SlideShare a Scribd company logo
Urban Security Decision Support  Outcomes Urban Security Functional Requirements  Physical Devices  / Assets Other  Agencies & Information Sources Incident Management Planned  & Unplanned (Response Plans& Escalations)  Encrypted Communications Protocols Encrypted Communications Protocols Surveillance  &  Detection Access Control & Physical  Devices i.e.  Traffic  Signals Barriers   etc. Perimeter /Border Control  -  Outer  & Inner Perimeters Intelligence &  Threat Assessment  Prediction  &  Prevention Response  Asset  Management(Assets = People /Systems )   Response &  Interception Detection and Surveillance Devices  Building  Security and Management & Fault Management Systems Information  Management Intelligence & Metrics  - Internal & External  Agencies Human Resources (Assets) Information Technology & Communications Security  Secure Data Collected, Processed  & Stored. Command & Control Spans all Activities , Functions and Business Outcomes
Operations Coordinators Security Analysts Military / Police  Agencies Dissemination Layer and Decision Support Interface Event / Situation Manager Stored Response Plans Escalations & Operations Protocols/Rules Situation Analysis Engines & Databases Pattern Analysis Engines & Databases Integrated Messaging Systems  & Data Transport Protocols Typically Web Services Driven Facial  & FP/Retina  Recognition Video Based  Incident Detection Building Management &  Security Systems / Fault Management Data  Supplied By Others – Security  Intelligence Wanted Lists etc OCR Engines + Automated Character Recog Specific Security Applications – Aggregate and  Integrate data from multiple underlying Detection Devices & Sources CCTV & Actual Surveillance  Biometrics VBID CCTV +  Zones IT Systems & Comms ANPR/LPR Alarms Presence Detection Detection Devices + End Points of Presence  / Border / Perimeter Detection Systems
Command & Control2

More Related Content

Similar to Command & Control2

Professional opportunities in security & vigilance
Professional opportunities in security & vigilanceProfessional opportunities in security & vigilance
Professional opportunities in security & vigilance
RAVICHANDRAN DURAIRAJ
 
Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Framework
ssuser65fa31
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06
gbroadbent67
 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseFIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident Response
Anton Chuvakin
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
Global Business Events - the Heart of your Network.
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
Jorge Sebastiao
 
Overview
OverviewOverview
Overview
phanleson
 
Pro CERT
Pro CERT Pro CERT
Pro CERT
Dragos Lungu
 
Surelog Detail
Surelog DetailSurelog Detail
Surelog Detail
ANETUSA Software
 
Incident Response
Incident Response Incident Response
Incident Response
InnoTech
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
Mahboob Ahmad
 
A summary of gao’s review of information security (naba barkakati)
A summary of gao’s review of information security (naba barkakati)A summary of gao’s review of information security (naba barkakati)
A summary of gao’s review of information security (naba barkakati)
Naba Barkakati
 
Internet of things industrial view
Internet of things   industrial viewInternet of things   industrial view
Internet of things industrial view
Nilesh Trivedi
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
Sergei Yavchenko
 
BOMA
BOMABOMA
BOMA
jdemone
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural Perspective
Gaurav Awasthi
 
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
Cristian Garcia G.
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
Milap Oza
 
Company Profile - Fourth Prime Solutions Pvt. Ltd.
Company Profile - Fourth Prime Solutions Pvt. Ltd.Company Profile - Fourth Prime Solutions Pvt. Ltd.
Company Profile - Fourth Prime Solutions Pvt. Ltd.
Vineet M Srivastav
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 

Similar to Command & Control2 (20)

Professional opportunities in security & vigilance
Professional opportunities in security & vigilanceProfessional opportunities in security & vigilance
Professional opportunities in security & vigilance
 
Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Framework
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06
 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseFIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident Response
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Overview
OverviewOverview
Overview
 
Pro CERT
Pro CERT Pro CERT
Pro CERT
 
Surelog Detail
Surelog DetailSurelog Detail
Surelog Detail
 
Incident Response
Incident Response Incident Response
Incident Response
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
A summary of gao’s review of information security (naba barkakati)
A summary of gao’s review of information security (naba barkakati)A summary of gao’s review of information security (naba barkakati)
A summary of gao’s review of information security (naba barkakati)
 
Internet of things industrial view
Internet of things   industrial viewInternet of things   industrial view
Internet of things industrial view
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
BOMA
BOMABOMA
BOMA
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural Perspective
 
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Company Profile - Fourth Prime Solutions Pvt. Ltd.
Company Profile - Fourth Prime Solutions Pvt. Ltd.Company Profile - Fourth Prime Solutions Pvt. Ltd.
Company Profile - Fourth Prime Solutions Pvt. Ltd.
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 

More from david_verma

VMS Specs an Overview
VMS Specs an OverviewVMS Specs an Overview
VMS Specs an Overview
david_verma
 
