SCID Master Control 4/22/2014SCID Design Details Presentation1 Handheld Device (Walkie) Master Control (Managie) Data Protocol (Talkie)

Slides:



Advertisements
Similar presentations
EIDE System Requirements and Specification Documents
Advertisements

Confidential: All Rights Reserved Web-based Alerting The International Common Alerting Protocol (CAP) provides for a standardized alerting format for all.
Network+ Guide to Networks, Fourth Edition
Chapter 19: Network Management Business Data Communications, 4e.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Chapter 2: IS Building Blocks Objectives
Concepts of Database Management Seventh Edition
Databases and Database Management Systems
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Network security policy: best practices
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Higher Administration
Management Information Systems
Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices Section.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Concepts of Database Management Sixth Edition
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Introduction To Computer System
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
 The internet is the hardware that creates the massive worldwide network. Computers, cables, telephone wires, high-speed communication lines. The internet.
CH2 System models.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
MIS 385/MBA 664 Systems Implementation with DBMS/ Database Management Dave Salisbury ( )
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Distributed Systems: Concepts and Design Chapter 1 Pages
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
State of Florida Emergency Support Function 6 1 EMERGENCY SUPPORT FUNCTION 6 - MASS CARE “Training for incoming EMAC/Mutual Aid personnel” A Self Study.
Human Resource Management Presentation 1 Human Resource Management Team Id: By:- Bhavin S. Mungara ( ) Nilesh D. Mangroliya ( )
Computer Emergency Notification System (CENS)
Information: Policy, Strategy and Systems Module Overview
Information Systems Security
HPN/HCS Update Mandy Fallon HCA Education and Research.
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Advantage of File-oriented system: it provides useful historical information about how data are managed earlier. File-oriented systems create many problems.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Learning Objective The students should be able to: a. state the definition of software b. state the usage of software c. list different types of software.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Database Administration
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
Module 1 Introduction to Designing a Microsoft® Exchange Server 2010 Deployment.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
COM111 Introduction to Computer Applications
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
Evaluating GIS for Disaster Management Bruce Kinner GEOG 596A.
Discovering Computers 2008 Fundamentals Fourth Edition Discovering Computers 2008 Fundamentals Fourth Edition Chapter 1 Introduction to Computers.
Access Control for Security Management BY: CONNOR TYGER.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
Online Testing: What is an SRF and Why Should I Care? District and Campus Coordinators, Technology Staff, and Test Administrators.
Anytime, Anywhere Access Benefits Functionality Work Order Administration Dispatch Work Order Work Order Details New Work Order Additional Functionality.
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
A Digital Firearm Purchasing Application for ATF Form 4473 brought to you by iTOUCH TECHNOLOGY iTOUCH OFFERS THE LAW ENFORCEMENT AGENCIES A SOLUTION TO.
Chapter 19: Network Management
TRANSACTION PROCESSING SYSTEM (TPS)
Database Systems: Design, Implementation, and Management Tenth Edition
An Introduction to Computer Networking
Systems Design Chapter 6.
Introduction and Overview
ConText By: Team Flirt.
Presentation transcript:

SCID Master Control 4/22/2014SCID Design Details Presentation1 Handheld Device (Walkie) Master Control (Managie) Data Protocol (Talkie)

Outline Goals Major Functional Components Hardware Software Interfaces Database Graphical User Interface Algorithms Risks 4/22/2014SCID Design Details Presentation2

Goals Provide an efficient method for agency dispatchers and supervisors to view event, agency, personnel, equipment and device information Allow agency dispatchers and supervisors to send orders and messages to agents in the field in a timely and efficient manner Relay gathered disaster information to agency headquarters and databases located outside the disaster zone 4/22/2014SCID Design Details Presentation3

Major Functional Components 4/22/2014SCID Design Details Presentation4

Major Functional Components 4/22/2014SCID Design Details Presentation5

Hardware 4/22/2014SCID Design Details Presentation6

Software 4/22/2014SCID Design Details Presentation7

Software – Interfaces Interface with data protocol to receive messages from and send orders to hand- held devices Interface with Internet and agency databases to provide information about the disaster and relief efforts to agencies and organizations outside disaster zone 4/22/2014SCID Design Details Presentation8

Software – Database Schema 4/22/2014SCID Design Details Presentation9

Software – Entity Relationship 4/22/2014SCID Design Details Presentation10

Software – Database Access Control Matrix 4/22/2014SCID Design Details Presentation11 Add New User Add New Moderator Send Alerts/Messages Search/Add/Edit Data Remove Data Compare Data View Data Administrator√√√√√√√ Moderator√X√√√√√ UserXX√√X√√

