SlideShare uma empresa Scribd logo
1 de 40
Cyber Security
What is virtual about it today
FROM ARAB
SPRINGS
TO
WIKI LEAKS
Cyber Space
2008 Pentagon Definition
The global domain within the information
environment consisting of interdependent network
of information technology infrastructures, including
the internet, telecommunications networks,
computer systems, and embedded processors and
controllers.
Cyber Space
How big is the Space and the Issue?
1971 – first email
Today – 40 trillion emails
1991 – first website
Today – 30 trillion individual web pages
2012 – 8.7 billion devices connected to internet
2020 – 40 billion
Cyber Security
How big is the domain and the Issue?
2009 – US Cyber Command Created
A military organization with the mission to use
information technology and the Internet as a
weapon
CYBER WAR IS A REALITY
WE LIVE WITH
Cyber Security
How big is the domain and the Issue?
The Knowledge Gap
Cyber Security
Trust is the key
Cyber Security
Cryptography
World’s Largest Zoo
110 million different species
McAfee’s
Malware Zoo
Cyber Security
Firewalls
Intrusion Detection Systems
Software Patch
Air Gap
Cyber Security
Attribution
Cyber Security
WEAKEST LINK
the human factor
Homeland Security
A Robust Counter Terrorism Mechanism
Watershed in Modern
Human History
Homeland Security
A Robust Counter Terrorism Mechanism
The attack on the World Trade Center in 2001 has
been by far the single most important event in the
history of the modern world and more so because it
forced the world to change its perception on the
nature of organization, the usage of technology,
the responses, the consolidation of activities and
spread of mechanisms needed to thwart the ever
growing terrorism the world over.
Mega City
Policing Project
Mega City Policing Project
Criticality of mega cities as economic
growth engines
Formidable beginning for war against terrorism
Connecting the cities would lead to a
national network
Returning to normalcy insurmountable
Leveraging Technology for HLS
Gaping holes in technology
Functionalities cannot be achieved when basic
issues related to execution, back end
processes and its robustness is still in
question
Need of the hour: identification of
technological platforms as first foundation
stones of HLS in India
Technological Framework
Command and Control Centre (CCC)
Interception Systems (IS)
City Based Video Surveillance System
(CBVSS)
Command and Control Center (CCC)
Integrating all fields – radio, audio,
video, text, data, images and graphics
Through a viable command and control
center software
Creation of a state of the art C4i
Interception Systems( IC)
Capability to monitor and penetrate
any mode of communication/storage
Connect to HLS specific
requirements
Analyse on a real time basis
Up-gradation and Scalability inbuilt
City Based Video Surveillance
System (CBVSS)
Proven track record of providing best
possible information ( video footage )
Ajmal Kasab
Technologically way ahead of CCTV networks
Inbuilt video analytics provides the connects
Integrated system. Deterrent and a must!!!
Technological Framework
TETRA Radio Network (TRN)
Geospatial Technology for HLS (GTHLS)
ERP Solution, RDBMS and Integration
(ERI)
TETRA Radio Network (TRN)
 TETRA – A Public Safety Network
 Fully digital mode
 Complete integration of all communication
gadgets
 Delivery of high quality voice/data/other
outputs
TETRA eludes India
Geospatial Technology for HLS
 Conventional inputs are unable to
provided actionable data
 Map of today is Geospatial imagery/GIS
 Third Eye
 Critical for planning, preparation &
response
Geospatial Technology for HLS
 Supports incident management
 Great tool for regulation, enforcement,
monitoring and supervision
ERP, RDBMS & Integration
 Complete functioning of the department
on ERP
 To be populated in a real time and dynamic
mode
 RDBMS
 Integration of the legacy systems
 On single sign in / sign off concept
Managerial
Response to War on
Terror
Managerial Response to War
on Terror
HUGE GAPS in learning, skills and attitudes of
internal security managers
Human resources should outmatch the technical
system
Utility is how best we utilize
Innovative methods inclusive of outbound
learning
Change management is the most critical
component
National Homeland Security
Resource Base & Incident Support System
Differential levels of technologies &
differential levels of mental frames
Executed at the division level in a city / then
seven cities integrated at the national level
Six technologies having their national
control centers at any location
Six of the these control centers gets
integrated into NHLSRB - ISS
Integration
National Homeland Security – Resource Base
and
Incident Support System (NHLS – RBISS)
National Homeland Security
Blueprint
The beginning of this grandiose plan set to have
a transformational impact on the Homeland
Security scenario of the country is yet to be
made. The world’s best buildings were a blueprint one
day. A blueprint is the first to crystallize our
thoughts, it could take a large number of revisions,
nonetheless it has to start. Time seems to be
running out.
Overall Framework
Cyber security and Homeland security

