SlideShare a Scribd company logo
1 of 28
Download to read offline
Critical
Infrastructure
Protection
David Alexander
University College London
“Those facilities, systems, sites and
networks necessary for the functioning
of society and the delivery of essential
services upon which daily life depends.”
What is critical infrastructure?
"Those infrastructure assets (physical
or electronic) that are vital to the
continued delivery and integrity of the
essential services upon which society
relies, the loss or compromise of which
would lead to severe economic or social
consequences or to loss of life."
What is critical infrastructure?
The sectors of critical infrastructure
• water
• energy
• food
• health
• transport
• communications
• finance
• government
• emergency
services
Elements of critical infrastructure
Water: dams, treatment plants, pipelines, sewers
Energy: power stations, transmission lines
Food: distribution networks, warehouses and sales points
Health: hospitals, emergency systems, pharmaceuticals
Transport: road, rail, air, water
airports, sea ports, roads, railways, bridges
Communications: telephone, radio, cyber
Finance: banks, money supply, financial services
Government: national, regional, local
Emergency services: fire, police, ambulance, specialist.
• national - of importance to the
functioning of national life and affairs
• local - of importance to the
functioning of local life and affairs.
The divisions of critical infrastructure
• natural events (floods, storms, etc.)
• technological failures and human error
• terrorism and sabotage.
Hazards to critical infrastructure
Water
treatment works Railway station
Fire station
Electricity sub-station
Broadband antenna
Hospital
Supermarket
Power station
Waste water
treatment works
FLOOD SITUATION
Generation
output
restricted
Generator
out of service
Generator
out of service
Generator
out of service
Generation
output
increased
Additional
generator
on stand-by
Example of regional flood impact on electricity grid
Previously affected
Near misses
At risk
(1 in 100)
Low risk
Risk exposure level
Low
Medium
High
Threat
Historic
Predicted
Low
Criticality scale
Impact
on life
Economic
impact
Impact on
essential
services
Impactcategories
5
4
3
2
1
Critical threshold
Critical national
infrastructure
Other national
infrastructure
Virtually
certain
HIGH
Probable
SIGNI-
FICANT
Possible
Improbable
INTER-
MEDIATE
Highly
unlikely
LOW
Trivial Low Moderate Extensive Catastrophic
Failureprobability
Effects and degree of damage
Infrastructure criticality matrix
HAZARD
VULNERABILITY
EXPOSURE
A simple
risk assessment
matrix
Different definitions of exposure:
• under threat for a
given period of time
• at risk to a given extent
of possible loss.
A person who spends five minutes
twice a day crossing a bridge that
is at risk of collapse is exposed
to that risk for 10/(60x24x7)=
0.00098 of a week
Command
& control
Delegation
to agency
Delegation
to agency &
negotiation
Enforced
self-
regulation
Voluntary
self-
regulation
More
interventionist
Less
interventionist
The regulatory continuum
Government
ownership
Market
forces
The ALARP concept
Negligible risk
Unacceptable risk
Broadly acceptable
region (no need for
detailed work to
demonstrate ALARP)
Unacceptable region
ALARP or tolerability
region: risk assumed
only if benefit warrants it
Cost of risk reduction
Risk Inefficient
measures
Disproportionate
measures
Insufficient
measures
Optimal
measures
Critical infrastructure
Safeguarding critical infrastructures
• redundant systems
• adequate levels of operating supplies
• fault-tolerant design
• "fail-safe" design
• adequate and reserve manpower
• scenarios for failures and disasters
• contingency and emergency plans
- kept current
• involvement of top management
• measuring weaknesses
• creating resilience and redundancy
• restoring essential services.
Critical infrastructure protection:
a programme, a plan or an activity
SMART criteria:
S - specific
M - measurable
A - attractive,
acceptable
R - realistic,
realisable
T - timing.
The risk management process
Establish
the context
Identify hazards
and threats
Analyse risks
Evaluate risks
Manage risks
Accept
risks
Communicateandconsult
Monitorandreview
Yes
No
1
2
3
Fully
opera-
tional
Opera-
tional
Life safe
Near
collapse
Frequent
Occa-
sional
Rare
Very
rare
Performance level
Design standards versus performance levels
Designlevel
Unacceptable
performance
for new
construction
• measure interdependency
• adopt design standards
• create resilience.
Protection strategies
Policy
adoption
Risk assessment
• hazard
• vulnerability
• exposure
Policy assessment
• costs
• benefits
• consequences
Disaster
Expected
losses
Risk Policy
Assessment
Cyber
Human
Physical
Set goals and objectives
Identify assets, systems and networks
Assess risks: vulnerabilities,
threats, consequences
Prioritise
Implement programmes
Measure effectiveness
Continuous
improvement
to enhance
protection
of
critical
infrastructure
and key
resources
Feedback loop
interim.cabinetoffice.gov.uk/media/349103/strategic-framework.pdf
http://www.bmi.bund.de/SharedDocs/Downloads/EN/Broschueren/
Basisschutzkonzept_kritische_Infrastrukturen_en.html?nn=441658

