Unified Multi-Critical Infrastructure Communication Architecture

Size: px
Start display at page:

Download "Unified Multi-Critical Infrastructure Communication Architecture"

Transcription

1 Unified Multi-Critical Infrastructure Communication Architecture Titus Okathe, Shahram Shah Heydari, Vijay Sood and Khalil El-Khatib University of Ontario Institute of Technology, Oshawa, Ontario, Canada Abstract Recent events have brought to light the increasingly intertwined nature of modern infrastructures. As a result much effort is being put towards protecting these vital infrastructures without which modern society suffers dire consequences. These infrastructures, due to their intricate nature, behave in complex ways. Improving their resilience and understanding their behavior requires a collaborative effort between the private sector that operates these infrastructures and the government sector that regulates them. This collaboration in the form of information sharing requires a new type of information network whose goal is in two parts to enable infrastructure operators share status information among interdependent infrastructure nodes and also allow for the sharing of vital information concerning threats and other contingencies in the form of alerts. A communication model that meets these requirements while maintaining flexibility and scalability is presented in this paper. Index Terms Critical Infrastructure, Publish/Subscribe, Information Sharing, Interdependency, Situational awareness M I. INTRODUCTION ODERN society depends on a number of vital goods and services which help to maintain its health, wealth and security. The collection of physical assets, processes and organizations that are responsible for the production and distribution of these essential goods and services are termed Critical Infrastructures (CIs)[1]. CIs encompass a number of different sectors which include electricity, oil and gas, water distribution and waste water management, transportation (airways, railways etc.), banking and finance, emergency services and government services. Individually, each sector comprises various organizations, processes and agencies that interact with one another and with other sector agents to create and distribute goods and services. These interactions result in the emergence of complex relationships, dependencies and interdependencies between the CI sectors [2]. The normal operation of CIs may be disrupted due to a number of reasons such as component failure, human error, terrorism, natural events etc. One type of failure that arises as a consequence of interdependencies is cascade failure. For example in July 19, 2001 a freight train derailed in the Howard Street Tunnel, Baltimore. As anticipated, there were disruptions to rail system traffic and automobile traffic as well as increased activity for emergency services. However, besides these effects there was a cascading degradation of infrastructure components. A water main above the tunnel broke due to the fire in the tunnel, resulting in localized flooding. Additionally, the flooding resulted in electricity blackout to about 1,200 downtown Baltimore residences. Also, fiber optic cables running through the tunnel were damaged resulting in disruptions to communication services (phone, cell phone, internet etc.) to major corporations. Furthermore, the effect was felt far away, as the disruptions in the rail system led to delays in the delivery of coal and limestone for steel in the Middle Atlantic States [3]. A dependency is said to exist between two infrastructures if the state of the latter is influenced by the state of the former or if the state of the latter is correlated with the state of the former [2]. When this dependency is bidirectional, it is referred to as interdependency. In practice most critical infrastructures are interdependent. Interdependency may be physical, cyber, geographic or logical. Physical interdependency exists between infrastructures that rely on the flow of material from one infrastructure to another such as between a gas power plant and the gas pipeline infrastructure. Cyber dependency arises when there is a reliance on information flow between the infrastructures, an example is between the supervisory control and data acquisition (SCADA) network of an electric grid and the electric grid itself. Geographic interdependency is the dependency due to proximity or co-location. This is especially true for road networks, railways, natural gas pipelines and underground electricity cables or telecommunication fiber. Finally, logical dependency is any dependency that does not fall under any of the other categories. Logical dependencies usually arise from human decisions and policies. In this paper the performance of a unified architecture for integrated status monitoring and management of multiple CIs is demonstrated. A publish-subscribe architecture that has already been proposed for Electric grid is extended here for multiple CI interconnection, and CAP (Common Alerting Protocol) is implemented as the method for data exchange in this new architecture. Simulation results are presented to show the performance of this scheme.