Mais conteúdo relacionado

Mais procurados

What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityAvantika University
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandeyRithikaD1
 
CYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOURCYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOURDr. Sushma H.B
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySHIVAMSHARMA1271
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Ekonomikas ministrija
 
Cyber security
Cyber securityCyber security
Cyber securityPrem Raval
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesWAJAHAT IQBAL
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 

Mais procurados (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandey
 
CYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOURCYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOUR
 
cyber security
cyber securitycyber security
cyber security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 

Semelhante a Cyber security and Homeland security

International Cyber Security 2012
International Cyber Security 2012International Cyber Security 2012
International Cyber Security 2012Sharmin Ahammad
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security InfrastructureGAURAV. H .TANDON
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructureShreyas Satpute
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax Technology
 
Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien DNUG e.V.
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorEuropean Services Institute
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management responseJack Brown
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 

Semelhante a Cyber security and Homeland security (20)

Secure Cities 2013
Secure Cities 2013Secure Cities 2013
Secure Cities 2013
 
HLS Perspective, Safer cities for a better tomorrow
HLS Perspective, Safer cities for a better tomorrowHLS Perspective, Safer cities for a better tomorrow
HLS Perspective, Safer cities for a better tomorrow
 
HLS Perspective. Safer cities for a better tomorrow
HLS Perspective. Safer cities for a better tomorrowHLS Perspective. Safer cities for a better tomorrow
HLS Perspective. Safer cities for a better tomorrow
 
Mechatronics for Homeland Security
Mechatronics for Homeland SecurityMechatronics for Homeland Security
Mechatronics for Homeland Security
 
Homeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism MechanismHomeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism Mechanism
 
Homeland security – A robust counter terrorism mechanism
Homeland security – A robust counter terrorism mechanismHomeland security – A robust counter terrorism mechanism
Homeland security – A robust counter terrorism mechanism
 
Geopolitics HLS Article
Geopolitics HLS ArticleGeopolitics HLS Article
Geopolitics HLS Article
 
Technological framework
Technological frameworkTechnological framework
Technological framework
 
Cii iq's national business excellence conclave 2013
Cii   iq's national business excellence conclave 2013Cii   iq's national business excellence conclave 2013
Cii iq's national business excellence conclave 2013
 
International Cyber Security 2012
International Cyber Security 2012International Cyber Security 2012
International Cyber Security 2012
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence Platform
 
Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management response
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
CCTNS & Homeland Security
CCTNS & Homeland SecurityCCTNS & Homeland Security
CCTNS & Homeland Security
 

Mais de ADGP, Public Grivences, Bangalore

Mais de ADGP, Public Grivences, Bangalore (20)

Towards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for IndiaTowards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for India
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Secure it0001
Secure it0001Secure it0001
Secure it0001
 
e-gov: Secure IT 2014
e-gov: Secure IT 2014e-gov: Secure IT 2014
e-gov: Secure IT 2014
 
Asymmetric warfare for geoworld
Asymmetric warfare for geoworldAsymmetric warfare for geoworld
Asymmetric warfare for geoworld
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop
 
KSP Composite Computerization Model
KSP Composite Computerization ModelKSP Composite Computerization Model
KSP Composite Computerization Model
 
CCTNS Karnataka Overview
CCTNS Karnataka OverviewCCTNS Karnataka Overview
CCTNS Karnataka Overview
 
Xime erp creation & change management 18082013
Xime erp creation & change management 18082013Xime erp creation & change management 18082013
Xime erp creation & change management 18082013
 
E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013
 
Leadership casestudy
Leadership casestudyLeadership casestudy
Leadership casestudy
 
Reaching out to the unreached
Reaching out to the unreachedReaching out to the unreached
Reaching out to the unreached
 
LTC Word
LTC WordLTC Word
LTC Word
 
LTC - 1
LTC - 1LTC - 1
LTC - 1
 
LTC - 2
LTC - 2LTC - 2
LTC - 2
 
Unreached
UnreachedUnreached
Unreached
 
Reaching out to the unreached
Reaching out to the unreachedReaching out to the unreached
Reaching out to the unreached
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 

Último

↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...ranjana rawat
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfahcitycouncil
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29JSchaus & Associates
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...tanu pandey
 
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...tanu pandey
 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfSamirsinh Parmar
 
The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)Congressional Budget Office
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30JSchaus & Associates
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...CedZabala
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.Christina Parmionova
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...SUHANI PANDEY
 
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
Get Premium Balaji Nagar Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Balaji Nagar Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...Get Premium Balaji Nagar Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Balaji Nagar Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...MOHANI PANDEY
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCongressional Budget Office
 
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 

Último (20)

↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdf
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
 
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
 
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...Booking open Available Pune Call Girls Shukrawar Peth  6297143586 Call Hot In...
Booking open Available Pune Call Girls Shukrawar Peth 6297143586 Call Hot In...
 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdf
 
