29 May 2006RNSA Workshop 1 Social Implication of National Security RNSA Workshop The risk of public data availability on critical infrastructure protection.

Slides:



Advertisements
Similar presentations
1 Industry Brief Apr Outline How is Alberta preparing? How is Alberta preparing? Albertas Health Response Albertas Health Response Albertas Operational.
Advertisements

International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
Botswana Policy Statement at the WSIS+10 Honourable Nonofo E. Molefhi Minister of Transport and Communications.
1 Protecting the Long Island Business Community A Public Safety Partnership.
Vocational Rehabilitation QUEST BRAIN INJURY SERVICES Fleur Colohan Vocational Instructor Elaine Armstrong Head of Brain Injury Services.
A De-Centralized Approach for Diverse Organizations.
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
<<Date>><<SDLC Phase>>
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
1 Policy Barriers to Entry: Factors affecting e-commerce adoption and practice by Australian business Joanne Jacobs Brisbane Graduate School of Business.
1 Research on National Security at the Wharton Risk Center Advisory Committee Meeting Wharton School University of Pennsylvania June 16, 2006.
(Geneva, Switzerland, September 2014)
Jeffery J. Gust IOWA INDUSTRIAL ENERGY GROUP FALL CONFERENCE Tuesday, October 14, 2014 MidAmerican Energy Company.
Standards for Shared ICT Jeju, 13 – 16 May 2013 Gale Lightfoot Senior Staff Program Manager, Office of the CTO, SPB Cisco ATIS Cybersecurity Standards.
Chapter 41 Procurement and Supply Management. Chapter 4Management of Business Logistics, 7 th Ed.2 Learning Objectives Understand the role and nature.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
1 New Emergency Transportation Operations Resources Nancy Houston Booz Allen Hamilton.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Nick Wildgoose 8 March 2012 BCI Workshop DELETE THIS TEXT AND PUT COMPANY LOGO IN THIS WHITE SPACE Understanding Risk within your Supply Chain SC1(V1)Jul/05/10GC/ZCA.
Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
LOCAL BUFFER SUPPORT PROGRAM 1 May 2014 MAV. Liveability, growth and waste As Melbourne continues to grow, we need secure the right mix of resource recovery.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
1 Table of Content 1.Business Diagnostic - Establishing a case for change –Changes in demand –New opportunities –Emerging threats 2.Vision Creation - Defining.
Implementing Shared Inspection Management Systems Insights from recent WBG research John R. Wille WBG Investment Climate Advisory Services Amman, Jordan.
Operational Security PCC. VII-F.1.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
The role of private security in the protection of critical infrastructures Veerle Pashley Free University of Brussels Department of Criminology.
1 Crisis Management / Emergency Management Overview.
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
Dr. David Mowat June 22, 2005 Federal, Provincial & Local Roles Surveillance of Risk Factors and Determinants of Chronic Diseases.
Status Report for Critical Infrastructure Protection Advisory Group
Marketing in Today’s Economy
Standardized Awareness Authorized Training, Train-the-Trainer Prevention and Deterrence.
CALL for University Lecturers KMUTT January 2004.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Assessing Risks/Challenges in Energy Cooperation Christopher Findlay Asia Pacific School of Economics & Management The Australian National University Presented.
1 August 18, 2010 Disaster Recovery Coordinators’ Meeting.
Canada’s Critical Infrastructure: Stay Calm and Get on with it…. Andrew Graham School of Police Studies Queens University 1 The Future of Security: Anticipating.
Mid-Atlantic Regional Council on the Ocean (MARCO) Presented to the 62 nd Annual Interstate Seafood Seminar Bob Connell New Jersey Department of Environmental.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
ENISA efforts for securing European Internet Infrastructure
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
RESPONSIBLE CARE ® SECURITY CODE Daniel Roczniak Senior Director, Responsible Care American Chemistry Council June 2010.
IP Offices and the Implementation of the WIPO Development Agenda: Challenges and Opportunities September 18, 2009 Geneva Irfan Baloch World Intellectual.
Local Government Business Continuity, Avian Flu & Emergency Management Roy Mentkow Director, Department of Technology City of Roanoke Virginia.
Clinical Computing Secure, reliable technology that improves clinical workflow at the point of care.
Country Partnership Strategy FY12-16 Consultations with Civil Society The World Bank Group June 2, 2011.
AUSTRALIA. A National Strategy for Enhancing the Safety and Security of our Food Supply ที่มา : We pride ourselves on our high safety and security standards.
A global nonprofit: Focusing on IP Protection and Anti-Corruption Sharing leading practices based on insights from global companies, academics, organizations.
CSE CST Anti-Terrorism and Privacy, One Year After Nancy Y. Cheng, FCA Associate Deputy Chief, IT Security Communications Security Establishment November.
1 HIT Standards Committee Hearing on Health Information Technology Security Issues, Challenges, Threats, and Solutions - Introduction Dixie Baker, SAIC.
Fiscal Year 2007 Urban Area Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
Financial Services Sector Coordinating Council (FSSCC) 2011 KEY FSSCC INITIATIVES 2011 Key FSSCC Initiatives Project Name: Project Description: All-Hazards.
CMGT 400 Entire Course CMGT 400 Week 1 DQ 1  CMGT 400 Week 1 Individual Assignment Risky Situation  CMGT 400 Week 1 Team Assignment Kudler Fine Foods.
Horizon 2020 Secure Societies Disaster-Resilience Workshop 18 Mar /06/2016.
Establishing an Aviation Risk Context APEC TPTWG-27 Aviation Security Experts Sub-Group Meeting Denise Morgan Office of Transport Security May 2006.
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
Crisis management related research at
Marketing in Today’s Economy
Presentation transcript:

29 May 2006RNSA Workshop 1 Social Implication of National Security RNSA Workshop The risk of public data availability on critical infrastructure protection Roba Abbas BICT (Hons) Candidate

29 May 2006 RNSA Workshop2 Public Data Availability Literature -Role of ICTs -National security, open information access & privacy Literature clusters Critical Infrastructure Literature -Physical vs. cyber infrastructures -Infrastructure interdependencies Critical Infrastructure Protection Literature -Recent events -CIP process GAP

29 May 2006 RNSA Workshop3 What is critical infrastructure?  In Australian context: banking & finance transport & distribution energy & utilities health the food supply communications 1.Cyber infrastructures 2.Infrastructure interdependencies must also be noted, that is, the relationship between the infrastructure Vital services contributing to the security & stability of a country

29 May 2006 RNSA Workshop4 What is critical infrastructure protection (CIP)?  Safeguarding the identified services from potential harm, including physical and/or electronic attacks  The process of protecting critical infrastructure has become increasingly important due to a number of recent events e.g. Y2K, 9/11, Bali  Although the specific details of the activities vary, the stages of the CIP process are standardised: Vulnerability Assessment Risk Assessment Risk Management

29 May 2006 RNSA Workshop5 What is public data availability?  Refers to ‘sensitive but unclassified’ data public records that may be accessed  Includes both free and commercial information  Since 9/11: a direct link has been drawn between public data collection (facilitated by ICTs) and the act of terrorism

29 May 2006 RNSA Workshop6 Public data elements and their use  Articles/ Documents  Maps/ Photographs  Statistical Information  Transactions/ Records  Personal information  Community facilities  Multimedia  Phone/ / IP Address  Social service needs  Competitive intelligence  Geospatial intelligence  Data mining  Sabotage  Cyberfraud  Terrorism

29 May 2006 RNSA Workshop7 Previous studies  Breeding (2003) Sensitive but Unclassified Information: A Threat to Physical Security  Weinmann (2006) Terror on the Internet: The New Arena, The New Challenges  Both describe the need for controlling access to public data, in order to maintain national security How do we balance open information access and national security concerns?

29 May 2006 RNSA Workshop8

29 May 2006 RNSA Workshop9

29 May 2006 RNSA Workshop10

29 May 2006 RNSA Workshop11 Significance of study  Terror was his doctrine, court told:  “The alleged preparations included acquiring two maps of the grid under a false company name and downloading 38 aerial photographs of the defence sites” Sydney Morning Herald article, Tuesday 25 th May 2005  However…  ICTs can aid national security efforts  Public data may be used for positive purposes

29 May 2006 RNSA Workshop12 Questions?

29 May 2006 RNSA Workshop13 Next steps 1.To identify the agencies supplying data across Australia 2.To create a geographic information system (GIS) for Wollongong Australia on critical infrastructure 3.To determine the potential misuse or threats of Objective 1 & 2 data being publicly available 4.To assess the level of community awareness related to public data availability

29 May 2006 RNSA Workshop14 2 important aspects of CIP process have been ignored…  Community awareness Community awareness is required in the initial stages of the CIP process Some authors claim that lack of community awareness has contributed to the severity of the recent events  Regional context Successful CIP requires the input of both federal and local governments Metropolitan cities have been the focus of CIP efforts Regional areas play an important role in the supply chain