2 The rest of this paper is organized as follows. Section II presents a review of the current trends in CI protection and management (interdependency modelling, information sharing) and some of their challenges. Next, a new unified architecture for multi-ci management is proposed in Section III, followed by performance results in Section IV. Finally, conclusions and some future possible enhancements to the current model are presented. II. CI MANAGEMENT AND PROTECTION A. Interdependency Modeling A first step towards CI protection is to understand the vulnerabilities and risks posed to CIs as a result of interdependency. This is a complex task due to the sheer size of CI sectors and number of individual components and agencies involved. To improve the understanding of these risks, there has been much research into interdependency modelling. CI interdependency modelling has been approached in a number of ways. These approaches include continuous or discrete time step simulations and modeling techniques like Markov chains, Petri Nets, dynamic simulation, agent-based, etc. [3]. Each of the modelling techniques has its strength and weaknesses. For example, agent-based models usually do not capture specific details of each CI; however, they have the advantage of being simple and fast. The main objective of modelling the interdependencies in CIs is to allow stake holders to better prepare for contingencies and prevent cascade failures from happening or at least mitigate their effect. However, CI modelling is limited by data accessibility, model development (what to model, how much detail is sufficient), and model validation (does the model approximate real events sufficiently). Currently CIs are separately managed and this is not expected to change in the future. However, the models being developed will eventually be used in the management of CIs. Most of these models require inputs from multiple CIs to make accurate predictions. Furthermore, to aid in the development of better models the current models need to be tested. This will require integrating these models into current CI management, hence necessitating the collection of information about the state of interdependent CIs to ensure accurate predictions of CI risks. Therefore, different stakeholders in CI management will need to share data for improved CI management and security. Second, these establishments are often in competition with one another and exposing sensitive data could damage their business advantage. Nevertheless, there have been some government-mandated programs to bring together these private operators in public-private partnerships (PPP) to provide a platform to exchange CI information. For instance the European Programme for Critical Infrastructure Protection (EPCIP) established by the European commission proposed the development of a Critical Infrastructure Warning Information Network (CIWIN)[4]. The goal of this network was to provide a platform for the exchange of best practices among member states as well as provide an optional platform for disseminating rapid alerts. A similar initiative by the US Department of Homeland Security is the National Center for Infrastructure. A brief overview of MICIE and IRRIIS architectures is presented below. The MICIE (Tool for systemic risk analysis and secure mediation of data exchanged across linked CI information infrastructures) project was developed under the European FP7 programme as part of the EPCIP[5]. The goal of this project was to provide real time risk assessment for CI operators. The risk assessment measures the possibility that a given CI would be unable to provide its services with the required Quality of Service (QoS) due to undesirable events in the reference CI and/or in its interdependent CIs. Furthermore, it was designed to provide a means to discover distributed information relevant for the alerting system. It also aims at overcoming the disparity of the information from multiple CIs and providing a means to exchange this information securely over the internet. Therefore, a central component of the system is the secure mediation gateway (SMGW). The overall MICIE system architecture is shown in Figure 1 [6]. The SMGWs connects each infrastructure to a central communication network and provides a secure point to send and receive risk data from other interconnected CI information networks. It also helps in converting CI specific data into meta-data that is exchanged between heterogeneous CIs. B. Information Sharing In Multi-CI management, there are challenges limiting the amount of information that can be shared between different infrastructures as well as the granularity of such information. First, many CIs are privately held and their data types and communication protocols and systems may be proprietary. Figure 1: MICIE system architecture [5]

3 The data in the MICIE system is exchanged using a special data structure. The data structure defines the state of a Critical infrastructure by considering ten parameters describing its QoS. These parameters are: availability, confidentiality, integrity, authenticity, reliability, safety, accountability, non-repudiation, and auditability. This special data structure is defined as the Service Quality Descriptor (SQD) [7]. Another important part of the MICIE architecture is the prediction tool that calculates a prediction of the risk for its parent CI and provides the information to the CI operator. It operates by inputting real time status information of its CIs and information from the SMGW into its prediction model. The Integrated Risk Reduction of Information-based Infrastructure Systems (IRRIIS) was launched under the European Union 6 th Framework programme [8]. The main objectives of this project are identified as: determining a comprehensive set of public and private sector requirements based on scenarios and related data analysis; developing, integrating and testing communication components suitable for preventing and reducing cascading effects as well as support recovery and service continuity in critical situations; developing, incorporating, and validating newfangled and advanced modelling and simulation tools incorporated into a simulation environment for experiments and exercise; and validating the functions of middleware communication components using the simulation environment and the results of the scenario and data analysis[9]. The IRRIIS project developed a set of information models to adequately capture the physical behaviour of CI systems as well as their controls and their emergent interdependency. The information model in the IRRIIS is broken down into three levels. These are: The Generic Information Model (GIM. The GIM represents the top-level ontology of CIs. It assumes that all CIs, irrespective of their technical differences, have a common information model which for the purpose of dependency management sufficiently represents them and their dependencies. It provides the basis for communication between different CIs. The domain specific information model, represents a specialize GIM that takes into account the special requirements of the CI domain. It contains the specific type of components and their characteristics as specialized forms of the more general concepts in the GIM. The final level in the information model is the Instance level models that describes the actual physical critical infrastructures using the abstractions and relations defined in the domain specific information model. While these architectures provide generic designs for management and status data collection from CIs, an integrated multi-ci management environment adds a number of challenges that will have to be addressed. Questions such as the existence of different and sometimes incompatible communication technologies in different CIs, control and authorization of data transport between devices in different CIs, design of the overall data exchange system as centralized or peer-to-peer, ability to filter and customized data per request, and scalability, are some of the issues that must be addressed. The next section presents a new proposal to address some of these issues, based on extending a publisher-subscriber model that was previously proposed for the electrical grid, and to extend it for multiple, heterogeneous CI environments. The proposed architecture makes use of common XML-based data records for utility and infrastructures, and implements a hierarchical structure to improve scalability. III. UNIFIED ARCHITECTURE FOR MULTI-CI MANAGEMENT A. Architecture The proposed unified architecture is based on extending the Gridstat model, a QoS-managed middleware communication framework for management of Electrical grid [10]. The proposed system uses a publish/subscribe communication paradigm and an information processing network to move information from producers to consumers. It also groups a collection of information processing nodes (information routers) into a single unit controlled by a control entity (simply called a broker). The system brokers can be hierarchical to reflect geographic or business boundaries or support a peer-to-peer communication architecture. The GridStat architecture is shown in Figure 2. It consists of two planes, the management plane and the data plane. The management plane represents the control layer, and this plane allocates resources and adapts the network to the changing power system configurations and communication network failures. This plane is also responsible for the security policies in effect on the network. The data plane consists of components that are responsible for moving data from producers to consumers and follows a publish/subscribe communication paradigm.