Software - GUI 4/22/2014SCID Design Details Presentation12

Software - GUI 4/22/2014SCID Design Details Presentation13

GUI - Login 4/22/2014SCID Design Details Presentation14

GUI – Administrator Main Screen 4/22/2014SCID Design Details Presentation15

GUI – Data View 4/22/2014SCID Design Details Presentation16

GUI – Map Display 4/22/2014SCID Design Details Presentation17

GUI – Add Data 4/22/2014SCID Design Details Presentation18

GUI – Add User 4/22/2014SCID Design Details Presentation19

GUI – Send Message 4/22/2014SCID Design Details Presentation20

GUI - Alert 4/22/2014SCID Design Details Presentation21

Software - Algorithms 4/22/2014SCID Design Details Presentation22

Risks Consumer Risks C1 – Single Point of Failure C2 – Failure to Adopt System C3 – Difficult to Use C4 – Device Interchanging Technical Risks T1 – Duplicate Events T2 – Transmission Failure to Outside Disaster Zone T3 – Corrupted Data T4 – Security 4/22/2014SCID Design Details Presentation23

Technical Risk 1 – Duplicate Events Probability: 5 Impact: 2 Risk: Two or more alerts may be sent to master control in regards to the same event, causing dispatchers to issue field orders based on incorrect information. Mitigation: Allow users to describe the event in a message and to input coordinates with as much detail as possible to differentiate between events. Train agencies in the importance of using as much detail as possible in their event alerts. 4/22/2014SCID Design Details Presentation24

Technical Risk 2 – Transmission Failure to Outside Disaster Zone Probability: 2 Impact: 1 Risk: Transmission of data to agencies and organizations outside the relief zone may be interrupted, lose data, or fail. Mitigation: Use transmission control protocol to ensure receipt of message and resend if not received. 4/22/2014SCID Design Details Presentation25

Technical Risk 3 – Corrupted Data Probability: 3 Impact: 4 Risk: Data may be lost or corrupted when it arrives at master control and could disrupt the system if not handled properly. Mitigation: Ensure data is intact and not corrupted before attempting to enter it into the database. Request resending of data if any parts are lost or corrupted. 4/22/2014SCID Design Details Presentation26

Technical Risk 4 - Security Probability: 3 Impact: 4 Risk: Master control will store information collected by users in the field, some of which may be sensitive or confidential. Mitigation: Utilize data encryption. Create a secure system that requires users to login to access data. Prevent moderators and users from accessing sensitive information from other agencies besides their own. 4/22/2014SCID Design Details Presentation27

Customer Risk 1 – Single Point of Failure Probability: 2 Impact: 5 Risk: Instituting a centralized data storage and control system creates the risk of the system becoming a single point of failure for the SCIDs project should the system fail. Mitigation: Create back-up databases and distribute the data and control structures across the devices for added redundancy. 4/22/2014SCID Design Details Presentation28

Customer Risk 2 – Failure to Adopt System Probability: 5 Impact: 5 Risk: Failing to adopt the SCID system leaves the current problems facing disaster relief communications unsolved. Mitigation: Create a functional prototype of the SCID system that relief agencies can use during training to emphasize the benefits of SCIDs over the current communications system. 4/22/2014SCID Design Details Presentation29

Customer Risk 3 – Difficult to Use Probability: 3 Impact: 3 Risk: The development of the system may result in a product that is difficult to use and unappealing to target agencies and organizations. Mitigation: Develop the user interface to be simple and easy to use and understand. Train agencies in the use of the system. 4/22/2014SCID Design Details Presentation30

Customer Risk 4 – Device Interchanging Probability: 5 Impact: 2 Risk: Relief workers in the field may accidentally or intentionally exchange devices, causing targeted orders or messages to reach the wrong personnel. Mitigation: Create different IDs for devices and personnel to distinguish between the device and the relief worker utilizing it. Allow dispatchers to send orders and messages agency-wide. Train the agencies to emphasize the importance of keeping the device they were assigned. 4/22/2014SCID Design Details Presentation31

References 3/27/ FEMA. Disaster Emergency Communications Division. FEMA, 17 Aug Web. 10 Feb 2014,. FEMA. Emergency Support Function Annexes: Introduction. FEMA, PDF file. FEMA. NEMIS-MT User Manual. FEMA, PDF file. Gay, Ronald J. An Analysis of Inter-Agency Radio Communications with Emergency Responders. Florida Department of Law Enforcement, n.d. PDF file. National Task Force on Interoperability. Why Can’t we Talk? Working Together To Bridge the Communications Gap To Save Lives. NTFI, PDF file. FEMA. Disaster Emergency Communications Division. FEMA, 17 Aug Web. 10 Feb 2014,. FEMA. Emergency Support Function Annexes: Introduction. FEMA, PDF file. FEMA. NEMIS-MT User Manual. FEMA, PDF file. Gay, Ronald J. An Analysis of Inter-Agency Radio Communications with Emergency Responders. Florida Department of Law Enforcement, n.d. PDF file. National Task Force on Interoperability. Why Can’t we Talk? Working Together To Bridge the Communications Gap To Save Lives. NTFI, PDF file.