SlideShare a Scribd company logo
1 of 16
The importance of CIE
in the digital era
AWARENESS DECK
BY: RICARDO MANUEL BAIAO JORGE DE ALMEIDA
WHAT IS CIE?
IMPACT ON SOCIETY
RISKS
CONCLUSIONS
What is CIE?
The principal scopes of practice
for CIE are:
• Planning and design of trusted communication networks
• Operational oversight of trusted communication networks
• Risk analysis of, and contingency planning for, network infrastructure
Communications Infrastructure Engineering (CIE) is related to the design and operation of the electronic networks
that support all types of data communications.
CIE looks after the data in transit and is primarily focused on the reliability, availability, security, and privacy of
networks, calledTrusted Network, rather than on their physical aspects (such as cabling, Wi-Fi, 3G, 4G, 5G,
transmission and receiving devices, etc.)
The essential activity of CIE is the system-level design and management of secure or trusted communications
networks.
WHAT IS CIE?
IMPACT ON SOCIETY
RISKS
CONCLUSIONS
Impact on Society
With the massive growth of Digital
Infrastructure to cover the rapid
expansion of wireless
communications devices such as
iPhone™, Android™ platforms,
Windows Mobile™, and the rapid
grow of 24/7 online services such as
banking, bill payment, and
information services, users are
becoming heavily dependent of
digital infrastructure.
The Digital era is here to stay, the
IoT (Internet ofThings) is taking its
first steps and it will certainly change
our lives in the future.
All organisations want to be part of
the day-to-day lives of their target
audience and to take advantage of
that presence to conduct business.
That´s why organisations all over the
world are investing heavily in digital
transformation with the support of
governments and public institutions
such as the European Commission.
As a matter of fact, the European
Commission has recently announced
its plans to help industry, SMEs,
researchers and European public
authorities to take full advantage of
new technologies.The plans include,
among other things, an investment
of over 50,000 million dollars to help
digitize the industry.
Impact on Society
Personal communications is only the tip of the iceberg — other critical infrastructures (operational
infrastructures) are also dependent upon digital infrastructure.
• Electric power, natural gas, oil production, and transmission systemsEnergy and Utilities
• Telecommunications, broadcasting systems, software, hardware, and networks,
including the Internet
Communications and Information
Technology
• Banking, investment, securities, payment processingFinance
• Hospitals and other health care facilities, blood supply, laboratories, pharmaceuticalsHealthcare
• Production, processing, distribution and safetyFood
• Drinking water and wastewater treatment / managementWater
• Aviation, rail, marine, road, mass transitTransport
• Law enforcement, fire, search and rescue, emergency servicesSafety
• Social services, regulationGovernment
• Defence, industrial base, chemical industryManufacturing
Impact on Society
•OperationalTechnology (OT) rely entirely in digital
infrastructures and consist of platforms used in running the
operation of physical assets of enterprises, especially those
that involve taking specific actions.
•(e.g. controlling electricity or energy flow, valves, lighting,
ambient environment, machine tools or robots).
Also Internet ofThings (IoT) rely entirely on digital
infrastructures, and consists of a network of dedicated
physical objects (things), that contain embedded
technology to sense or interact with its internal state or the
external environment.
The IoT is an ecosystem that includes things,
communication, applications and data analysis
Impact on Society
•It is easy to see the dependence of sectors like Finance (where virtually all transactions are automated), Public
Safety (Emergency and Security) ecommerce (Amazon, Google, Facebook) on digital infrastructure.
But most people don´t realize that water and sewage pumping stations are monitored and controlled remotely
using wireless communication links, as are railway and underground trains and even our electric power grid
including nuclear facilities.These essential services can be compromised by unavailability of the digital
infrastructure on which they depend.
Modern manufacturing is dependent upon automated supply chains and production control applications, which