4 subscription by the QoS broker. The proposed model defines a basic autonomous unit, which is a collection of routers controlled by a broker that services publishers and subscribers as shown in Figure 3. Figure 2: GridStat Architecture The QoS broker represents the active components in the management plane. They are arranged in a hierarchical manner. This hierarchical arrangement reflects the geographic and business boundaries or hierarchies of the physical system [11]. At the bottom of this hierarchy are the leaf brokers who are directly responsible for a set of commonly-controlled data plane entities. Leaf brokers establish the data paths through the network of status routers for each subscription according to the QoS requirements for the subscription. Data plane components include the status router, publishers and subscribers. The status router support a couple of mechanism designed to make the network more efficient. These include rate-filtering, multicast, packet combination, and operational modes. Rate-filtering allows the status routers to drop a packet if no subscribers exist downstream for the current packet. Multicast support means that data can be delivered from single producers to multiple consumers. Packet combination refers to the ability of the status routers to combine multiple packets at the middleware layer into a single network layer packet when such combination does not affect the QoS requirements of the subscriptions. Finally, operational modes are predefined network operation modes that allow the network to rapidly respond to changes in the underlying power grid. The Status routers get preloaded with multiple routing configurations for each mode and the subscribers can define a set of operation modes. Publishers represent the producers of data on the network and represents entities being monitored or controlled. The subscribers represent the monitoring entities or the controller entity on the network. Subscribers may represent the control centre or a control or business application. Publishers announce their intent to publish a specific type of data and the rate at which they would publish that data. On the other hand, subscribers subscribe by specifying a set of QoS requirements including latency, rate of delivery, and redundancy. If these requirements can be met by the current network resources a path is created through the network of status routers for the new Figure 3: Basic autonomous unit The broker manages the subscriptions and publications in the unit, and controls the behaviour of the information routers by writing their forwarding rules. Publishers represent an entity with data to share on the network. Each data could be published in a periodic or aperiodic manner. Periodic data could be status information or data readings from devices out in the field. Aperiodic data could be any data such as alerts generated by process monitoring applications or even people. The basic unit in the proposed model extends the Gridstat model in a number of ways. Unlike the GridStat system, the routers in the proposed method are able to deal with data that is not periodic. This is because the system uses a hybrid of type-based and content-based publish-subscribe. Each data packet is essentially an object encapsulating the publication. Subscribers define predicate algorithms in their subscriptions that define what type of data they wish to receive as well as the rate at which they want to receive the data if the data is a subtype of the periodic data type, otherwise only the type is specified and a predicate algorithm. The predicate algorithm performs an operation on the data properties, for instance to check if the value of a field is equal to a value, or if the data is of a specific object type, etc. When the broker receives a subscription request it checks if any publication currently on the network matches the request and if the network can support the new subscription, if so, it sends a forwarding rule to all the routers with a matching publisher attached, otherwise it notifies the subscriber that their request was unsuccessful. The forwarding rules encapsulates a matching algorithm that matches data packets to subscriptions. If the data packet matches a subscription it is forwarded to the subscriber, else it is dropped. The network therefore does not store data but

