Symbol Technologies Security Forum - Airline Security

Slides:



Advertisements
Similar presentations
NexSentry Imaging Solutions
Advertisements

RFID Access Control System March, 2003 Softrónica.
Narita International Airport Corporation All Rights Reserved. Yoshihiro Ozawa Planning Department Narita International Airport Corporation 21 April 2005.
Distributed Data Processing
Communication and Networking Services Networking Services.
SysLogix Inc. eProducerPortal.com by. Introduction "'Onboarding” - the process of contracting and appointing new agents. It is used to refer to the administrative.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Department of Labor HSPD-12
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
Ir. Muhril Ardiansyah, M.Sc., Ph.D.1 Computer Hardware.
8.
Active Directory: Final Solution to Enterprise System Integration
PIV Data Model Testing Ketan Mehta March 3, 2006.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
All Organizations Need to Share and Communicate Information...
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
Hardware and Software Basics. Computer Hardware  Central Processing Unit - also called “The Chip”, a CPU, a processor, or a microprocessor  Memory (RAM)
GSA Expo 2009 Impact of Secure Flight Program on DoD Travel Mr. George Greiling GSA Expo June 2009.
NASA Personal Identity Verification (PIV) NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop.
Enhanced Collaboration and other benefits of Sharepoint Technologies Kern Sutton Business Productivity Group Microsoft Corporation.
2 Object-Oriented Analysis and Design with the Unified Process Objectives  Describe the differences between requirements activities and design activities.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
What is Enterprise Architecture?
Interoperability Tests for IEC Scott Neumann November 12, 2009.
JDF in the Inter-Enterprise Workflow Achieving JDF workflow automation.
1 Sales Academy Training Inner Range Product Advantages, Competitors & The Future.
ROM Read Only Memory “…computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only.
1 Simplifying the Business  INTERNATIONAL AIR TRANSPORT ASSOCIATION 2010 IATA Passenger Experience Airport Forum Bucharest, 17 November, 2010.
Chapter 2: Information Technology and AISs
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Hosted by: June 23-26, 2003 New York City Copyright Security On The Go Ensuring Safe Transportation.
OOI CI LCA REVIEW August 2010 Ocean Observatories Initiative OOI Cyberinfrastructure Architecture Overview Michael Meisinger Life Cycle Architecture Review.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
1 1 Aeronautical Information Services Brief to AIXM User Group 27 February 2007.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Course ILT Basic networking concepts Unit objectives Compare various types of networks Discuss types of servers Discuss LAN topologies Discuss planning.
1 The Future Trend of Airport Passenger Services Greater convenience, speed and control for passengers Simplifying the Business  International Air Transport.
Kemal Baykal Rasim Ismayilov
Medical Imaging Lection 3.
G041: Lecture 08 ICT Infrastructure Used By Organisations Mr C Johnston ICT Teacher
Fostering worldwide interoperabilityGeneva, July 2009 The Home Network: Where Convergence Takes Hold Tim Jeffries, VP Technology and Business Development,
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Medical Imaging Lection 3. Basic Questions Imaging in Medical Sciences Transmission Imaging PACS and DICOM.
IPS Infrastructure Technological Overview of Work Done.
Introduction to Exterity
Momentum. Strategy & Roadmapping Business Analysis Information Architecture Usability / User Experience Rich Media Social Media (Web 2.0) Interface Design.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
Deliver a first class educational experience, from video-based learning to student accommodation entertainment Exterity IP Video Solutions in Education.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
THE MALAYSIAN ELECTRONIC PASSPORT
Chapter 1: Exploring the Network
Discovering Computers 2010: Living in a Digital World Chapter 14
IT INFRASTRUCTURES Business-Driven Technologies
Objective Understand the concepts of modern operating systems by investigating the most popular operating system in the current and future market Provide.
Biometric technology.
Enterprise Resource Planning
ATIS’ Service Oriented Networks (SON) Activity
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop December 14, 2006.
Objective Understand the concepts of modern operating systems by investigating the most popular operating system in the current and future market Provide.
Presentation transcript:

Symbol Technologies Security Forum - Airline Security Michael Attar SITA Airport and Desktop Services Director Technical Design Ss

Move Who is SITA ? SITA is a Leading provider of IT solutions to the Air transport Industry Common use systems for passengers and baggage Systems Integration Resource management and Signage Global Networking