in turn rely on digital infrastructure.A failure in that digital infrastructure can shut down a production line, with
attendant losses in the millions of dollars per day. It can also adversely affect worker safety.
This is the present, the future is much more ambitious.
ENTERPRISE
Impact on Society
Internet ofThings
CONSUMER
 Back-end IT systems
 Predictive maintenance
analytics
 M2M connectivity
(Machine to Machine communication services)
 Processor for monitoring and
control of things
 Jet engine
 Robot
 ATM
 Mobile apps
 Elderly person monitoring
service
 Home Broadband
 Standard mobile data
 Smartphone gateway
 Wireless router
 Baby monitor
 Health and fitness monitor
Applications
and Analytics
Connectivity
Gateway /
Controller
Things
Operational Technology
Source: Gartner
Relationship between OT and IoT at Enterprise and consumer level.
WHAT IS CIE?
IMPACT ON SOCIETY
RISKS
CONCLUSIONS
Risks
• Risks to society associated with our dependence on Digital Infrastructure
• The Major risks are:
Unavailability
• no food, water, police / fire / ambulance service, medicine, access to
information, financial services, transportation, etc.
Compromise
• contaminated food or water, monetary fraud or theft, identity theft, trains
/ planes / vessels colliding or crashing, etc.
• Threats to digital infrastructure can be either unintentional (hardware and/or software failures, lack of
redundancy or fault tolerance, consequences of other exogenous events such as fires, floods, earthquakes,
power blackouts, wars, etc.) or intentional (hacking, phishing, denial of service attacks, identity theft, fraud,
espionage, etc. directed towards the network itself.)
• While our digital infrastructure is far from immune to unintentional threats, concern is growing about the
threats of deliberate criminal activity perpetrated for financial gain.
Risks
What is happening to the digital infrastructure today?
• Every day one can read news items related to cyber abuse:
• The theft of customer data from Sony’s online gaming service, forcing shutdown of the service
• Foreign spies penetrating government systems, forcing the governments to disconnect from the Internet
• Industrial/commercial espionage conducted to give the perpetrators unfair competitive advantage
• Denial-of-service attacks against popular websites; and so on.
• At a personal level, most of us have received scam email designed to defraud us or to trick us into disclosing
account numbers and passwords (known in the cyber security industry as phishing). And many of us have
experienced the infection of our personal computers with spyware designed to capture and report our online
activities to others, or some form of malware, such as a worm or a virus designed to render the computer
inoperable and/or its data unusable.
• These abuses are all predicated on the unrestricted connectivity provided by the internet.
WHAT IS CIE?
IMPACT ON SOCIETY
RISKS
CONCLUSIONS
Conclusions
• Engineers have always been at the forefront of innovation and exploitation of technology, so it is no surprise
that many of them have turned their skills to the challenge of building and maintaining trusted network
facilities.
• Thus far, most have acquired the special technical skills necessary to do this work on the job. Only recently
have accredited engineering programmes started to emerge that focus on this area of professional practice.
• “CIE” needs to mature in order to be recognized as an engineering discipline. Improving CIE practice
standards within industry and government, collaborating with other stakeholders, and shaping future
legislation and regulations will help to contribute to solving the world’s cyber-security crisis.
• This is an area that needs development, and needs to be fully regulated.
Conclusions
Recently the European Commission proposed concrete measures to accelerate the setting of standards within
the Digital Single Market strategy:
 Focus on 5 priority areas, by requesting the industry and standardisation bodies to develop standards in the
following areas:
 5G
 Cloud computing
 Internet of things
 Data technologies
 Cybersecurity
 Co-financing testing and experimentation technologies to accelerate the establishment of standards,
including public-private partnerships; thus, the timely development of standards will be guaranteed to drive
innovation and growth of enterprises.
References:
http://www.gartner.com
http://www.peo.on.ca/
https://www.ic.gc.ca
http://ec.europa.eu/priorities/digital-single-market_en

