SlideShare a Scribd company logo
Critical national infrastructure introduction video Slide 1
Critical national infrastructure
Ian Sommerville
Critical national infrastructure introduction video Slide 2
What is infrastructure?
• This national
infrastructure is made
up of
networks, systems, sites
, facilities and
businesses that deliver
goods and services to
citizens, businesses, pu
blic bodies and
government.
Critical national infrastructure introduction video Slide 3
Infrastructure services
• Power, water, wast
e disposal, the
internet, transport
networks,
• Government
services, financial
services, emergenc
y services, hospitals
etc.
Critical national infrastructure introduction video Slide 4
Physical infrastructure
• National
physical
infrastructure is
a set of
networks that
facilitate the
movement of
people, goods, e
nergy, water, wa
ste, data, etc.
around a
Critical national infrastructure introduction video Slide 5
Infrastructure networks
• Transport
• Energy
• Communication
s
• Data
• Water
• Waste
Critical national infrastructure introduction video Slide 6
Organisational infrastructure
• Financial services
• Medical services
• Emergency services
• Government
services
• Food supply
© Dwight Burdette
Critical national infrastructure introduction video Slide 7
Digital infrastructure
• Hardware and software
systems and networks
on which businesses and
society depends
– Fibre communication links
– Mobile phone and data
network
– Data centres and servers
– ISPs
Critical national infrastructure introduction video Slide 8
Critical infrastructure
• Assets which are part of the national
and organisational infrastructure
whose availability is essential to the
delivery of infrastructure services and
whose unavailability has significant
human, social and economic
consequences.
Critical national infrastructure introduction video Slide 9
Critical infrastructure
• Critical infrastructure assets
include
– Structures and buildings
– Networks
– Computer-based systems
– Organisations
Critical national infrastructure introduction video Slide 10
Critical assets
• Not all components of the national infrastructure are
critical elements
• Criticality does not just depend on the type of facility
but also on the number of people affected or other
consequences if the facility is damaged or
unavailable and cannot easily be replaced.
Critical national infrastructure introduction video Slide 11
© Kenneth Iwelumo. http://commons.wikimedia.org/wiki/File:Heathrow_Terminal_5C_Iwelumo-1.jpg
Critical national infrastructure introduction video Slide 12
© Gareth James.
www.world-airport-codes.com
Critical national infrastructure introduction video Slide 13
Landline Phones
Mobile
Telecommunicatio
ns
Postal Services
Broadcast
Communications
Ambulance
Fire and Rescue
Marine
Police
Communication
s
Food
Emergency
Services
Energy
Electricity
Gas
Oil
Fuel
Production
Processing
Import
Distribution
Retail
Critical national infrastructure introduction video Slide 14
Health and Social Care
Finance
Government
Health
Transport
Water
Payment, Clearing and
Settlement Systems
Public Finances
Markets and Exchanges
Central Government
Parliament
Devolved Administrations
Regional and Local Authorities
Maritime
Aviation
Land (Road and rail)
Potable water supply
Dams
Waste Water Services
Critical national infrastructure introduction video Slide 15
Critical infrastructure systems
• Our infrastructure is controlled and
managed by a wide range of
interacting, computer-based systems
• Businesses and essential services to
citizens are completely dependent on
our ‘digital infrastructure’
• Therefore, all of the systems involved in
critical infrastructure management are
critical software-intensive systems
Critical national infrastructure introduction video Slide 16
Summary
• National infrastructure is a set of services
such as energy, communications and medical
services on which society depends.
• Critical national infrastructure are those
assets which are needed to deliver these
services whose unavailability has serious
social consequences.
• Software-intensive systems are used to
manage, organize and control our critical
national infrastructure so these are critical
systems.
Critical national infrastructure introduction video Slide 17
slideshare.com/so
mmerville-videos

More Related Content

What's hot

Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
Neha Agarwal
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
Nishanth Kumar Pathi
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
mhdpaknejad
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
Motorola Solutions
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
Prachi Mishra
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
ANGIEPAEZ304
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
Gowdhaman Jothilingam
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
damilolasunmola
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
Iain Dickson
 
The Art of Playcalling: Building an Incident Response Playbook
The Art of Playcalling: Building an Incident Response PlaybookThe Art of Playcalling: Building an Incident Response Playbook
The Art of Playcalling: Building an Incident Response Playbook
Trenton Brooks
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
Nozomi Networks
 
INCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATION
Sylvain Martinez
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
NTT Innovation Institute Inc.
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
The Avi Sharma
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
Indeevari Ramanayake
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
Deep Shankar Yadav
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP
 
Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1Richard Hudson
 

What's hot (20)

Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
The Art of Playcalling: Building an Incident Response Playbook
The Art of Playcalling: Building an Incident Response PlaybookThe Art of Playcalling: Building an Incident Response Playbook
The Art of Playcalling: Building an Incident Response Playbook
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
INCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATION
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1
 

Viewers also liked

Critical systems engineering
Critical systems engineeringCritical systems engineering
Critical systems engineering
sommerville-videos
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challenges
sommerville-videos
 
System security
System securitySystem security
System security
sommerville-videos
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013Ian Sommerville
 
CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013Ian Sommerville
 
CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013Ian Sommerville
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013Ian Sommerville
 
For Critical Infrastructure Protection
For Critical Infrastructure ProtectionFor Critical Infrastructure Protection
For Critical Infrastructure Protection
Priyanka Aash
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
sommerville-videos
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
sommerville-videos
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
sommerville-videos
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
sommerville-videos
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
sommerville-videos
 
Infrastructure control
Infrastructure controlInfrastructure control
Infrastructure control
sommerville-videos
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systems
sommerville-videos
 
Maroochy water breach
Maroochy water breachMaroochy water breach
Maroochy water breach
sommerville-videos
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
sommerville-videos
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurity
sommerville-videos
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processes
sommerville-videos
 

Viewers also liked (20)

Infrastructure dependability
Infrastructure dependabilityInfrastructure dependability
Infrastructure dependability
 
Critical systems engineering
Critical systems engineeringCritical systems engineering
Critical systems engineering
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challenges
 
System security
System securitySystem security
System security
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013
 
CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013
 
CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013
 
For Critical Infrastructure Protection
For Critical Infrastructure ProtectionFor Critical Infrastructure Protection
For Critical Infrastructure Protection
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Infrastructure control
Infrastructure controlInfrastructure control
Infrastructure control
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systems
 
Maroochy water breach
Maroochy water breachMaroochy water breach
Maroochy water breach
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurity
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processes
 

Similar to Critical national infrastructure

Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCandice Tang
 
The importance of cie in the digital era
The importance of cie in the digital eraThe importance of cie in the digital era
The importance of cie in the digital era
Ricardo de Almeida
 
A new look at video communications from an ICT perspective
A new look at video communications from an ICT perspectiveA new look at video communications from an ICT perspective
A new look at video communications from an ICT perspective
IMTC
 
Blackoutslidesharefinalfinal 150610082252-lva1-app6892
Blackoutslidesharefinalfinal 150610082252-lva1-app6892Blackoutslidesharefinalfinal 150610082252-lva1-app6892
Blackoutslidesharefinalfinal 150610082252-lva1-app6892
Vera Kovaleva
 
Blackout of Critical Services: Do you know your exposure?
Blackout of Critical Services: Do you know your exposure?Blackout of Critical Services: Do you know your exposure?
Blackout of Critical Services: Do you know your exposure?
Gen Re
 
Presentation to telecom forum co ict 13012015
Presentation to telecom forum co ict 13012015Presentation to telecom forum co ict 13012015
Presentation to telecom forum co ict 13012015ProjectENhANCE
 
Presentation to telecom forum co ict 13012015
Presentation to telecom forum co ict 13012015Presentation to telecom forum co ict 13012015
Presentation to telecom forum co ict 13012015ProjectENhANCE
 
Dr. Yonah_Developments of Information Technologies in Tanzania and National P...
Dr. Yonah_Developments of Information Technologies in Tanzania and National P...Dr. Yonah_Developments of Information Technologies in Tanzania and National P...
Dr. Yonah_Developments of Information Technologies in Tanzania and National P...
Edward Mutafungwa
 
Connected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptxConnected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptx
brigel529
 
BCM for National Critical Resources
BCM for National Critical ResourcesBCM for National Critical Resources
BCM for National Critical Resources
Continuity and Resilience
 
CompanyNotesExecutive SummaryCurrent Marketing Situation
CompanyNotesExecutive SummaryCurrent Marketing SituationCompanyNotesExecutive SummaryCurrent Marketing Situation
CompanyNotesExecutive SummaryCurrent Marketing Situation
LynellBull52
 
