Best Practices Tutorial

Slides:



Advertisements
Similar presentations
B EST P RACTICES T UTORIAL 2/13/2014 K. F. Rauscher 1 IEEE Communications Society Technical Committee on Communications Quality & Reliability (CQR) PSAP.
Advertisements

The U.S. Department of Transportation and the Next Generation Jenny Hansen, Contractor – NG9-1-1 Project Coordinator USDOT/NHTSA.
EMS Checklist (ISO model)
Course Material Overview of Process Safety Compliance with Standards
Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
NRIC IV Network Reliability and Interoperability Council IV Washington, DC July 14, 1999 Subcommittee 2: Data Analysis and Future Considerations PJ Aduskevicz.
Contractor Code of Business Ethics and Conduct Laura K. Kennedy Senior Vice President, Ethics and Compliance SAIC.
Connecticut Emergency Management and Response
Agenda COBIT 5 Product Family Information Security COBIT 5 content
National Infrastructure Protection Plan
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
The Islamic University of Gaza
Business Crisis and Continuity Management (BCCM) Class Session
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Concepts of Database Management Seventh Edition
Stephen S. Yau CSE , Fall Security Strategies.
Understanding Multiagency Coordination IS-701.A – February 2010 Visual 2.1 Unit 2: Understanding Multiagency Coordination.
Best Practices Tutorial The primary objective of Best Practices is to provide guidance, based on assembled industry expertise and experience, to improve.
Crisis Management Planning Employee Health Safety and Security Expertise Panel · Presenter Name · 2008.
Review of Power Blackout on Telecom P. J
Part of a Broader Strategy
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Concepts of Database Management Sixth Edition
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
WORKING EFFECTIVELY IN AN INFORMATION TECHNOLOGY ENVIRONMENT
Information ITIL Technology Infrastructure Library ITIL.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
ESF #2 Communications.
Web-centric BusinessNRIC V – February 27, 2001 NRIC V Council Meeting - February 27, 2001 Focus Group 2.B1 Network Reliability - Data Reporting & Analysis.
Concepts of Database Management Eighth Edition
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Working Group 8 – E9-1-1 Best Practices March 6, 2013 Robin Howard Chair WG 8 – E9-1-1 Best Practices.
The McGraw-Hill Companies, Inc Information Technology & Management Thompson Cats-Baril Chapter 1 Introduction to Information Technology & Management.
1 Public Safety and Homeland Security Bureau Report: Presentation to the Commission January 15, 2009.
North American Network Operations Group (NANOG) October 23, 2000 Washington, DC PJ Aduskevicz AT&T.
Working Group 8 – E9-1-1 Best Practices June 6, 2012 Robin Howard Chair WG 8 – E9-1-1 Best Practices.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
FORUM GUIDE TO SUPPORTING DATA ACCESS FOR RESEARCHERS A STATE EDUCATION AGENCY PERSPECTIVE Kathy Gosa, Kansas State Department of Education.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
2 Gordon Barber March 14, 2003 Focus Group Committee Chairs F Cable: John Thrower (Cox Communications) F CLECs: Robert Smith (McLeod USA) F Equipment.
Public Safety and Homeland Security Bureau 2006 Annual Report January 17, 2007.
Working Group 8 – E9-1-1 Best Practices December 16, 2011 Robin Howard Chair WG 8 – E911 Best Practices.
Chapter 8 Auditing in an E-commerce Environment
2 Gordon Barber March 14, 2003 Focus Group Committee Chairs F Cable: John Thrower (Cox Communications) F CLECs: Robert Smith (McLeod USA) F Equipment.
Business Continuity Disaster Planning
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
1 Federal Emergency Management Agency Charlie Hoffman Disaster Operations Directorate Chief, DEC Programs Disaster Emergency Communications National Public.
EXPECT THE UNEXPECTED Prepare Your Business for Disaster.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
Communications Coordination Group (CCG). MISSION To facilitate interagency coordination and collaboration to provide efficient and effective pre-planning.
11 S I A M E M B E R C O M P A N I E S Satellite Industry Response to 2005 Hurricanes Satellites = Redundancy, Ubiquity, Interoperability.
Information ITIL Technology Infrastructure Library ITIL.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Satellites = Redundancy, Ubiquity, Interoperability
Information Technology (IT) Department
Focus Group Committee Chairs
Cybersecurity ATD technical
Best Practices Tutorial
Best Practices Tutorial
Presentation transcript:

Best Practices Tutorial The primary objective of Best Practices is to provide guidance, based on assembled industry expertise and experience, for network reliability and resiliency. NRSC Best Practices Subcommittee February 2014

Best Practices Guidelines Proven through actual implementation – more than “just a good idea” Address classes of problems (rather than one time issues) A single concept should be captured in each practice (one thought, one practice) Should not endorse specific commercial documents, products or services Developed through rigorous deliberation and expert consensus Confirmed by a broad set of stakeholders Should not be assumed to be applicable in all situations or to all industry types Does not imply mandatory implementation

Best Practice Format The format of the Best Practices should all be in the form of: "__________________ should ___________________" 1st blank “Who”: consists of the implementer (i.e., Service Provider, Network Operator, Equipment Supplier, Property Manager, Government, Public Safety) 2nd blank “What”: consists of the Best Practice. The Best Practice may include the use of a modifier (e.g., consider, in order to, etc.).

Best Practice Example 7-7-1031 First Blank - WHO Modifier 7-7-1031 Network Operators and Service Providers should consider entering into Mutual Aid agreements with partners best able to assist them in a disaster situation using the templates provided on the NRIC and NCS websites. These efforts could include provisions to share spectrum, fiber facilities, switching, and/or technician resources. See http://www.ncs.gov/ncc/nccmaa/nccmaa_toc.html and http://www.nric.org/meetings/meeting20020913.html Second Blank - WHAT Should be located in reference section. Does not belong in actual BP. Supporting information, found in Reference section.

Best Practice Numbering Format For existing NRIC/CSRIC Best Practices: Each Best Practice has a unique number that follows the numbering format: X - Y - Z # # # X = the current, or most recent, NRIC/CSRIC Council (e.g., 8 in 2009-2010) Y = the Council in which the Best Practice was last edited Z = 0-4 for Network Reliability and Interoperability     = 1 for Disaster Recovery and Mutual Aid     = 3 for Public Safety     = 5 for Physical Security     = 8 for Cyber Security # # # = any digits, where every Best Practice has a unique Z # # #

Other Considerations For each new BP identify: Network Type Industry Role Status (Rating & Ranking) Applicable Keywords

Best Practices Network Types Cable An entity that provides communications through direct connectivity, predominantly by coaxial cable or optical fiber, between the serving central office and end user location(s). Internet/Data An entity that provides internet and/or data communications through direct connectivity, predominantly by wire, coaxial cable, or optical fiber, between facilities-based and non-facilities-based serving networks and end user location(s). Satellite: An entity that provides communications through satellite connectivity. Wireless: An entity that provides communications through radio spectrum allocation, predominantly by cellular architecture and/or CMRS networks between the mobile switching center(s) and end users . Wireline: An entity that provides communications through direct connectivity, predominantly by wire or optical fiber, between the serving central office and end user location(s).

Best Practices Industry Roles Equipment Supplier An organization whose business is to supply network operators and service providers with equipment or software required to render reliable network service Government A federal, state, or local government agency.  Network Operator An entity responsible for the operation, administration, maintenance, and provisioning (OAM&P) of communications networks.  Property Manager An entity responsible for the operation of a physical location that houses communications equipment.  Public Safety An entity that administers and/or operates a Public Safety Answering Point (PSAP) or the public safety network.   Service Provider An entity responsible for providing communications services for consumer and business customers.

