SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 2: 25 March 2006.

Slides:



Advertisements
Similar presentations
Minnesota Port and Waterway Security Working Group Meeting April 12, 2012.
Advertisements

OPERATION SAFE STOP An Educational Campaign by the New York Association for Pupil Transportation Prepared by NYAPT through the National Highway Transportation.
Emergency Management: An Overview
GOVERNMENT IMPACT AND PREPARATION. The United States Federal Government takes actions that are in the best interests of the nation and are not likely.
Transportation Systems Highway Transportation Characteristics.
Kenneth Watson Partnership for Critical Infrastructure Security Partnership for Critical Infrastructure Security.
Transit Security: An Overview of Activities Since 9/11 Eva Lerner-Lam President Palisades Consulting Group, Inc. ITE 2003 Annual Meeting August 24-27,
University of Connecticut-Stamford Campus Safety Orientation.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
DHS, National Cyber Security Division Overview
Pedestrian rights and responsibility (a) Upon the immediate approach of an authorized emergency vehicle making use of an audible signal meeting.
It is the parent or guardian’s responsibility to show a child good and safe habits. You can tell a child all day how to follow the rules, but you must.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
June 9, 2003 Updated July 2004 Slide 1 Critical Infrastructure Assurance: The US Experience.
MINISTRY OF SOCIAL AFFAIRS AND HEALTH 1 Introduction to corporate security Teemupekka Virtanen Helsinki University of Technology Telecommunication Software.
Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.
Critical Infrastructure Interdependencies H. Scott Matthews March 30, 2004.
A Very Big Branch You’ve ran across some acronyms in the reading. See if you can remember these:
THE EXECUTIVE BRANCH The President The Administration
NIS Directive and NIS Platform
Food Safety and Inspection Service U.S. Department of Agriculture Homeland Security: Protecting the U.S. Food Supply Office of Food Security & Emergency.
Signals,Road Markings, Intersections, Sharing the Road
DRIVING UNDER ADVERSE CONDITIONS NIGHT DRIVING RAINY WEATHER SNOW,SLEET,ICE FOG.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Stop Sign This is a traffic sign. This means to stop. It helps us be safe when driving.
The Federal Bureaucracy Chapter 15. What is a bureaucracy?
Japanese Government’s Efforts to Address Information Security Issues October, 2007 National Information Security Center (NISC)
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
DEEP Driver Education & Enlightenment Program A Non-profit Organization Saving Lives Through Education.
CRITICAL INFRASTRUCTURE & CONTINUITY OF OPERATIONS IN A POST 9/11 WORLD Presented by: Dr. Pamela Collins, EKU/JSC.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
Volunteer Safety Patrol Training Safe Routes to School San Diego Police Department Kristine Schindler, SRTS Diana Juarez, SRTS Officer Emilio Ramirez.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Keeping Myself Safe. PSHEe/C Entitlement – Keeping Myself Safe Reception – Practices some appropriate safety measures without direct supervision. (40-60+
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness Signs You’ve Been.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
This is…. $200 $400 $600 $800 $1000 $200 $400 $600 $800 $1000 $200 $400 $600 $800 $1000 $200 $400 $600 $800 $1000 LawsVH PolicySignsPotent Potables.
Riding on the Apparatus Safely Firefighter I. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with.
Emergency Situations. What is the best procedure to follow in the event one of the following driving emergencies happens to you?
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
TRANSPORTATION SECURITY Transportation Border Working Group Dearborn, MI - June 1, 2005 Serge Lavoie, Surface & Multi-modal Security Policy Security and.
Government Agencies. State Department 1789 French Revolution caused us to think about having an agency that deals with other countries Secretary of State.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Intersections.
Establishing an Aviation Risk Context APEC TPTWG-27 Aviation Security Experts Sub-Group Meeting Denise Morgan Office of Transport Security May 2006.
1 Portland Office of Emergency Management (POEM) Urban Areas Security Initiative State Homeland Security Office of Domestic Preparedness - Grant Programs.
Security Partnership By Kevin Hegner Public Private.
 Congestion Busting Toolbox Brief Security. Causes of congestion Below are some of the main causes of congestion in the capital Collisions – 28% Vehicle.
Deputy Chief Jerry Villanueva, EMC Lieutenant Thomas Quinn, Asst. EMC Robert Bartley, EM Planner
Disaster and Emergency Management
Ken Watson 9 Sep 2003 Critical Infrastructure Assurance: Business Case for Public-Private Partnership Ken Watson 9 Sep 2003
Critical Infrastructure in Varna
24/7 Security & Medical Assistance while traveling internationally
Injury prevention Pedestrian Safety.
French Port Cybersecurity Initiative
BCC 403 Education for Service-- tutorialrank.com
Copyright © 2012, Elsevier Inc. All rights Reserved.
The U.S. Department of Homeland Security
The FBI The Federal Bureau of Investigation is the top law enforcement agency. They investigate all federal crimes and crimes where jurisdiction crosses.
European Programme for Critical Infrastructure Protection (EPCIP)
lesson 14.2 FOLLOWING AND MEETING TRAFFIC
TRAFFIC AND ROAD SAFETY
Presentation transcript:

SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 2: 25 March 2006

2 Class Website Class Info Contact info

3 Agenda My Presentation Student Presentations Risk Analysis Lecture Discussion

Presentations

Risk Analysis

6 Risk Assessment Risk assessment is about foreseeing the future Used to predict harmful or unwanted events Predictions are not 100%, but can assist us to avoid or reduce risk A risk assessment can tell us about: Probability - how likely are harmful events? Severity - how bad will they be? Rate - how often will they happen? Drivers - what are the key factors causing harmful events? Risk assessment is a best management practice in government and business

7 Risk Management Cycle Source: MI5 – UK’s Security Service

8 Risk Assessment Example Crossing a busy street

9 Step One: Identify the threats Getting hit by a car Causing an accident Causing traffic to slow down Other pedestrians Jaywalking ticket

10 Step Two: Establish protection scheme & your vulnerabilities Protection schemes Identify traffic pattern Find a crosswalk Wait for the light to change Vulnerabilities Car not stopping Light change before you get across Wet pavement and roads Drunk driver

11 Step Three: Identify measures to reduce risk Only cross at intersections Wear a reflective vest Carry a flashlight

12 Step Four: Review security measures and security plans Look both ways Wait until “WALK” light is on Only cross at intersections

Lecture

14 Security vs. Functionality Open Secure Open Secure OpenSecure Attributes Balanced approach Moderate access Burden is on sysadmin Attributes Totally safe Difficult to do business Easy to manage Attributes Extremely vulnerable Easy access to outside Impossible to control

15 Discussion Question Do you have a computer at home? Is it connected to the Internet? Do you have a broadband connection? Do you have a firewall? Do you run anti-virus software?

16 Reference Websites Shields up! Broadband reports WinGuides Network for Windows

Discussion

18 Discussion Questions What can the government do to protect the critical infrastructure? What can’t it do? What is the private sector doing to protect the critical infrastructure? Where are the government and the private sector cooperating?

Assignment for Week 3

20 Briefing Assignment Prepare and present a ten minute discussion on what your chosen government agency has done for its designated infrastructure sector Cite sources

21 Topics Commerce: Information & communications Treasury: Banking & Finance EPA: Water supply Transportation: Aviation; Highways; Mass transit; Pipelines; Rail; Waterborne commerce Justice/FBI: Emergency law enforcement services FEMA: Emergency fire enforcement services and COOP HHS: Public health service Energy: Electric power, oil, and gas production Justice/FBI: Internal security State: Foreign affairs Defense: National defense

22 Additional Readings for Week 3 National Strategy to Secure Cyberspace Office of Homeland Security ategy.pdf ategy.pdf Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats Center for Strategic and International Studies

23 Reminder Research topics due One page summary