5 consumes all data as it is generated. Multiple autonomous units can be connected to form a much larger network. Figure 4 shows one configuration for an autonomous unit. The connection between units is established over a wide area network (WAN) via edge information routers called boundary routers for simplicity. These represent a gateway from the internal network to the external WAN. When a subscription request is made by a subscriber in one autonomous unit for data published in another autonomous unit, the request s source broker contacts the next higher broker. This broker, identified as a tier broker, contacts the other brokers under its domain, querying for the original subscription. If any of the brokers have the requested data, a path is created from the boundary router of the unit where the data is present to the boundary router of the unit that requested the data. Also paths are generated within each network from the publishers to the boundary routers and from boundary routers to the subscriber. Figure 4: Centrally controlled autonomous units This tiered system means that more general security policies can be set at higher levels in the broker chain, leaving specifics to the lower level broker similar to the domain name system (DNS) zones. B. Data Types One of the many challenges in managing multiple CIs is the differences in the data format used in utility networks. The Common Information Model (CIM) format was originally developed by the Electric Power Research Institute (EPRI) and is now maintained by the IEC under IEC61968 and IEC It provides an XML-based common definition of power system components to enable Energy Management System (EMS) from different vendors exchange data independent of their internal software design and or implementation platform. CIM defines a number of classes that models the components of a powers system, and can be extended for other CIs. Similarly the Common Alerting Protocol (CAP) also provides a vendor independent and open digital message format. It is primarily designed for the exchange of messages or alerts. CAP messages can define geographic location as well as provide multilingual and multi-audience messaging. It is readable by humans and can also be processed by machines as it is XML based. According to the CAP specification [12], the primary use of CAP Alert Message is to ensure consistency in the information transmitted over multiple alerting and public warning systems. Secondly, CAP provides a means to normalize warnings/alerts from different sources. Furthermore, it may also be used by sensor systems for reporting significant events. In our simulations we adopted the CAP for alerting purposes, however other options are also possible. The next section discusses some performance studies. IV. PERFORMANCE ANALYSIS The proposed multi-ci communication model was implemented in the OMNet++ simulator. The current model consists of modules for the brokers, the information routers, publishers (periodic and aperiodic) and subscribers (periodic or type). The information routers use a predicates, as discussed in the previous section, to test each data object to see if they match a given subscription. This would determine if the packet is routed or dropped. This predicate encapsulates the subscription requirements of the subscriber. The model consists of two basic types of traffic: control traffic and data traffic. The control traffic represents the control messages sent between the elements of the system and the broker. These messages implement a basic clientserver communication. They include queries sent by tier brokers to sub brokers, forwarding rules sent by the brokers to the information router for new subscriptions, subscription messages and publication messages. They form a small part of the network traffic as the bulk of the message through the network is data packets from the publishers to the subscribers. Figure 5: OMNet++ Test Network

6 Figure 6: Packet Arrival Rate for Routers Figure 7: Subscription setup duration Figure 8:End-to-End Delay for data packets Figure 5 shows a preliminary test network. There are 40 publishers and 4 subscribers connected to each network. Each of the networks consists of 50 routers. The router topology was generated using the Boston Representative Internet Topology Generator (BRITE). Simulation run was for 900 seconds and the results collected includes the total number of packets transmitted by the publishers, the total number of packets received by the subscribers, the average time between packets for information routers, the end to end delay for of data packets. In Figure 6, the mean packet arrival rate is shown in megabytes per second (MBps) for each router on the network. This provides an estimate of the amount of traffic the routers need to deal with. Another important parameter was the time it took to setup new subscriptions. This is shown in the Figure 7. The high durations for subscribers 3 and 4 are due to the fact that the requested data is not in the same network. The maximum and minimum delays are shown in Figure 8. In the test network, link delays are uniformly distributed between 100ms and 10ms. Hence a packet traversing from one end of the network through the WAN and to the other end the network could do over 10 hops. The delays reported here arise mainly from the propagation delays. V. CONCLUSION In this paper, a multi-critical infrastructure communication network to aid the information sharing and data dissemination across distributed connected infrastructures was presented. The architecture is simple yet interoperable among multiple CIs. Preliminary simulation results indicate the feasibility of such a network architecture. Further comparative and quantitative analysis between the peer-to-peer and tiered configurations needs to be done. REFERENCES [1] J. D. Moteff, "Critical Infrastructures: Background, Policy, and Implementation," [2] S. M. Rinaldi, J. P. Peerenboom, and T. K. Kelly, "Identifying, understanding, and analyzing critical infrastructure interdependencies," Control Systems, IEEE, vol. 21, pp , [3] P. Pederson, D. Dudenhoeffer, S. Hartley, and M. Permann, "Critical infrastructure interdependency modeling: a survey of US and international research," Idaho National Laboratory, pp. 1-20, [4] E. Commission, "Communication from the Commission on a European Programme for Critical Infrastructure Protection," ed. Brussels, [5] P. Capodieci, S. Diblasi, E. Ciancamerla, M. Minichino, C. Foglietta, D. Lefevre, et al., "Improving resilience of interdependent critical infrastructures via an on-line alerting system," in Complexity in Engineering, COMPENG'10., 2010, pp [6] F. Caldeira, M. Castrucci, M. Aubigny, D. Macone, E. Monteiro, F. Rente, et al., "Secure mediation gateway architecture enabling the communication among critical infrastructures," in Future Network and Mobile Summit, 2010, pp [7] M. Aubigny, C. Harpes, and M. Castrucci, "Risk ontology and service quality descriptor shared among interdependent critical infrastructures," in Critical Information Infrastructures Security, 2011, pp [8] H. Dellwing, S. Geretshuber, C. Schwaegerl, and O. Seifert, "Power system survivability increase with intelligent support tools," in Power & Energy Society General Meeting, PES '09. IEEE, pp [9] M. Aubigny, "Risk Modelling and Simulation for Critical Information Infrastructure Protection," Master Thesis, University of Luxembourg itrust consulting, [10] H. Gjermundrod, H. Gjermundrod, D. E. Bakken, C. H. Hauser, and A. Bose, "GridStat: A Flexible QoS-Managed Data Dissemination Framework for the Power Grid," Power Delivery, IEEE Transactions on, vol. 24, pp , [11] R. A. Johnston, C. H. Hauser, K. H. Gjermundrod, and D. E. Bakken, "Distributing Time-Synchronous Phasor Measurement Data Using the GridStat Communication Infrastructure," in System Sciences, HICSS '06. Proceedings of the 39th Annual Hawaii International Conference on, pp. 245b-245b. [12] O. Standard, "Common Alerting Protocol Version 1.2," 2010.