More Related Content

What's hot

Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceMarlabs
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilitiesManish Chaurasia
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat IntelligenceSirius
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review ChecklistEberly Wilson
 
Case studies in cybersecurity strategies
Case studies in cybersecurity strategiesCase studies in cybersecurity strategies
Case studies in cybersecurity strategiesEyesOpen Association
 

What's hot (20)

Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilities
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Incident response
Incident responseIncident response
Incident response
 
Security policy
Security policySecurity policy
Security policy
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review Checklist
 
Case studies in cybersecurity strategies
Case studies in cybersecurity strategiesCase studies in cybersecurity strategies
Case studies in cybersecurity strategies
 
Data security
Data securityData security
Data security
 

Viewers also liked

Symantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection StudySymantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection StudySymantec
 
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...Bryn Davidson
 
Crisis communication
Crisis communicationCrisis communication
Crisis communicationJohn Kroll
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Securitydocomusa
 
Hacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00bHacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00bPriyanka Aash
 
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015tmuehleisen
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetJuniper Networks
 
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...Carlos Moreno
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorEuropean Services Institute
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure CybersecurityLogitek Solutions
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropePositive Hack Days
 
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...AVEVA
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policieswardjo
 
U.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceU.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceGwanhoo Lee
 

Viewers also liked (20)

Symantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection StudySymantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection Study
 
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
 
A Critical Overview of Disaster Theory
A Critical Overview of Disaster TheoryA Critical Overview of Disaster Theory
A Critical Overview of Disaster Theory
 
Crisis communication
Crisis communicationCrisis communication
Crisis communication
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
Hacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00bHacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00b
 
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
 
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Presentation
Presentation Presentation
Presentation
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure Cybersecurity
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
 
Bio Daniel Donatelli
Bio Daniel DonatelliBio Daniel Donatelli
Bio Daniel Donatelli
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 
U.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceU.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity Governance
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
Trauma in Disaster
Trauma in DisasterTrauma in Disaster
Trauma in Disaster
 

Similar to Critical infrastructure

Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security Adhar kashyap
 
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docxAppendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docxjustine1simpson78276
 
noaa_csc1231455445156555455656666566.ppt
noaa_csc1231455445156555455656666566.pptnoaa_csc1231455445156555455656666566.ppt
noaa_csc1231455445156555455656666566.pptPapuKumarNaik1
 
2015.10.06 emerging risks
2015.10.06 emerging risks2015.10.06 emerging risks
2015.10.06 emerging risksFERMA
 
CMD OTC Mitigation
CMD OTC MitigationCMD OTC Mitigation
CMD OTC Mitigationrynicholls
 
Disaster Management Plan for Metro Railway
Disaster Management Plan for Metro RailwayDisaster Management Plan for Metro Railway
Disaster Management Plan for Metro RailwayBhaskar Kumar Dan
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCandice Tang
 
CS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructureCS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructureJohn Rooksby
 
Public Health Preparedness for Disaster Management
Public Health Preparedness for Disaster ManagementPublic Health Preparedness for Disaster Management
Public Health Preparedness for Disaster ManagementKattey Kattey
 
Disaster management approaches in chhattishgarh
Disaster management approaches in chhattishgarhDisaster management approaches in chhattishgarh
Disaster management approaches in chhattishgarhShubham Agrawal
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Bay - The Incident Command System.pptx
Bay -   The Incident Command System.pptxBay -   The Incident Command System.pptx
Bay - The Incident Command System.pptxDesireeFlorendo
 
