cyber security and homeland security
DESCRIPTION
Cyber security and Homeland securityTRANSCRIPT
![Page 1: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/1.jpg)
CYBER SECURITY &
HOMELAND SECURITY
![Page 2: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/2.jpg)
CYBER SECURITY
SINGLE BIGGEST EMERGING THREAT
![Page 3: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/3.jpg)
Cyber SecurityWhat is virtual about it today
FROM ARAB SPRINGS
TO
WIKI LEAKS
![Page 4: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/4.jpg)
Cyber Space
2008 Pentagon Definition
The global domain within the information environment consisting of interdependent network of information technology infrastructures, including the internet, telecommunications networks, computer systems, and embedded processors and controllers.
![Page 5: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/5.jpg)
Cyber Space
How big is the Space and the Issue?
1971 – first emailToday – 40 trillion emails
1991 – first websiteToday – 30 trillion individual web pages
2012 – 8.7 billion devices connected to internet2020 – 40 billion
![Page 6: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/6.jpg)
FORTUNE 500 COMPANIES
97% HAS BEEN HACKED
![Page 7: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/7.jpg)
Cyber Security
How big is the domain and the Issue?
2009 – US Cyber Command Created
A military organization with the mission to use information technology and the Internet as a weapon
CYBER WAR IS A REALITY WE LIVE WITH
![Page 8: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/8.jpg)
Cyber Security
How big is the domain and the Issue?
The Knowledge Gap
![Page 9: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/9.jpg)
Cyber Security
Trust is the key
![Page 10: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/10.jpg)
Cyber Security
Cryptography
![Page 11: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/11.jpg)
World’s Largest Zoo
110 million different species
McAfee’sMalware Zoo
![Page 12: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/12.jpg)
Cyber Security
FirewallsIntrusion Detection
SystemsSoftware Patch
Air Gap
![Page 13: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/13.jpg)
Cyber Security
Attribution
![Page 14: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/14.jpg)
Cyber Security
WEAKEST LINK
the human factor
![Page 15: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/15.jpg)
HOMELAND SECURITY IS THE PHILOSOPHY,
BLUEPRINT AND FUTURE OF POLICING ,GLOBALLY!
![Page 16: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/16.jpg)
TECHNOLOGICAL FRAMEWORK FOR SAFE
AND SECURE CITIES IN INDIA
![Page 17: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/17.jpg)
FIRST ENUNCIATED IN FICCI CONFERENCE ON
HLSJULY 2011
![Page 18: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/18.jpg)
Homeland Security A Robust Counter Terrorism Mechanism
Watershed in Modern Human
History
![Page 19: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/19.jpg)
Homeland Security A Robust Counter Terrorism Mechanism
The attack on the World Trade Center in 2001 has been by far the single most important event in the history of the modern world and more so because it forced the world to change its perception on the nature of organization, the usage of technology, the responses, the consolidation of activities and spread of mechanisms needed to thwart the ever growing terrorism the world over.
![Page 20: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/20.jpg)
Mega City Policing Project
![Page 21: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/21.jpg)
Mega City Policing Project
Criticality of mega cities as economic growth engines
Formidable beginning for war against terrorism
Connecting the cities would lead to a national network
Returning to normalcy insurmountable
![Page 22: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/22.jpg)
Leveraging Technology for HLS
Gaping holes in technology
Functionalities cannot be achieved when basic issues related to execution, back end processes and its robustness is still in question
Need of the hour: identification of technological platforms as first foundation stones of HLS in India
![Page 23: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/23.jpg)
Technological Framework
Command and Control Centre (CCC)
Interception Systems (IS)
City Based Video Surveillance System (CBVSS)
![Page 24: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/24.jpg)
Command and Control Center (CCC)
Integrating all fields – radio, audio, video, text, data, images and graphics
Through a viable command and control center software
Creation of a state of the art C4i
![Page 25: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/25.jpg)
Interception Systems( IC)
Capability to monitor and penetrate any mode of communication/storage
Connect to HLS specific requirements
Analyse on a real time basis
Up-gradation and Scalability inbuilt
![Page 26: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/26.jpg)
City Based Video Surveillance System (CBVSS)
Proven track record of providing best possible information ( video footage )
Ajmal Kasab
Technologically way ahead of CCTV networks
Inbuilt video analytics provides the connects
Integrated system. Deterrent and a must!!!
![Page 27: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/27.jpg)
![Page 28: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/28.jpg)
Technological Framework
TETRA Radio Network (TRN)
Geospatial Technology for HLS (GTHLS)
ERP Solution, RDBMS and Integration (ERI)
![Page 29: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/29.jpg)
TETRA Radio Network (TRN)
TETRA – A Public Safety Network
Fully digital mode
Complete integration of all communication gadgets
Delivery of high quality voice/data/other outputs
![Page 30: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/30.jpg)
TETRA eludes India
![Page 31: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/31.jpg)
Geospatial Technology for HLS
Conventional inputs are unable to provided actionable data
Map of today is Geospatial imagery/GIS
Third Eye
Critical for planning, preparation & response
![Page 32: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/32.jpg)
Geospatial Technology for HLS
Supports incident management
Great tool for regulation, enforcement, monitoring and supervision
![Page 33: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/33.jpg)
ERP, RDBMS & Integration
Complete functioning of the department on ERP
To be populated in a real time and dynamic mode
RDBMS
Integration of the legacy systems
On single sign in / sign off concept
![Page 34: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/34.jpg)
Managerial Response to War on
Terror
![Page 35: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/35.jpg)
Managerial Response to War on Terror
HUGE GAPS in learning, skills and attitudes of internal security managers
Human resources should outmatch the technical system
Utility is how best we utilize
Innovative methods inclusive of outbound learning
Change management is the most critical component
![Page 36: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/36.jpg)
National Homeland SecurityResource Base & Incident Support System
Differential levels of technologies & differential levels of mental frames
Executed at the division level in a city / then seven cities integrated at the national level
Six technologies having their national control centers at any location
Six of the these control centers gets integrated into NHLSRB - ISS
![Page 37: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/37.jpg)
Integration National Homeland Security – Resource Base
and Incident Support System (NHLS – RBISS)
![Page 38: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/38.jpg)
National Homeland Security Blueprint
The beginning of this grandiose plan set to have a transformational impact on the Homeland Security scenario of the country is yet to be made. The world’s best buildings were a blueprint one day. A blueprint is the first to crystallize our thoughts, it could take a large number of revisions, nonetheless it has to start. Time seems to be running out.
![Page 39: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/39.jpg)
Overall Framework
![Page 40: Cyber security and Homeland security](https://reader036.vdocuments.net/reader036/viewer/2022062614/545caccaaf7959cd098b47fe/html5/thumbnails/40.jpg)
Sincere
thanks for
your rapt
attention