Security and Privacy in Smart Communities By: Dr. Tan Hanh, Dr. Hoang Xuan Dau Posts and Telecommunications Institute of Technology (PTIT), Hanoi, Vietnam.

Slides:



Advertisements
Similar presentations
Session 3: Safer Services in a Digital Society Security with RFID Gérald Santucci European Commission Head of Unit DG INFSO/D4.
Advertisements

NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel.
Pervasive Wireless Solutions © Copyright IBM Corporation 2004 IBM La Gaude Smart Home / Intelligent Building Jean-Michel Corrieu IBM Europe Technical Manager.
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Accucom Systems Integration Pty Ltd / accucom.com.au.
Windows Vista Serious Challenges for Digital Investigators Authors: Darren Hayes Shareq Qureshi Presented By: Prerna Gupta.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Separate Domains of IT Infrastructure
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Smart Grid Cyber Security Framework
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
Part of the BRE Trust Protecting People, Property and the Planet Smart Buildings and Security: Developing a unified approach Will Lloyd BRE Global Limited,
EHealth Challenges and Opportunities E-health: Multi-disciplinary of E (ICT) and Healthcare, or applied ICT in healthcare (Design oriented), or healthcare.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
The Technology Presentation prepared by Warren Frost.
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
Forum on "The city we want: smart and sustainable" 16 June Genova Developing a European Data Ecosystem and a Common Vision for Interoperability.
Lessons Learned in Smart Grid Cyber Security
Future of Smart Metering Kansas Renewable Energy & Energy Efficiency Conference September 26, 2007.
Instituto de Investigaciones Eléctricas
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Joseph Ferracin Director IT Security Solutions Managing Security.
Today’s Lecture Covers < Chapter 6 - IS Security
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Secure Connections for a Smarter World Dr. Shuyuan Mary Ho Assistant Professor School of Information Florida State University.
An Overview of the Smart Grid David K. Owens Chair, AABE Legislative Issues and Public Policy Committee AABE Smart Grid Working Group Webinar September.
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Unit 4 IT 484 Networking Security Course Name – IT Networking Security 1203C Term Instructor.
FCC Field Hearing on Energy and the Environment Monday November 30, 2009 MIT Stratton Student Center, Twenty Chimneys Peter Brandien, Vice President System.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Small School Thin Client Network Using Windows OS.
In Partnership with. PATENTED SOLUTION Patents covering the Connection method and device arrangement World’s First Plug-and-Play Remote Access Device.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
ENISA efforts for securing European Internet Infrastructure
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
© OECD/IEA 2010 Towards smart and energy efficient systems Vida Rozite The Role of Standardization for Smart Grids in Realizing Their Energy-Efficiency.
Clinical Computing Secure, reliable technology that improves clinical workflow at the point of care.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Texas Technology Forum The Future of Mobile Technology Trends and Issues July 16, 2009.
1. ◦ Intro ◦ Client-side security ◦ Server-side security ◦ Complete security ? 2.
The Internet of Things(IoT) BY CODEY DISNEY. Objectives  What Is the IOT?  How are corporations at risk? What are the security risks and what can happen.
S MART H OME NETWORK D ESIGN. Aims : design a smart home based on Internet of Things. Objectives:  Define Internet of Things, Smart home (benefits and.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Internet of Things. Creating Our Future Together.
A Smart Metering Scenario Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG.
Security of the Internet of Things: perspectives and challenges
Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.
Information Security in Laurier Grant Li Wilfrid Laurier University.
Connecting the Unconnected L'Afrique Digitale, Paris - Ibrahima Guimba-Saidou 16 April.
KTNUK Simon Yarwood July Introducing the KTN The UK’s Innovation Network The KTN is the UK’s innovation network. We bring together.
WHY VIDEO SURVELLIANCE
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
EIS Fast-track Revision Om Trivedi Enterprise Information Systems
Privacy 101: Data Security Implementation for SAP
Case: Portable Sensor Management for Reliable Condition Measurement
WHY VIDEO SURVELLIANCE
ELEC-E Smart Grid Smart Meters and Security Issues
Case: Portable Sensor Management for Reliable Condition Measurement
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Security and Privacy in Smart Communities By: Dr. Tan Hanh, Dr. Hoang Xuan Dau Posts and Telecommunications Institute of Technology (PTIT), Hanoi, Vietnam

Topics Covered  Smart Community in Internet Era  Security challenges for Smart Community  Defending measures to security challenges  Our Responses to Security Challenges  PTIT's Messages Security & Privacy in Smart Communities 2 June 2014

Overview of Smart Community June 2014Security & Privacy in Smart Communities3

Smart Community = Connected Community June 2014Security & Privacy in Smart Communities4

Benefits of Smart Community  High quality of life for residents  Better living conditions  Better health monitoring and care  Easy and remote control of home appliances.  Efficient energy consumption and management  More efficient energy usage  More renewal energy  Better and more reliable communication network. June 2014Security & Privacy in Smart Communities5

Security Challenges to Connected Community June 2014Security & Privacy in Smart Communities6 Network/cyber attacks Viruses and malware

Security Challenges to Connected Community June 2014Security & Privacy in Smart Communities7 Social Engineering Attacks

Security Challenges to Connected Community June 2014Security & Privacy in Smart Communities8 Data Breaches in Corporations

Security Challenges to Connected Community June 2014Security & Privacy in Smart Communities9 Information leakage and user privacy abuse

Defending measures to security challenges  General approach: Defence in depth layers June 2014Security & Privacy in Smart Communities10

Defending measures to security challenges  Encryption for data privacy and integrity June 2014Security & Privacy in Smart Communities11

 Protect systems and networks using firewalls, IDS/IPS June 2014Security & Privacy in Smart Communities12 Defending measures to security challenges

 Security training to users and professionals June 2014Security & Privacy in Smart Communities13 Defending measures to security challenges

Vietnam's responses to Security Challenges June 2014Security & Privacy in Smart Communities14 Vietnam Government's Program for security personnel development from 2014 to 2020 Train security experts and professionals Improve security education capabilities of universities Improve national security defence capabilities

PTIT's Security Training & Education  PTIT is one of the leading universities in Vietnam in ICT.  PTIT is the first university who has licence to open a bachelor program in information security.  PTIT is one of key universities who are authorised by the Government to implement the Government's Program for security personnel development from 2014 to June 2014Security & Privacy in Smart Communities15

PTIT's Messages  We are highly aware of the security challenges to smart communities.  We are looking for international partners for cooperation in:  Information security training  Information security research  Development of security services and products. June 2014Security & Privacy in Smart Communities16

Thank You for Attention Any Questions? June 2014Security & Privacy in Smart Communities17