Presentation is loading. Please wait.

Presentation is loading. Please wait.

CyberSecurity and Location Intelligence Technology

Similar presentations


Presentation on theme: "CyberSecurity and Location Intelligence Technology"— Presentation transcript:

1 CyberSecurity and Location Intelligence Technology
Timothy Lorello SVP, Chief Marketing Officer Nov. 16th, 2011

2 Who Is TCS? A World-Leader in Highly Reliable and Secure Data Communication Technology
Established in 1987 HQ: Annapolis, Maryland, USA Offices: USA and around the globe 1,500+ employees $389M revenue NASDAQ: TSYS Strategic Offers Messaging Location Infrastructure Navigation & LBS Applications Wireless & VoIP NG9-1-1 Telematics End-to-End Satellite Solutions Cyber Security 2

3 Quick Topics Problems We Face Today Tools We Currently Use
Applications For Cybersecurity 3

4 Problem: Cyber Attacks Escalating
Cyber attack on RSA cost EMC $66 million >720 organizations affected >20% of Fortune 500 hit Washington Post 7/21/11 Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually >431M adult victims in past year >42% increase in mobile cybercrime over past year Semantec 9/21/211 China Linked to Cyber Attacks on 48 Chemical and Defense Companies AP News 11/1/11 U.S. report blasts China, Russia for cyberattacks USA Today 11/3/11 15 Percent of All Internet Traffic Secretly Rerouted Through China DefenseTech 11/30/2010 Not all Cyber Threats are virtual!

5 Tools We Currently Use Location-Based Commercial Applications
Device Locator Family Locator E9-1-1 & Call Maps 5

6 Tools: Device Locator Go to Settings, tap iCloud, and enable Find My iPhone.*

7 Tools: Family Locator

8 Set geo-fences around home, school, the library, or a friend’s house
Tools: Family Locator Geofencing Set geo-fences around home, school, the library, or a friend’s house

9 Application: Geofencing
Using location-based services to protect infrastructure Homeland Security News Wire 3/4/11 We protect our children – why not our infrastructure?

10 Tools: Wireless E9-1-1 Mobile Switching 1 Center 3 2 PSAP
911 Communicator 9-1-1 ESRK Mobile Switching Center Precise X/Y 1 Dispatch to Precise X/Y 3 a - Tower b - Precise 2 + ESRK 9-1-1 PSAP Precise X/Y CRDB – Call Routing Data Base PDE - Position Determination Entity ESRK MPC – Mobile Positioning Center ESRK = Emergency Services Routing Key MPC ALI CRDB PDE E911 Network Operations Center

11 Tools: E9-1-1 Call Data TCS can statistically analyze and map E911 calls Uncertainty levels can be quickly analyzed for all geographic areas An assumed 80/20 rule (e.g. where 80% of PSAPs will show meeting FCC accuracy levels) Focus efforts on the 20% of areas showing high horizontal uncertainty

12 Tools: Data Reveals Key Information
Green Dots (92%) indicate PDE reported uncertainties <= 80M Plotted calls clearly show highway pattern – meaning position fix of calls are within the width of a highway Red Dots show areas where network/terrain problems may exist

13 Tools: Analytics Using Overlaid Maps
GIS tools/data drive analysis Ability to understand nature of horizontal uncertainty of calls Possibly In-building call Possibly call in forest

14 Application: The Web Is a Set of Nodes

15 Application: Data Traverses the Web

16 Application: Tracking an Attack
Propagation of the “swarmer” virus Hideshima & Koike; Univ. of Electro-Communications; Japan

17 SVP, Chief Marketing Officer TeleCommunication Systems (TCS)
Panel Questions Timothy Lorello SVP, Chief Marketing Officer TeleCommunication Systems (TCS)


Download ppt "CyberSecurity and Location Intelligence Technology"

Similar presentations


Ads by Google