252-lva1-app6892
 
Blackout of Critical Services: Do you know your exposure?
Blackout of Critical Services: Do you know your exposure?Blackout of Critical Services: Do you know your exposure?
Blackout of Critical Services: Do you know your exposure?
 

Mais de Prof. David E. Alexander (UCL)

Mais de Prof. David E. Alexander (UCL) (20)

For a Reliable Civil Protection System That Keeps Citizens Safe
For a Reliable Civil Protection System That Keeps Citizens SafeFor a Reliable Civil Protection System That Keeps Citizens Safe
For a Reliable Civil Protection System That Keeps Citizens Safe
 
Systemic Risks and Emerging Challenges.pdf
Systemic Risks and Emerging Challenges.pdfSystemic Risks and Emerging Challenges.pdf
Systemic Risks and Emerging Challenges.pdf
 
How to Make Your Article More Acceptable for Publication
How to Make Your Article More Acceptable for PublicationHow to Make Your Article More Acceptable for Publication
How to Make Your Article More Acceptable for Publication
 
Extreme Weather Preparedness
Extreme Weather PreparednessExtreme Weather Preparedness
Extreme Weather Preparedness
 
Managing Today's Complex Crises: Lessons From the Past
Managing Today's Complex Crises: Lessons From the PastManaging Today's Complex Crises: Lessons From the Past
Managing Today's Complex Crises: Lessons From the Past
 
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptx
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptxCivil Protection and Intersectionality 2022-09-26 Science Forum.pptx
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptx
 
Cascading disasters 2022 03-02
Cascading disasters 2022 03-02Cascading disasters 2022 03-02
Cascading disasters 2022 03-02
 
Il Futuro delle Grandi Emergenze
Il Futuro delle Grandi EmergenzeIl Futuro delle Grandi Emergenze
Il Futuro delle Grandi Emergenze
 
Disasters in Italy: Environmental and Cultural Resilience
Disasters in Italy: Environmental and Cultural ResilienceDisasters in Italy: Environmental and Cultural Resilience
Disasters in Italy: Environmental and Cultural Resilience
 
Cultura e disastri
Cultura e disastriCultura e disastri
Cultura e disastri
 
Covid lessons for disaster risk governance
Covid lessons for disaster risk governanceCovid lessons for disaster risk governance
Covid lessons for disaster risk governance
 
Black swans a critique
Black swans   a critiqueBlack swans   a critique
Black swans a critique
 
Planning for Pandemics
Planning for PandemicsPlanning for Pandemics
Planning for Pandemics
 
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-IT
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-ITManaging the Covid Recovery / Gestire la Ripresa da Covid EN-IT
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-IT
 
Civil Defence to Civil Protection (IRDR Taster Lecture)
Civil Defence to Civil Protection (IRDR Taster Lecture)Civil Defence to Civil Protection (IRDR Taster Lecture)
Civil Defence to Civil Protection (IRDR Taster Lecture)
 
Readiness for Post-Covid-19 Challenges
Readiness for Post-Covid-19 ChallengesReadiness for Post-Covid-19 Challenges
Readiness for Post-Covid-19 Challenges
 
Scenario Methodology for Planning Future Activities
Scenario Methodology for Planning Future ActivitiesScenario Methodology for Planning Future Activities
Scenario Methodology for Planning Future Activities
 
Disastri a cascata
Disastri a cascataDisastri a cascata
Disastri a cascata
 
Grenfell Tower - Controlled Anger
Grenfell Tower - Controlled AngerGrenfell Tower - Controlled Anger
Grenfell Tower - Controlled Anger
 
Warning and Evacuation
Warning and EvacuationWarning and Evacuation
Warning and Evacuation
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

Critical infrastructure