Control Systems Cyber Security Awareness

Control Systems Cyber Security Awareness Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

Secure Mediation Gateway Architecture Enabling the Communication Among Critical Infrastructures

Secure Mediation Gateway Architecture Enabling the Communication Among Critical Infrastructures Future Network and MobileSummit 2010 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, 2010 ISBN: 978-1-905824-16-8 Poster Paper

More information

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents

More information

Critical Infrastructure Protection in the European Union

Critical Infrastructure Protection in the European Union 20 January, 2015 The European GNSS Programmes 1 ICG9, Prague 9-14 November 2014 Critical Infrastructure Protection in the European Union 20 January, 2015 The European GNSS Programmes 2 Each EU Member State

More information

Valérie Andrianavaly European Commission DG INFSO-A3

Valérie Andrianavaly European Commission DG INFSO-A3 Security and resilience in the Information Society: towards a CIIP policy in the EU Valérie Andrianavaly European Commission DG INFSO-A3 valerie.andrianavaly@ec.europa.eu Network and information security:

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

Summary of Cyber Security Issues in the Electric Power Sector

Summary of Cyber Security Issues in the Electric Power Sector Summary of Cyber Security Issues in the Electric Power Sector Jeff Dagle, PE Chief Electrical Engineer Energy Technology Development Group Pacific Northwest National Laboratory (509) 375-3629 jeff.dagle@pnl.gov

More information

Firewalls (IDS and IPS) MIS 5214 Week 6

Firewalls (IDS and IPS) MIS 5214 Week 6 Firewalls (IDS and IPS) MIS 5214 Week 6 Agenda Defense in Depth Evolution of IT risk in automated control systems Security Domains Where to put firewalls in an N-Tier Architecture? In-class exercise Part

More information

The Geospatial Dimensions of Critical Infrastructure and Emergency Response. White Paper Series. No. 1 - Infrastructure Interdependencies

The Geospatial Dimensions of Critical Infrastructure and Emergency Response. White Paper Series. No. 1 - Infrastructure Interdependencies The Geospatial Dimensions of Critical Infrastructure and Emergency Response White Paper Series No. 1 - Infrastructure Interdependencies Infrastructure Interdependencies 1 November 2008 INTRODUCTION In

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

Energy Assurance Plans

Energy Assurance Plans Energy Assurance Plans funded through the American Reinvestment and Recovery Act (ARRA) - Stimulus $$ to help create jobs to enhance energy reliability and facilitate recovery from disruptions to the energy

More information

Directive on Security of Network and Information Systems

Directive on Security of Network and Information Systems European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security

More information

Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy

Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy Andrea Glorioso European Commission DG INFSO-A3 Andrea.Glorioso@ec.europa.eu Network and

More information

Chapter 2 Communication for Control in Heterogeneous Power Supply

Chapter 2 Communication for Control in Heterogeneous Power Supply Chapter 2 Communication for Control in Heterogeneous Power Supply The need to modernize the power grid infrastructure, and governments commitment for a cleaner environment, is driving the move towards

More information

The Federal Council s Basic Strategy. for Critical Infrastructure Protection

The Federal Council s Basic Strategy. for Critical Infrastructure Protection The Federal Council The Federal Council s Basic Strategy for Critical Infrastructure Protection Basis for the national critical infrastructure protection strategy 18 May 2009 Table of Contents 1 Introduction...

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,

More information

CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS. Overview of CIP in Australia

CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS. Overview of CIP in Australia CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS Overview of CIP in Australia Greg Scott Leader, Critical Infrastructure Project Risk & Impact Analysis Group Geoscience Australia Greg.Scott@ga.gov.au

More information

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure SESSION ID: SBX1-R07 Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure Bryan Hatton Cyber Security Researcher Idaho National Laboratory In support of DHS ICS-CERT @phaktor 16 Critical

More information

Critical Information Infrastructure Protection Law

Critical Information Infrastructure Protection Law Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

Emergency Support Function #12 Energy Annex. ESF Coordinator: Support Agencies:

Emergency Support Function #12 Energy Annex. ESF Coordinator: Support Agencies: Emergency Support Function #12 Energy Annex ESF Coordinator: Department of Energy Primary Agency: Department of Energy Support Agencies: Department of Agriculture Department of Commerce Department of Defense

More information

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology 364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by

More information

Industry role moving forward

Industry role moving forward Industry role moving forward Discussion with National Research Council, Workshop on the Resiliency of the Electric Power Delivery System in Response to Terrorism and Natural Disasters February 27-28, 2013

More information

NIS-Directive and Smart Grids

NIS-Directive and Smart Grids NIS-Directive and Smart Grids Workshop on European Smart Grid Cybersecurity: Emerging Threats and Countermeasures Marie Holzleitner Table of Content Aims & Objectives Affected Parties Selected Requirements