More Related Content

What's hot

GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
Chp 7 lect 7 - social context of computing (shared)
Chp 7   lect 7 - social context of computing (shared)Chp 7   lect 7 - social context of computing (shared)
Chp 7 lect 7 - social context of computing (shared)YUSRA FERNANDO
 
Introduction to Technology
Introduction to TechnologyIntroduction to Technology
Introduction to TechnologyCarolyn Brockman
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkETDAofficialRegist
 
Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxAmandaWeaver21
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Digital inclusion and exclusion
Digital inclusion and exclusionDigital inclusion and exclusion
Digital inclusion and exclusionpumascomm
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issuesRownel Cerezo Gagani
 
ITU Committed to connecting the world
ITU Committed to connecting the worldITU Committed to connecting the world
ITU Committed to connecting the worldDr Lendy Spires
 
ICT4D - How ICTs can positively harnessed for social and economic development
ICT4D - How ICTs can positively harnessed for social and economic developmentICT4D - How ICTs can positively harnessed for social and economic development
ICT4D - How ICTs can positively harnessed for social and economic developmentViviana Brun
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemFaHaD .H. NooR
 

What's hot (20)

GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
Chp 7 lect 7 - social context of computing (shared)
Chp 7   lect 7 - social context of computing (shared)Chp 7   lect 7 - social context of computing (shared)
Chp 7 lect 7 - social context of computing (shared)
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
 
Introduction to Technology
Introduction to TechnologyIntroduction to Technology
Introduction to Technology
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptx
 
Review questions
Review questionsReview questions
Review questions
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15
 
Digital inclusion and exclusion
Digital inclusion and exclusionDigital inclusion and exclusion
Digital inclusion and exclusion
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
ITU Committed to connecting the world
ITU Committed to connecting the worldITU Committed to connecting the world
ITU Committed to connecting the world
 
ICT4D - How ICTs can positively harnessed for social and economic development
ICT4D - How ICTs can positively harnessed for social and economic developmentICT4D - How ICTs can positively harnessed for social and economic development
ICT4D - How ICTs can positively harnessed for social and economic development
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 

Viewers also liked

Working in Digital Environments
Working in Digital EnvironmentsWorking in Digital Environments
Working in Digital EnvironmentsPasi Maenpaa
 
Winning in Networks (May 2010 Version)
Winning in Networks (May 2010 Version)Winning in Networks (May 2010 Version)
Winning in Networks (May 2010 Version)Venkat Venkatraman
 
Response to DCMS Digital Communications Infrastructure Strategy consultation
Response to DCMS Digital Communications Infrastructure Strategy consultationResponse to DCMS Digital Communications Infrastructure Strategy consultation
Response to DCMS Digital Communications Infrastructure Strategy consultationMartin Geddes
 
Digital Security
Digital SecurityDigital Security
Digital SecurityKoshy Tk
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldAndris Soroka
 
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's Approach
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's ApproachMobile Network Infrastructure Sharing - Industry Overview & Coleago's Approach
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's ApproachColeago Consulting
 
10 Best Productivity Hacks for Customer Service
10 Best Productivity Hacks for Customer Service10 Best Productivity Hacks for Customer Service
10 Best Productivity Hacks for Customer ServiceAdam Toporek
 

Viewers also liked (7)

Working in Digital Environments
Working in Digital EnvironmentsWorking in Digital Environments
Working in Digital Environments
 
Winning in Networks (May 2010 Version)
Winning in Networks (May 2010 Version)Winning in Networks (May 2010 Version)
Winning in Networks (May 2010 Version)
 
Response to DCMS Digital Communications Infrastructure Strategy consultation
Response to DCMS Digital Communications Infrastructure Strategy consultationResponse to DCMS Digital Communications Infrastructure Strategy consultation
Response to DCMS Digital Communications Infrastructure Strategy consultation
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital world
 
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's Approach
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's ApproachMobile Network Infrastructure Sharing - Industry Overview & Coleago's Approach
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's Approach
 
10 Best Productivity Hacks for Customer Service
10 Best Productivity Hacks for Customer Service10 Best Productivity Hacks for Customer Service
10 Best Productivity Hacks for Customer Service
 

Similar to The importance of cie in the digital era

IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET Journal
 
Module_1_IT_ERA.pptx
Module_1_IT_ERA.pptxModule_1_IT_ERA.pptx
Module_1_IT_ERA.pptxJenloDiamse
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringPotato
 
Telecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesTelecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesMartyn Taylor
 
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...Power System Operation
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_AdamsJulius Adams
 
25 sumit 2
25 sumit 225 sumit 2
25 sumit 2SRJIS
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...TI Safe
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world editedAhmed Banafa
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxSharifulShishir
 