A Testing Overview
A Testing OverviewA Testing Overview
A Testing Overview
david_verma
 
Formal Testing Process Systems Engineering
Formal Testing Process Systems EngineeringFormal Testing Process Systems Engineering
Formal Testing Process Systems Engineering
david_verma
 
Systems Engineering Process Outline
Systems Engineering Process OutlineSystems Engineering Process Outline
Systems Engineering Process Outline
david_verma
 
Commodity Vs Bespoke Development Abridged
Commodity Vs Bespoke Development AbridgedCommodity Vs Bespoke Development Abridged
Commodity Vs Bespoke Development Abridged
david_verma
 
ATMS Update
ATMS UpdateATMS Update
ATMS Update
david_verma
 
It Systems1
It Systems1It Systems1
It Systems1
david_verma
 
Dvermaconceptualdetectordesign
DvermaconceptualdetectordesignDvermaconceptualdetectordesign
Dvermaconceptualdetectordesign
david_verma
 
H4 David Verma Beca
H4 David Verma BecaH4 David Verma Beca
H4 David Verma Beca
david_verma
 

More from david_verma (9)

VMS Specs an Overview
VMS Specs an OverviewVMS Specs an Overview
VMS Specs an Overview
 
A Testing Overview
A Testing OverviewA Testing Overview
A Testing Overview
 
Formal Testing Process Systems Engineering
Formal Testing Process Systems EngineeringFormal Testing Process Systems Engineering
Formal Testing Process Systems Engineering
 
Systems Engineering Process Outline
Systems Engineering Process OutlineSystems Engineering Process Outline
Systems Engineering Process Outline
 
Commodity Vs Bespoke Development Abridged
Commodity Vs Bespoke Development AbridgedCommodity Vs Bespoke Development Abridged
Commodity Vs Bespoke Development Abridged
 
ATMS Update
ATMS UpdateATMS Update
ATMS Update
 
It Systems1
It Systems1It Systems1
It Systems1
 
Dvermaconceptualdetectordesign
DvermaconceptualdetectordesignDvermaconceptualdetectordesign
Dvermaconceptualdetectordesign
 
H4 David Verma Beca
H4 David Verma BecaH4 David Verma Beca
H4 David Verma Beca
 

Command & Control2

  • 1. Urban Security Decision Support Outcomes Urban Security Functional Requirements Physical Devices / Assets Other Agencies & Information Sources Incident Management Planned & Unplanned (Response Plans& Escalations) Encrypted Communications Protocols Encrypted Communications Protocols Surveillance & Detection Access Control & Physical Devices i.e. Traffic Signals Barriers etc. Perimeter /Border Control - Outer & Inner Perimeters Intelligence & Threat Assessment Prediction & Prevention Response Asset Management(Assets = People /Systems ) Response & Interception Detection and Surveillance Devices Building Security and Management & Fault Management Systems Information Management Intelligence & Metrics - Internal & External Agencies Human Resources (Assets) Information Technology & Communications Security Secure Data Collected, Processed & Stored. Command & Control Spans all Activities , Functions and Business Outcomes
  • 2. Operations Coordinators Security Analysts Military / Police Agencies Dissemination Layer and Decision Support Interface Event / Situation Manager Stored Response Plans Escalations & Operations Protocols/Rules Situation Analysis Engines & Databases Pattern Analysis Engines & Databases Integrated Messaging Systems & Data Transport Protocols Typically Web Services Driven Facial & FP/Retina Recognition Video Based Incident Detection Building Management & Security Systems / Fault Management Data Supplied By Others – Security Intelligence Wanted Lists etc OCR Engines + Automated Character Recog Specific Security Applications – Aggregate and Integrate data from multiple underlying Detection Devices & Sources CCTV & Actual Surveillance Biometrics VBID CCTV + Zones IT Systems & Comms ANPR/LPR Alarms Presence Detection Detection Devices + End Points of Presence / Border / Perimeter Detection Systems

Editor's Notes

  1. Note – model assumes that:1) Policy and Legislative imperatives are clear2) Chain of command and ops control roles are clearly defined and understood as are escalations and degree of responses based on severity / threat assessment.3) Incident closure process is assumed as being defined as are incident response plans.4) Tertiary Systems such as Traffic lights barriers and tolling systems are available as inputs – not all detection types are listed ie RFID is a valid mechanism for tracking cars as is cellular ESN for tracking people5) All data point to point is encrypted to military grades.
  2. Note the above diagram should be read from bottom to top.Each layer is representative of functions and roles and presents a limited example of each level.Situation and Response planning requires that response plans are already available – heuristics for the analysis layer are always customised depending on the requirements of the agency seeking the system.Terrorism will require military response and therefore all command and control will default to military objectives overriding standard surveillance requirements.AVL as an example should be installed on all official vehicles etc and a web map interface present for coordination of response assets.