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD) COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion

More information

The Australian Government s Approach to Critical Infrastructure Resilience

The Australian Government s Approach to Critical Infrastructure Resilience The Australian Government s Approach to Critical Infrastructure Resilience GNSS Workshop University of New South Wales 4 December 2013 Mr Kris Garred, Director Critical Infrastructure Policy Attorney-General

More information

Gas Infrastructure Europe. Security Risk Assessment Methodology

Gas Infrastructure Europe. Security Risk Assessment Methodology Gas Infrastructure Europe Security Risk Assessment Methodology May 2015 Introduction Gas Infrastructure Europe (GIE) is an association representing the interests of European natural gas infrastructure

More information

Homeland Security and Geographic Information Systems

Homeland Security and Geographic Information Systems Page 1 of 5 Homeland Security and Geographic Information Systems How GIS and mapping technology can save lives and protect property in post-september 11th America Introduction Timely, accurate information,

More information

Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013

Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013 + Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013 Jeffrey R. Pillon, Director, Energy Assurance Programs National Association of State

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

Center for Cloud and Autonomic Computing (CAC)

Center for Cloud and Autonomic Computing (CAC) A CISE-funded Center University of Florida, Jose Fortes, 352.392.9265, fortes@ufl.edu Rutgers University, Manish Parashar, 732.445.4388, parashar@cac.rutgers.edu University of Arizona, Salim Hariri, 520.621.4378,

More information

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use EPRI Research Overview IT/Security Focus November 29, 2012 Mark McGranaghan VP, Power Delivery and Utilization Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use Transmission

More information

Member of the County or municipal emergency management organization

Member of the County or municipal emergency management organization EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,

More information

Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions

Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions April 26, 2018 The Secure Technology Alliance IoT Security Council is pleased to submit our response to

More information

Public and Private Interdependencies Filling a Gap in Most Continuity Plans

Public and Private Interdependencies Filling a Gap in Most Continuity Plans Public and Private Interdependencies Filling a Gap in Most Continuity Plans John A Jackson Executive Vice President Fusion Risk Management, Inc. The evolution of the continuity industrytechnology advancement

More information

DISASTER RISK MANAGEMENT (DRM/DRR) TEAM

DISASTER RISK MANAGEMENT (DRM/DRR) TEAM SPARC LABORATORY DISASTER RISK MANAGEMENT (DRM/DRR) TEAM Summary of Research Directions Presented by Sayanti Mukhopadhyay, PhD Candidate Date: 12/14/2016 Director: Makarand (Mark) Hastak, Ph.D., PE, CCP

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal

More information

Alternative Fuel Vehicles in State Energy Assurance Planning

Alternative Fuel Vehicles in State Energy Assurance Planning + Alternative Fuel Vehicles in State Energy Assurance Planning July 17, 2014 Webinar hosted by the National Association of State Energy Officials (NASEO), with support from the U.S. Department of Energy

More information

GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION

GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION Hrvoje Sagrak 1 Introduction In an interconnected world that we live in, protection of our societies and values relies highly

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical

More information

Long-Term Power Outage Response and Recovery Tabletop Exercise

Long-Term Power Outage Response and Recovery Tabletop Exercise 1 Long-Term Power Outage Response and Recovery Tabletop Exercise After Action Report [Template] The After-Action Report/Improvement Plan (AAR/IP) aligns exercise objectives with preparedness doctrine to

More information

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network Critical Infrastructure Protection for the Energy Industries Building Identity Into the Network Executive Summary Organizations in the oil, gas, and power industries are under increasing pressure to implement

More information

EPRO. Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS

EPRO. Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS EPRO Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS The Role of Systems Engineering in Addressing Black Sky Hazards

More information

Her Majesty the Queen in Right of Canada, Cat. No.: PS4-66/2014E-PDF ISBN:

Her Majesty the Queen in Right of Canada, Cat. No.: PS4-66/2014E-PDF ISBN: 2014-2017 Her Majesty the Queen in Right of Canada, 2014 Cat. No.: PS4-66/2014E-PDF ISBN: 978-1-100-23291-1 ii Table of contents 1. Introduction....3 What we have learned and what has changed...3 2. A

More information

OpenWay by Itron Security Overview

OpenWay by Itron Security Overview Itron White Paper OpenWay by Itron OpenWay by Itron Security Overview Kip Gering / R. Eric Robinson Itron Marketing / Itron Engineering 2009, Itron Inc. All rights reserved. 1 Executive Summary 3 Intent

More information

Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved. FlyntGroup.

Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved. FlyntGroup. Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved FlyntGroup.com Flynt Group White Paper Bundling Arrows: Making a Business

More information

ADAPTIVE GRIDSTAT INFORMATION FLOW MECHANISMS AND MANAGEMENT FOR POWER GRID CONTINGENCIES

ADAPTIVE GRIDSTAT INFORMATION FLOW MECHANISMS AND MANAGEMENT FOR POWER GRID CONTINGENCIES ADAPTIVE GRIDSTAT INFORMATION FLOW MECHANISMS AND MANAGEMENT FOR POWER GRID CONTINGENCIES By STIAN FEDJE ABELSEN A thesis submitted in partial fulfillment of the requirements for the degree of MASTER OF

More information

Ethernet Network Redundancy in SCADA and real-time Automation Platforms.