Case study.pptx
Case study.pptxCase study.pptx
Case study.pptxictctti
 
oneM2M webinar (2014)
oneM2M webinar (2014)oneM2M webinar (2014)
oneM2M webinar (2014)Marc Jadoul
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Bernard Kufluk
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosFrancesca Valente
 

Similar to The importance of cie in the digital era (20)

IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
Module_1_IT_ERA.pptx
Module_1_IT_ERA.pptxModule_1_IT_ERA.pptx
Module_1_IT_ERA.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
Telecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesTelecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issues
 
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
25 sumit 2
25 sumit 225 sumit 2
25 sumit 2
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Securing Smart Cities
Securing Smart CitiesSecuring Smart Cities
Securing Smart Cities
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
Case study.pptx
Case study.pptxCase study.pptx
Case study.pptx
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
oneM2M webinar (2014)
oneM2M webinar (2014)oneM2M webinar (2014)
oneM2M webinar (2014)
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
 

Recently uploaded

Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 

Recently uploaded (20)

Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 

The importance of cie in the digital era

  • 1. The importance of CIE in the digital era AWARENESS DECK BY: RICARDO MANUEL BAIAO JORGE DE ALMEIDA
  • 2. WHAT IS CIE? IMPACT ON SOCIETY RISKS CONCLUSIONS
  • 3. What is CIE? The principal scopes of practice for CIE are: • Planning and design of trusted communication networks • Operational oversight of trusted communication networks • Risk analysis of, and contingency planning for, network infrastructure Communications Infrastructure Engineering (CIE) is related to the design and operation of the electronic networks that support all types of data communications. CIE looks after the data in transit and is primarily focused on the reliability, availability, security, and privacy of networks, calledTrusted Network, rather than on their physical aspects (such as cabling, Wi-Fi, 3G, 4G, 5G, transmission and receiving devices, etc.) The essential activity of CIE is the system-level design and management of secure or trusted communications networks.
  • 4. WHAT IS CIE? IMPACT ON SOCIETY RISKS CONCLUSIONS
  • 5. Impact on Society With the massive growth of Digital Infrastructure to cover the rapid expansion of wireless communications devices such as iPhone™, Android™ platforms, Windows Mobile™, and the rapid grow of 24/7 online services such as banking, bill payment, and information services, users are becoming heavily dependent of digital infrastructure. The Digital era is here to stay, the IoT (Internet ofThings) is taking its first steps and it will certainly change our lives in the future. All organisations want to be part of the day-to-day lives of their target audience and to take advantage of that presence to conduct business. That´s why organisations all over the world are investing heavily in digital transformation with the support of governments and public institutions such as the European Commission. As a matter of fact, the European Commission has recently announced its plans to help industry, SMEs, researchers and European public authorities to take full advantage of new technologies.The plans include, among other things, an investment of over 50,000 million dollars to help digitize the industry.
  • 6. Impact on Society Personal communications is only the tip of the iceberg — other critical infrastructures (operational infrastructures) are also dependent upon digital infrastructure. • Electric power, natural gas, oil production, and transmission systemsEnergy and Utilities • Telecommunications, broadcasting systems, software, hardware, and networks, including the Internet Communications and Information Technology • Banking, investment, securities, payment processingFinance • Hospitals and other health care facilities, blood supply, laboratories, pharmaceuticalsHealthcare • Production, processing, distribution and safetyFood • Drinking water and wastewater treatment / managementWater • Aviation, rail, marine, road, mass transitTransport • Law enforcement, fire, search and rescue, emergency servicesSafety • Social services, regulationGovernment • Defence, industrial base, chemical industryManufacturing
  • 7. Impact on Society •OperationalTechnology (OT) rely entirely in digital infrastructures and consist of platforms used in running the operation of physical assets of enterprises, especially those that involve taking specific actions. •(e.g. controlling electricity or energy flow, valves, lighting, ambient environment, machine tools or robots). Also Internet ofThings (IoT) rely entirely on digital infrastructures, and consists of a network of dedicated physical objects (things), that contain embedded technology to sense or interact with its internal state or the external environment. The IoT is an ecosystem that includes things, communication, applications and data analysis