Blackoutslidesharefinalfinal 150610082252-lva1-app6892
Blackoutslidesharefinalfinal 150610082252-lva1-app6892Blackoutslidesharefinalfinal 150610082252-lva1-app6892
Blackoutslidesharefinalfinal 150610082252-lva1-app6892Vera Kovaleva
 
Blackout of Critical Services: Do you know your exposure?
Blackout of Critical Services: Do you know your exposure?Blackout of Critical Services: Do you know your exposure?
Blackout of Critical Services: Do you know your exposure?Gen Re
 

Similar to Critical infrastructure (20)

Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
 
CIP eu 2016 114(-8)
CIP eu 2016 114(-8)CIP eu 2016 114(-8)
CIP eu 2016 114(-8)
 
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docxAppendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
 
Cascading Disasters
Cascading DisastersCascading Disasters
Cascading Disasters
 
noaa_csc1231455445156555455656666566.ppt
noaa_csc1231455445156555455656666566.pptnoaa_csc1231455445156555455656666566.ppt
noaa_csc1231455445156555455656666566.ppt
 
Disaster Resilient Critical Infrastructure
Disaster Resilient Critical InfrastructureDisaster Resilient Critical Infrastructure
Disaster Resilient Critical Infrastructure
 
2015.10.06 emerging risks
2015.10.06 emerging risks2015.10.06 emerging risks
2015.10.06 emerging risks
 
CMD OTC Mitigation
CMD OTC MitigationCMD OTC Mitigation
CMD OTC Mitigation
 
Disaster Management Plan for Metro Railway
Disaster Management Plan for Metro RailwayDisaster Management Plan for Metro Railway
Disaster Management Plan for Metro Railway
 
Infrastructure Interdependencies: Connections that Alter Consequences
Infrastructure Interdependencies: Connections that Alter ConsequencesInfrastructure Interdependencies: Connections that Alter Consequences
Infrastructure Interdependencies: Connections that Alter Consequences
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
 
DISASTER MANAGEMENT
DISASTER MANAGEMENT DISASTER MANAGEMENT
DISASTER MANAGEMENT
 
Vulnerability to Disasters
Vulnerability to DisastersVulnerability to Disasters
Vulnerability to Disasters
 
CS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructureCS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructure
 
Public Health Preparedness for Disaster Management
Public Health Preparedness for Disaster ManagementPublic Health Preparedness for Disaster Management
Public Health Preparedness for Disaster Management
 
Disaster management approaches in chhattishgarh
Disaster management approaches in chhattishgarhDisaster management approaches in chhattishgarh
Disaster management approaches in chhattishgarh
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Bay - The Incident Command System.pptx
Bay -   The Incident Command System.pptxBay -   The Incident Command System.pptx
Bay - The Incident Command System.pptx
 
Blackoutslidesharefinalfinal 150610082252-lva1-app6892
Blackoutslidesharefinalfinal 150610082252-lva1-app6892Blackoutslidesharefinalfinal 150610082252-lva1-app6892
Blackoutslidesharefinalfinal 150610082252-lva1-app6892
 
Blackout of Critical Services: Do you know your exposure?
Blackout of Critical Services: Do you know your exposure?Blackout of Critical Services: Do you know your exposure?
Blackout of Critical Services: Do you know your exposure?
 

More from Prof. David E. Alexander (UCL)

For a Reliable Civil Protection System That Keeps Citizens Safe
For a Reliable Civil Protection System That Keeps Citizens SafeFor a Reliable Civil Protection System That Keeps Citizens Safe
For a Reliable Civil Protection System That Keeps Citizens SafeProf. David E. Alexander (UCL)
 
How to Make Your Article More Acceptable for Publication
How to Make Your Article More Acceptable for PublicationHow to Make Your Article More Acceptable for Publication
How to Make Your Article More Acceptable for PublicationProf. David E. Alexander (UCL)
 
Managing Today's Complex Crises: Lessons From the Past
Managing Today's Complex Crises: Lessons From the PastManaging Today's Complex Crises: Lessons From the Past
Managing Today's Complex Crises: Lessons From the PastProf. David E. Alexander (UCL)
 