Ethernet Network Redundancy in SCADA and real-time Automation Platforms. Ethernet Network Redundancy in SCADA and real-time Automation Platforms www.copadata.com sales@copadata.com Content 1. ABSTRACT... 2 2. INTRODUCTION... 2 IEC 61850 COMMUNICATION SERVICES... 2 APPLICATION

More information

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38

More information

Industrial Network Trends & Technologies

Industrial Network Trends & Technologies Industrial Network Trends & Technologies EtherNet/IP on the Plant Floor PUBLIC INFORMATION 5058-CO900F IHS Technology Industrial Internet of Things 2014, April 2014 PUBLIC INFORMATION Forecasts tremendous

More information

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document EUROPEAN COMMISSION Strasbourg, 7.2.2013 SWD(2013) 31 final COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT Accompanying the document Proposal for a Directive of the European

More information

Statement for the Record

Statement for the Record Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before

More information

Smart Cities and Security. Security - 1

Smart Cities and Security. Security - 1 Smart Cities and Security Security - 1 Where are we in 2013? Security - 2 Where are we in 2050? Security - 3 Our Topics Who is concerned? Security of the electric grid Security of the water supply Security

More information

Critical Infrastructure

Critical Infrastructure Critical Infrastructure 1 Critical Infrastructure Can be defined as any facility, system, or function which provides the foundation for national security, governance, economic vitality, reputation, and

More information

Business Continuity: How to Keep City Departments in Business after a Disaster

Business Continuity: How to Keep City Departments in Business after a Disaster Business Continuity: How to Keep City Departments in Business after a Disaster Shannon Spence, PE Red Oak Consulting, an ARCADIS group Agenda Security, Resilience and All Hazards The Hazards Cycle and

More information

Service Mesh and Microservices Networking

Service Mesh and Microservices Networking Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards

More information

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration

More information

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity & Digital Privacy in the Energy sector ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European

More information

PIPELINE SECURITY An Overview of TSA Programs

PIPELINE SECURITY An Overview of TSA Programs PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the

More information

Executive Order on Coordinating National Resilience to Electromagnetic Pulses

Executive Order on Coordinating National Resilience to Electromagnetic Pulses Executive Order on Coordinating National Resilience to Electromagnetic Pulses The Wh... Page 1 of 11 EXECUTIVE ORDERS Executive Order on Coordinating National Resilience to Electromagnetic Pulses INFRASTRUCTURE

More information

TIES for Microsoft CityNext Next-Generation Situational Awareness

TIES for Microsoft CityNext Next-Generation Situational Awareness BROCHURE A CLOSER LOOK AT! TIES for Microsoft CityNext Next-Generation Situational Awareness INTRODUCTION! TIES for Microsoft CityNext (TMCN) is an all-hazard threat monitoring and situation awareness

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

NW NATURAL CYBER SECURITY 2016.JUNE.16

NW NATURAL CYBER SECURITY 2016.JUNE.16 NW NATURAL CYBER SECURITY 2016.JUNE.16 ADOPTED CYBER SECURITY FRAMEWORKS CYBER SECURITY TESTING SCADA TRANSPORT SECURITY AID AGREEMENTS CONCLUSION QUESTIONS ADOPTED CYBER SECURITY FRAMEWORKS THE FOLLOWING

More information

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

More information

Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016

Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016 Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange Dennis Denham Ssempereza - CISA, CISM, CRISC August 16, 2016 About me! Involved in Risk Management and Security

More information

Solution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management

Solution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management Solution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management Copyright Nuvon, Inc. 2007, All Rights Reserved. Introduction The need to improve the quality and accessibility

More information

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 - NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

RESILIENCE AND CRITICAL INFRASTRUCTURE

RESILIENCE AND CRITICAL INFRASTRUCTURE POPULATION PROTECTION, EMERGENCY THE SCIENCE FOR POPULATION PROTECTION 1/2015 RESILIENCE AND CRITICAL INFRASTRUCTURE Rostislav RICHTER rostislav.richter@ioolb.izscr.cz Abstract Critical infrastructure

More information

Systemic Analyser in Network Threats

Systemic Analyser in Network Threats Systemic Analyser in Network Threats www.project-saint.eu @saintprojecteu #saintprojecteu John M.A. Bothos jbothos@iit.demokritos.gr Integrated System Laboratory Institute of Informatics & Telecommunication

More information

Drinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012

Drinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012 Drinking Water Emergency Management Ministry of the Environment 2012 Drinking Water Leadership Summit October 25, 2012 Christine Campbell Team Leader, Drinking Water Emergency Planning Ministry of the