  • 8. Impact on Society •It is easy to see the dependence of sectors like Finance (where virtually all transactions are automated), Public Safety (Emergency and Security) ecommerce (Amazon, Google, Facebook) on digital infrastructure. But most people don´t realize that water and sewage pumping stations are monitored and controlled remotely using wireless communication links, as are railway and underground trains and even our electric power grid including nuclear facilities.These essential services can be compromised by unavailability of the digital infrastructure on which they depend. Modern manufacturing is dependent upon automated supply chains and production control applications, which in turn rely on digital infrastructure.A failure in that digital infrastructure can shut down a production line, with attendant losses in the millions of dollars per day. It can also adversely affect worker safety. This is the present, the future is much more ambitious.
  • 9. ENTERPRISE Impact on Society Internet ofThings CONSUMER  Back-end IT systems  Predictive maintenance analytics  M2M connectivity (Machine to Machine communication services)  Processor for monitoring and control of things  Jet engine  Robot  ATM  Mobile apps  Elderly person monitoring service  Home Broadband  Standard mobile data  Smartphone gateway  Wireless router  Baby monitor  Health and fitness monitor Applications and Analytics Connectivity Gateway / Controller Things Operational Technology Source: Gartner Relationship between OT and IoT at Enterprise and consumer level.
  • 10. WHAT IS CIE? IMPACT ON SOCIETY RISKS CONCLUSIONS
  • 11. Risks • Risks to society associated with our dependence on Digital Infrastructure • The Major risks are: Unavailability • no food, water, police / fire / ambulance service, medicine, access to information, financial services, transportation, etc. Compromise • contaminated food or water, monetary fraud or theft, identity theft, trains / planes / vessels colliding or crashing, etc. • Threats to digital infrastructure can be either unintentional (hardware and/or software failures, lack of redundancy or fault tolerance, consequences of other exogenous events such as fires, floods, earthquakes, power blackouts, wars, etc.) or intentional (hacking, phishing, denial of service attacks, identity theft, fraud, espionage, etc. directed towards the network itself.) • While our digital infrastructure is far from immune to unintentional threats, concern is growing about the threats of deliberate criminal activity perpetrated for financial gain.
  • 12. Risks What is happening to the digital infrastructure today? • Every day one can read news items related to cyber abuse: • The theft of customer data from Sony’s online gaming service, forcing shutdown of the service • Foreign spies penetrating government systems, forcing the governments to disconnect from the Internet • Industrial/commercial espionage conducted to give the perpetrators unfair competitive advantage • Denial-of-service attacks against popular websites; and so on. • At a personal level, most of us have received scam email designed to defraud us or to trick us into disclosing account numbers and passwords (known in the cyber security industry as phishing). And many of us have experienced the infection of our personal computers with spyware designed to capture and report our online activities to others, or some form of malware, such as a worm or a virus designed to render the computer inoperable and/or its data unusable. • These abuses are all predicated on the unrestricted connectivity provided by the internet.
  • 13. WHAT IS CIE? IMPACT ON SOCIETY RISKS CONCLUSIONS
  • 14. Conclusions • Engineers have always been at the forefront of innovation and exploitation of technology, so it is no surprise that many of them have turned their skills to the challenge of building and maintaining trusted network facilities. • Thus far, most have acquired the special technical skills necessary to do this work on the job. Only recently have accredited engineering programmes started to emerge that focus on this area of professional practice. • “CIE” needs to mature in order to be recognized as an engineering discipline. Improving CIE practice standards within industry and government, collaborating with other stakeholders, and shaping future legislation and regulations will help to contribute to solving the world’s cyber-security crisis. • This is an area that needs development, and needs to be fully regulated.
  • 15. Conclusions Recently the European Commission proposed concrete measures to accelerate the setting of standards within the Digital Single Market strategy:  Focus on 5 priority areas, by requesting the industry and standardisation bodies to develop standards in the following areas:  5G  Cloud computing  Internet of things  Data technologies  Cybersecurity  Co-financing testing and experimentation technologies to accelerate the establishment of standards, including public-private partnerships; thus, the timely development of standards will be guaranteed to drive innovation and growth of enterprises.