SITA Security Enablers Passenger Processing CUTE and KIOSK Baggage Reconciliation IBRIS and CUBES Global enterprise Campus LAN/ Airportnet WAN Logistics/Support

CUTE System Attributes Adaptable / Global Compatibility Globally Compatible 200+ CUTE Sites World wide 22,000+ Workstations Adaptable Development platform Supports 280 end user developed applications Standards Based Solutions IATA,AEA, IEEE,ISO ect

Airport Security Overview Solution Dependencies Politics ….???? Funding…!!!! Operational Practicality and Cost

Passenger Security - Overview Security Opportunities Steps to Realizing these Opportunities Background : Airport IT Profile Solution Characteristics (Key to success) Solution Components

Passenger Security Security Opportunities Terrorist Screening Passenger Validation Passenger Identification

Security Opportunities Terrorist Screening Scanning and matching ALL faces is not possible Matching faces to a Known list is as follows: Approach Standard Collections Points with Camera Common server with existing LAN to store images and execute comparison algorithm WAN for updates to target list

Security Opportunities Terrorist Screening Issues: Logistics Official Terrorist Comparison List Update and distribution methods No Challenge point Technical Considerations Positioning of cameras Trouble with Dark Skin and Facial Orientation Scalability ( how many faces?)

Security Opportunities Passenger Validation Validate the person who checked in is the one transiting the airport and boarding the plane Approach: Capture a biometric and a search key during Checkin Challenge point is Checkin Agent dependent Store data to a Common Server or encoded on Boarding Pass. Check biometric at Security & Gate during boarding

Security Opportunities Passenger Validation Issues: Logistics Public acceptance to Biometrics capture Only requires “VALID ID” Technical Considerations ATB encoded Images are low quality No Standard Quiet Zone on ATB for Barcode Security Checkpoint Must support all airlines

Security Opportunities Passenger Identification Issue Travel Cards with Multiple Biometric signatures Approach: Pre-screen all bio card holders Challenge Point is a Government Agency Opportunity to expedited checkin and boarding process Utilize Security Staff to focus on Non-Bio card holders

Security Opportunities Passenger Identification Issues: Public acceptance and Cost of cards Issuance authority Technology Considerations Use Smart Cards with Digital Certs to secure data Flexible: Can hold numerous Biometrics Can store Airline frequent flier data Potential to significantly expedite travel

Realizing the Opportunity Airport IT Profile IT responsibility is spread amongst numerous group, departments and companies Lack of cohesive planning Isolated Networks different manufactures varying CORE Capabilities of Networks single purpose equipment

Characteristics of the successful Security Solution Consistency of Operation High Availability and accuracy Baseline of uniformity across airports Scalable Components Must address Tier 1-4 airports Potential for off-airport use Ability to Leverage existing Infrastructure

Characteristics of the Successful Solution Ability to Accommodate Diverse requirements Local Laws or Physical constraints Various Input devices or screening methods Capability to Share data Locally within airport systems Centrally / Globally interchange

Solution Components Standard Data collection/retrieval points Common Secure Transit Network Interoperable Data Repository Adaptable logic / rules based

Solution Components Data collection/retrieval points IATA RP 1797 (Common Use Terminal Equipment) Standard PC with Serial or USB interfaces Accommodates various biometrics Customer facing at Checkin/Gates Multi-user, Multi-functional terminals Inherent Lan/Wan connectivity

Client Hardware CAMERA MSR /LSR Turnstile Finger Print ATB Printer BTP Printer Gate Reader Document Printer

Solution Components Common Transit Network Must be SECURE and RELIABLE Provide Global Presence Internet Like Service IP protocols only Any to Any or Controlled connectivity

Intranet Connect Network Concept GLOBAL IP Infrastructure Community 1 Customer A Customer B Community 1 Community 2 GLOBAL IP Infrastructure Customer B Customer C Customer D

AirportNet Community of Airports Airport 1 Airline intranet CUTE Airport CPE SBR SAR Airline DCS Global SITA IP network Airport 2 SAR Airline intranet Airport CPE Airline DCS CUTE BR’s Airline intranet Airline DCS SBR Airport 3 SAR SAR CUTE Airport CPE management centers

Solution Components Interoperable Data Repository Collect and compare data locally intra-airport security Collect and correlate data globally inter-airport security Standard DATA formats Opportunity to leverage XML

Solution Components Adaptable Logic / rules based Customization to meet local needs Screening criteria can be targeted to risk Enables innovative developments

Campus Network Logical Design

Thank you QUESTIONS???