More information

Context-Awareness and Adaptation in Distributed Event-Based Systems

Context-Awareness and Adaptation in Distributed Event-Based Systems Context-Awareness and Adaptation in Distributed Event-Based Systems Eduardo S. Barrenechea, Paulo S. C. Alencar, Rolando Blanco, Don Cowan David R. Cheriton School of Computer Science University of Waterloo

More information

Critical Infrastructure Resilience

Critical Infrastructure Resilience Critical Infrastructure Resilience Climate Resilience Webinar Series U.S. Department of Housing and Urban Development Disclaimer This presentation is intended to provide communities and states with the

More information

The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017

The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017 The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017 European Union Agency for Network and Information Security Positioning ENISA

More information

GUIDELINES ON MARITIME CYBER RISK MANAGEMENT

GUIDELINES ON MARITIME CYBER RISK MANAGEMENT E 4 ALBERT EMBANKMENT LONDON SE1 7SR Telephone: +44 (0)20 7735 7611 Fax: +44 (0)20 7587 3210 GUIDELINES ON MARITIME CYBER RISK MANAGEMENT MSC-FAL.1/Circ.3 5 July 2017 1 The Facilitation Committee, at its

More information

Overview SENTINET 3.1

Overview SENTINET 3.1 Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Innovation policy for Industry 4.0

Innovation policy for Industry 4.0 Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda

More information

Control System Security for Social Infrastructure

Control System Security for Social Infrastructure 277 Hitachi Review Vol. 63 (201), No. 5 Featured Articles Control System Security for Social Infrastructure Toshihiko Nakano, Ph.D. Katsuhito Shimizu Tsutomu Yamada Tadashi Kaji, Dr. Info. OVERVIEW: The

More information

Security by Default: Enabling Transformation Through Cyber Resilience

Security by Default: Enabling Transformation Through Cyber Resilience Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,

More information

Business Continuity and Disaster Recovery. Pennsylvania Emergency Management Agency (PEMA) Satellite Warning System/Rapid Notification Network

Business Continuity and Disaster Recovery. Pennsylvania Emergency Management Agency (PEMA) Satellite Warning System/Rapid Notification Network Business Continuity and Disaster Recovery Pennsylvania Emergency Management Agency (PEMA) Satellite Warning System/Rapid Notification Network Executive Summary Too often emergency management communication

More information

Critical Infrastructure Protection & Resilience Europe / Asia. Conference Discussion Reviews

Critical Infrastructure Protection & Resilience Europe / Asia. Conference Discussion Reviews Critical Infrastructure Protection & Resilience Europe / Asia Conference Discussion Reviews Torch Marketing / KNM Media Delivering strategic routes to critical markets Why Critical Infrastructure Protection

More information

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies: ESF Coordinator: Homeland Security/National Protection and Programs/Cybersecurity and Communications Primary Agencies: Homeland Security/National Protection and Programs/Cybersecurity and Communications

More information

MINIMUM SECURITY CONTROLS SUMMARY

MINIMUM SECURITY CONTROLS SUMMARY APPENDIX D MINIMUM SECURITY CONTROLS SUMMARY LOW-IMPACT, MODERATE-IMPACT, AND HIGH-IMPACT INFORMATION SYSTEMS The following table lists the minimum security controls, or security control baselines, for

More information

13th Florence Rail Forum: Cyber Security in Railways Systems. Immacolata Lamberti Andrea Pepato

13th Florence Rail Forum: Cyber Security in Railways Systems. Immacolata Lamberti Andrea Pepato 13th Florence Rail Forum: Cyber Security in Railways Systems Immacolata Lamberti Andrea Pepato November 25, 2016 Cyber Security context and Cyber Attacks trend Critical Infrastructures (CIs) are both physical

More information

COMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises

COMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises EUROPEAN COMMISSION Brussels, 13.9.2017 C(2017) 6100 final COMMISSION RECOMMENDATION of 13.9.2017 on Coordinated Response to Large Scale Cybersecurity Incidents and Crises EN EN COMMISSION RECOMMENDATION

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

Business Continuity Management Program Overview

Business Continuity Management Program Overview Business Continuity Management Program Overview Improving the lives of our customers by connecting them to the power of the digital world CenturyLink Key Objective CenturyLink may modify or terminate this

More information

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters QHSR Background Implementing Recommendations of the 9/11 Commission Act of 2007 directed DHS to Conduct a Quadrennial Homeland

More information

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1. Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change

More information

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES DOCUMENT DETAIL Security Classification Unclassified Authority National Information Technology Authority - Uganda

More information

Hazard Management Cayman Islands

Hazard Management Cayman Islands Hazard Management Cayman Islands Strategic Plan 2012 2016 Executive Summary HMCI strategic plan outlines the agency s outlook in the next five years and illustrates the main strategies as goals that will

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing

More information

CDMI Support to Object Storage in Cloud K.M. Padmavathy Wipro Technologies

CDMI Support to Object Storage in Cloud K.M. Padmavathy Wipro Technologies CDMI Support to Object Storage in Cloud K.M. Padmavathy Wipro Technologies Abstract Object storage, a leading emerging technology is mainly intended to handle exponential growth of unstructured data. Unlike

More information