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptx
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptxCivil Protection and Intersectionality 2022-09-26 Science Forum.pptx
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptxProf. David E. Alexander (UCL)
 
Disasters in Italy: Environmental and Cultural Resilience
Disasters in Italy: Environmental and Cultural ResilienceDisasters in Italy: Environmental and Cultural Resilience
Disasters in Italy: Environmental and Cultural ResilienceProf. David E. Alexander (UCL)
 
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-IT
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-ITManaging the Covid Recovery / Gestire la Ripresa da Covid EN-IT
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-ITProf. David E. Alexander (UCL)
 
Civil Defence to Civil Protection (IRDR Taster Lecture)
Civil Defence to Civil Protection (IRDR Taster Lecture)Civil Defence to Civil Protection (IRDR Taster Lecture)
Civil Defence to Civil Protection (IRDR Taster Lecture)Prof. David E. Alexander (UCL)
 

More from Prof. David E. Alexander (UCL) (20)

For a Reliable Civil Protection System That Keeps Citizens Safe
For a Reliable Civil Protection System That Keeps Citizens SafeFor a Reliable Civil Protection System That Keeps Citizens Safe
For a Reliable Civil Protection System That Keeps Citizens Safe
 
Systemic Risks and Emerging Challenges.pdf
Systemic Risks and Emerging Challenges.pdfSystemic Risks and Emerging Challenges.pdf
Systemic Risks and Emerging Challenges.pdf
 
How to Make Your Article More Acceptable for Publication
How to Make Your Article More Acceptable for PublicationHow to Make Your Article More Acceptable for Publication
How to Make Your Article More Acceptable for Publication
 
Extreme Weather Preparedness
Extreme Weather PreparednessExtreme Weather Preparedness
Extreme Weather Preparedness
 
Managing Today's Complex Crises: Lessons From the Past
Managing Today's Complex Crises: Lessons From the PastManaging Today's Complex Crises: Lessons From the Past
Managing Today's Complex Crises: Lessons From the Past
 
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptx
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptxCivil Protection and Intersectionality 2022-09-26 Science Forum.pptx
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptx
 
Cascading disasters 2022 03-02
Cascading disasters 2022 03-02Cascading disasters 2022 03-02
Cascading disasters 2022 03-02
 
Il Futuro delle Grandi Emergenze
Il Futuro delle Grandi EmergenzeIl Futuro delle Grandi Emergenze
Il Futuro delle Grandi Emergenze
 
Disasters in Italy: Environmental and Cultural Resilience
Disasters in Italy: Environmental and Cultural ResilienceDisasters in Italy: Environmental and Cultural Resilience
Disasters in Italy: Environmental and Cultural Resilience
 
Cultura e disastri
Cultura e disastriCultura e disastri
Cultura e disastri
 
Covid lessons for disaster risk governance
Covid lessons for disaster risk governanceCovid lessons for disaster risk governance
Covid lessons for disaster risk governance
 
Black swans a critique
Black swans   a critiqueBlack swans   a critique
Black swans a critique
 
Planning for Pandemics
Planning for PandemicsPlanning for Pandemics
Planning for Pandemics
 
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-IT
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-ITManaging the Covid Recovery / Gestire la Ripresa da Covid EN-IT
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-IT
 
Civil Defence to Civil Protection (IRDR Taster Lecture)
Civil Defence to Civil Protection (IRDR Taster Lecture)Civil Defence to Civil Protection (IRDR Taster Lecture)
Civil Defence to Civil Protection (IRDR Taster Lecture)
 
Readiness for Post-Covid-19 Challenges
Readiness for Post-Covid-19 ChallengesReadiness for Post-Covid-19 Challenges
Readiness for Post-Covid-19 Challenges
 
Scenario Methodology for Planning Future Activities
Scenario Methodology for Planning Future ActivitiesScenario Methodology for Planning Future Activities
Scenario Methodology for Planning Future Activities
 
Disastri a cascata
Disastri a cascataDisastri a cascata
Disastri a cascata
 
Grenfell Tower - Controlled Anger
Grenfell Tower - Controlled AngerGrenfell Tower - Controlled Anger
Grenfell Tower - Controlled Anger
 
Warning and Evacuation
Warning and EvacuationWarning and Evacuation
Warning and Evacuation
 

Recently uploaded

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Critical infrastructure