Best Practices Rating and Ranking Critical (1) Best Practices include those which meet any of the following standards: Significantly reduce the potential for a catastrophic failure of critical communications network infrastructure and/or services (e.g., telecommunication, public safety, energy sector, financial, etc.). Materially limit and/or contain the geographic area affected by a communications failure from cascading to other or adjacent geographic areas. Affect critical communications networks (e.g., SS7) for all network configurations, independent of size. Preserve priority communications for key personnel involved in disaster response and recovery. Highly Important (2) Best Practices include those which meet any of the following standards: Improve the likelihood of emergency call completion, with caller information, to the appropriate response agency (i.e., Public Safety Answering Point), ensuring access to emergency communications for all callers. Improve the efficiency and promote the availability of networks and the likelihood of call completion and message transmission (e.g., e-mail, instant messaging) for key personnel involved in disaster response and recovery. Improve detection of network events by network operators and service providers. Implementation has improved network reliability but may not be applicable for all networks or companies. Important (3) Best Practices include those which meet any of the following standards: Promote sound provisioning and maintenance or reliable, resilient networks, services, and equipment, but were not otherwise classified. Common sense BPs that entities generally adopt.

Best Practices Recommended Keywords Access Control Limiting and/or documenting physical access to buildings, equipment and/or systems. Buildings Physical structures that house communications equipment or employees. Business Continuity Corporate wide program that has been established for the purpose of internal planning for and responding to emergency situations impacting services, employees or assets. Contractors & Vendors Non-employees working on behalf of the company or providing goods/services (not visitors). Corporate Ethics Corporate values and integrity for organizations supporting public communications infrastructure. Cyber Security The protection of information and systems against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional. Disaster Recovery Steps taken after an emergency event has occurred to recover from the event. Documentation Information concerning the operation/location of communications equipment and networks. This DOES NOT necessarily include everything written but may include information in a draft format. Emergency Preparedness Steps taken prior to an emergency event occurring that will facilitate the restoration from the event. Encryption Steps taken to make data unusable to any other person(s) or system(s) other than for whom it is intended. Facilities – Transport Interoffice facilities used to carry communications (e.g., copper, fiber, free space). Fire Preventing, controlling, or extinguishing combustion of materials at or near telecommunications equipment. Guard Force People tasked for safeguarding facilities, physical assets, and personnel. Hardware Equipment used to support communications networks. Human Resources Processes and procedures relating to personnel within a company. Industry Cooperation Collaboration between separate business entities. Information Protection Safeguarding the confidentiality and integrity of a company’s proprietary information.

Best Practices Recommended Keywords (cont’d) Intrusion Detection Actions taken to alert users or administrators when an unauthorized entity has attempted or has succeeded in accessing a system or database. This denotes cyber intrusion and does not cover physical intrusion. Liaison Maintaining communications through a working relationship with other entities. Material Movement Physical movement of materials (i.e., logistics). Network Design Planning and configuration of communication networks. Network Element Unique equipment that is a component of a network. Network Interoperability Interaction of networks that must work together to provide communications. Network Operations Tasks required to operate a network. Network Provisioning Steps taken to activate equipment/services in a network. Pandemic Related to the preparation or reaction to wide-spread epidemic or epidemic in a specific area. Physical Security Management Anything having to do with safeguarding the physical assets of the corporation. Policy High level management statements of a desired condition (not detailed procedures). Power Electrical systems (AC/DC) used to operate communications equipment. Procedures Instructions for specific tasks. Public Safety Related to emergencies and 9-1-1 services used by individuals or corporations. Security Systems Hardware/Software devices specifically used to monitor and control security. Software Code specific to running communications equipment. Supervision Direct management of tasks workers. Technical Support Providing assistance in installing, maintaining, or restoring equipment. Training & Awareness Company provided instruction or other means of education on specific topics. Visitors Individuals who are not employees/contractors/vendors.

12

https://www.fcc.gov/nors/outage/bestpractice/BestPractice.cfm