The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
 
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
Get Premium Balaji Nagar Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Balaji Nagar Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...Get Premium Balaji Nagar Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Balaji Nagar Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related Topics
 
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 

Cyber security and Homeland security

  • 1.
  • 2.
  • 3. Cyber Security What is virtual about it today FROM ARAB SPRINGS TO WIKI LEAKS
  • 4. Cyber Space 2008 Pentagon Definition The global domain within the information environment consisting of interdependent network of information technology infrastructures, including the internet, telecommunications networks, computer systems, and embedded processors and controllers.
  • 5. Cyber Space How big is the Space and the Issue? 1971 – first email Today – 40 trillion emails 1991 – first website Today – 30 trillion individual web pages 2012 – 8.7 billion devices connected to internet 2020 – 40 billion
  • 6.
  • 7. Cyber Security How big is the domain and the Issue? 2009 – US Cyber Command Created A military organization with the mission to use information technology and the Internet as a weapon CYBER WAR IS A REALITY WE LIVE WITH
  • 8. Cyber Security How big is the domain and the Issue? The Knowledge Gap
  • 11. World’s Largest Zoo 110 million different species McAfee’s Malware Zoo
  • 12. Cyber Security Firewalls Intrusion Detection Systems Software Patch Air Gap
  • 15.
  • 16.
  • 17.
  • 18. Homeland Security A Robust Counter Terrorism Mechanism Watershed in Modern Human History
  • 19. Homeland Security A Robust Counter Terrorism Mechanism The attack on the World Trade Center in 2001 has been by far the single most important event in the history of the modern world and more so because it forced the world to change its perception on the nature of organization, the usage of technology, the responses, the consolidation of activities and spread of mechanisms needed to thwart the ever growing terrorism the world over.
  • 21. Mega City Policing Project Criticality of mega cities as economic growth engines Formidable beginning for war against terrorism Connecting the cities would lead to a national network Returning to normalcy insurmountable
  • 22. Leveraging Technology for HLS Gaping holes in technology Functionalities cannot be achieved when basic issues related to execution, back end processes and its robustness is still in question Need of the hour: identification of technological platforms as first foundation stones of HLS in India
  • 23. Technological Framework Command and Control Centre (CCC) Interception Systems (IS) City Based Video Surveillance System (CBVSS)
  • 24. Command and Control Center (CCC) Integrating all fields – radio, audio, video, text, data, images and graphics Through a viable command and control center software Creation of a state of the art C4i
  • 25. Interception Systems( IC) Capability to monitor and penetrate any mode of communication/storage Connect to HLS specific requirements Analyse on a real time basis Up-gradation and Scalability inbuilt
  • 26. City Based Video Surveillance System (CBVSS) Proven track record of providing best possible information ( video footage ) Ajmal Kasab Technologically way ahead of CCTV networks Inbuilt video analytics provides the connects Integrated system. Deterrent and a must!!!
  • 27.
  • 28. Technological Framework TETRA Radio Network (TRN) Geospatial Technology for HLS (GTHLS) ERP Solution, RDBMS and Integration (ERI)
  • 29. TETRA Radio Network (TRN)  TETRA – A Public Safety Network  Fully digital mode  Complete integration of all communication gadgets  Delivery of high quality voice/data/other outputs
  • 31. Geospatial Technology for HLS  Conventional inputs are unable to provided actionable data  Map of today is Geospatial imagery/GIS  Third Eye  Critical for planning, preparation & response
  • 32. Geospatial Technology for HLS  Supports incident management  Great tool for regulation, enforcement, monitoring and supervision
  • 33. ERP, RDBMS & Integration  Complete functioning of the department on ERP  To be populated in a real time and dynamic mode  RDBMS  Integration of the legacy systems  On single sign in / sign off concept
  • 35. Managerial Response to War on Terror HUGE GAPS in learning, skills and attitudes of internal security managers Human resources should outmatch the technical system Utility is how best we utilize Innovative methods inclusive of outbound learning Change management is the most critical component
  • 36. National Homeland Security Resource Base & Incident Support System Differential levels of technologies & differential levels of mental frames Executed at the division level in a city / then seven cities integrated at the national level Six technologies having their national control centers at any location Six of the these control centers gets integrated into NHLSRB - ISS
  • 37. Integration National Homeland Security – Resource Base and Incident Support System (NHLS – RBISS)
  • 38. National Homeland Security Blueprint The beginning of this grandiose plan set to have a transformational impact on the Homeland Security scenario of the country is yet to be made. The world’s best buildings were a blueprint one day. A blueprint is the first to crystallize our thoughts, it could take a large number of revisions, nonetheless it has to start. Time seems to be running out.