Proposal of a new venture for national security. Pre-emptive security means a system designed to deter any attempt of offense before taking place physically.

Slides:



Advertisements
Similar presentations
Protective Security Advisors Securing the Nations critical infrastructure one community at a time.
Advertisements

Distributed Data Processing
Transportation Systems Highway Transportation Characteristics.
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
1Balaji.S. 2 COMPUTER NETWORK AND SECURITY 3Balaji.S.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
New and Emerging Threats to Civil Aviation and the Way Ahead Date: 27th of September, 2010 Aws Al Khanjari Director Aviation Security & Infrastructure.
Cyberterrorism: The Bloodless War? Pat Mcgregor Chief Information Security Architect Intel Corporation 3 October 2001.
Computer Security Fundamentals
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
5 th Meeting of ECO Postal Authorities June 2009 by Jamil Ahmed Additional Director General Pakistan Post 1 Enhancing the Role of Private Sector.
29 May 2006RNSA Workshop 1 Social Implication of National Security RNSA Workshop The risk of public data availability on critical infrastructure protection.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
National Security Brittany Haga Sean Bevans Kelsey Splinter.
IBM Digital Communities Solutions Wireless Clouds Connecting Our Communities Riz Khaliq Business Area Leader Community Broadband, IBM Global Government.
Development Processes and Organizations
Occasions that ICT is used in the Society. 1. Banking System Automated Teller Machine.
Essentials.  Talk about computers in everyday life  Understand the components and basic functions of a computer system  Identify different types of.
3 Cloud Computing.
Critical Emerging Network-Centric Applications Tele-control/tele-presence Defense Tele-medicine Remote plane/vehicle/robot control Distance learning Real-time.
IDENTIFYING THREATS IN A GLOBAL MARKETPLACE Ira S. Somerson, BCFE, CPP Loss Management Consultants, Inc. Institute for Global Management Studies And Temple.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
INDUSTRIAL AND ELECTRONICS APPLICATION DEVELOPMENT DIVISION R&D IN ELECTRONICS GROUP.
Programming of International Development Assistance Donor Sectoral Meeting Ministry of Interior September 17, 2007.
National Workshop on ANSN Capacity Building IT modules OAP, Thailand 25 th – 27 th June 2013 KUNJEER Sameer B History of centralized ANSN website as well.
The role of private security in the protection of critical infrastructures Veerle Pashley Free University of Brussels Department of Criminology.
Intro to Business, 7e © 2009 South-Western, Cengage Learning SLIDE CHAPTER Types of Production Production Planning Planning.
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
Massachusetts Digital Government Summit / Session - Smile You're On CameraPage 1.
Secure Connections for a Smarter World Dr. Shuyuan Mary Ho Assistant Professor School of Information Florida State University.
Identification of national S&T priority areas with respect to the promotion of innovation and economic growth: the case of Russia Alexander Sokolov State.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Korea Telematics Business Association APEC TEL Telematics Strategy Study 33rd APEC TEL BFSG Meeting 27 April 2006.
CARVER+Shock Vulnerability Assessment Tool “As Agile As the Enemy” The Foundation for Institutional Development.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Understanding the Threats of and Defenses Against Cyber Warfare.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
Athens, Conference Hall, Ministry of Infrastructure, Transport and Networks, 5&6 November 2015 INVESTIGATION OF THE DEGREE OF IMPLEMENTATION OF THE INTERNATIONAL.
Cyber Storm Overview Wednesday 2/1/ PT. Cyber Storm Cyber Storm National Cyberspace Security Exercise Mandated in National Strategy to Secure Cyberspace.
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
Foresight Planning & Strategy Dr. Sameh Aboul Enein.
Chapter 17: Foreign Policy and National Defense Section 2.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
Computer Technology: Your Need to Know Chapter 1 Slide 1.
Micro-credit (2010/10/17 – 한국 ). 독해 Micro-credit is the provision of credit services to poor clients. While it is designed to support entrepreneurship.
With the ARNG’s vital role in providing support for homeland defense and the war on terrorism, the nature and types of threats against us have become.
Surveillance and Security Systems Cyber Security Integration.
Critical Infrastructure in Varna
Understanding the Threats of and Defenses Against Cyber Warfare
Joint Force Headquarters-Michigan CCIRs and PIRs
Protection of Critical Infrastructure
Joint Force Headquarters-Michigan CCIRs and PIRs
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 IP Camera Market to surpass.
Chapter 1: Policing in America
Copyright © 2012, Elsevier Inc. All rights Reserved.
Federal Protective Service
3 Cloud Computing.
ASIS 25th New York City Security Conference and Expo
Understanding Critical Infrastructure.
Deborah Housen-Couriel, ADV.
Presentation transcript:

Proposal of a new venture for national security

Pre-emptive security means a system designed to deter any attempt of offense before taking place physically. Most of the developed nations have such type of extensive arrangements and they have attained much attention after 9/11. These systems create a real-time coordination among different systems like aerial surveillance, passenger tracing, automated machines and systems including robots etc.

Terrorists and criminals can’t defeat national establishments like army, police…. so critical state, commercial and development infrastructure is highly exposed to a logical attack, therein jeopardizing our society and way of life. The list of potential targets includes power grids, banks, airlines, air traffic controls systems, trucking and transportation systems, chemical and petrochemical facilities, food storage and manufacturing establishments, retailers, hospitals, national and local government establishments, economic, scientific and educational establishments…….. Electronic espionage also poses a significant threat as cyber criminals are creating new ways to earn a living. Penetrating networks, harvesting files, deleting or altering critical databases, and taking control of critical network components are just a few of the risks. Most of the places in the list have been offended once or multiple times in past and we are helpless every time!!

We at the technical institutes can develop security systems for potential targets and proper controllable and coordinated systems that can be easily used by security personnel. We have projects on (ideas and details put by students and research scholars at IITK): 1. Sound Source Localization 2. Computer Vision 3. Tracing people with the help of Image Processing 4. Remote control through visual servoing 5. Airborne vehicle for outdoor surveillance

Finding students for these projects. Call for some more projects and ideas from students and research scholars, especially in cyber security, data mining and automation. Talk with govt. and private agencies who need these systems so that students working upon them can have a better understanding of the problem.

We have to fight with terrorism in air, water, land, streets, market places, govt. economic, educational and scientific establishments, internet and everywhere with precision and pre-emptiveness so that we can create a better and stronger India. Educational institutes like IITs have to play a central role in designing technologies for such security systems for three broad reasons: 1. Security 2. Cost-efficiency 3. Creating a pool of security experts

** IMP: Name of concerned people is in the next slide.

Prithwijit Guha (Research Scholar): Computer Vision, Aveek Dutta (M-Tech, 2 nd year): Sound Source Localization, Rajat Goyal and Mudit Mehrotra (M-Tech 5 th year): Surveillience Plane, Abhishek Sharma (4 th year): Remote control through visual servoing, Sunny Agarwal and his team(2 nd year): Face Recognition, Some of these ideas were submitted in PoWER Ideas, Takneek At that time, we didn’t have much resources to support these projects but now, we have a support of up to Rs 2 crores. These ideas will be made available to interested students if the people who have proposed them allow for that. Other than these, we invite more ideas related to security systems.