Glass Fiber Boxes
Glass Fiber BoxesGlass Fiber Boxes
Glass Fiber Boxes
Roberto Tiozzo
 
CS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructureCS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructureJohn Rooksby
 
Public Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesPublic Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case Studies
Connected Futures
 
Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'
SSoujanya
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
Adlan Hussain
 
Gabrielle Gauthey - Alcatel Lucent - 20140508 inca-transform digital confere...
Gabrielle Gauthey - Alcatel Lucent - 20140508  inca-transform digital confere...Gabrielle Gauthey - Alcatel Lucent - 20140508  inca-transform digital confere...
Gabrielle Gauthey - Alcatel Lucent - 20140508 inca-transform digital confere...
Independent Networks Co-operative Association
 
telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionsFakher Oueslati
 

Similar to Critical national infrastructure (20)

Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
 
The importance of cie in the digital era
The importance of cie in the digital eraThe importance of cie in the digital era
The importance of cie in the digital era
 
Group 7 netherland
Group 7   netherlandGroup 7   netherland
Group 7 netherland
 
A new look at video communications from an ICT perspective
A new look at video communications from an ICT perspectiveA new look at video communications from an ICT perspective
A new look at video communications from an ICT perspective
 
Blackoutslidesharefinalfinal 150610082252-lva1-app6892
Blackoutslidesharefinalfinal 150610082252-lva1-app6892Blackoutslidesharefinalfinal 150610082252-lva1-app6892
Blackoutslidesharefinalfinal 150610082252-lva1-app6892
 
Blackout of Critical Services: Do you know your exposure?
Blackout of Critical Services: Do you know your exposure?Blackout of Critical Services: Do you know your exposure?
Blackout of Critical Services: Do you know your exposure?
 
Presentation to telecom forum co ict 13012015
Presentation to telecom forum co ict 13012015Presentation to telecom forum co ict 13012015
Presentation to telecom forum co ict 13012015
 
Presentation to telecom forum co ict 13012015
Presentation to telecom forum co ict 13012015Presentation to telecom forum co ict 13012015
Presentation to telecom forum co ict 13012015
 
Dr. Yonah_Developments of Information Technologies in Tanzania and National P...
Dr. Yonah_Developments of Information Technologies in Tanzania and National P...Dr. Yonah_Developments of Information Technologies in Tanzania and National P...
Dr. Yonah_Developments of Information Technologies in Tanzania and National P...
 
Connected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptxConnected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptx
 
BCM for National Critical Resources
BCM for National Critical ResourcesBCM for National Critical Resources
BCM for National Critical Resources
 
30ian2009 sun
30ian2009 sun30ian2009 sun
30ian2009 sun
 
CompanyNotesExecutive SummaryCurrent Marketing Situation
CompanyNotesExecutive SummaryCurrent Marketing SituationCompanyNotesExecutive SummaryCurrent Marketing Situation
CompanyNotesExecutive SummaryCurrent Marketing Situation
 
Glass Fiber Boxes
Glass Fiber BoxesGlass Fiber Boxes
Glass Fiber Boxes
 
CS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructureCS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructure
 
Public Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesPublic Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case Studies
 
Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
 
Gabrielle Gauthey - Alcatel Lucent - 20140508 inca-transform digital confere...
Gabrielle Gauthey - Alcatel Lucent - 20140508  inca-transform digital confere...Gabrielle Gauthey - Alcatel Lucent - 20140508  inca-transform digital confere...
Gabrielle Gauthey - Alcatel Lucent - 20140508 inca-transform digital confere...
 
telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutions
 

More from sommerville-videos

Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systems
sommerville-videos
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
sommerville-videos
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classificationsommerville-videos
 
Reuse landscape
Reuse landscapeReuse landscape
Reuse landscape
sommerville-videos
 
Scaling agile
Scaling agileScaling agile
Scaling agile
sommerville-videos
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systems
sommerville-videos
 
User stories
User storiesUser stories
User stories
sommerville-videos
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activities
sommerville-videos
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineering
sommerville-videos
 
Why se script
Why se scriptWhy se script
Why se script
sommerville-videos
 
Ariane 5 launcher failure
Ariane 5 launcher failure Ariane 5 launcher failure
Ariane 5 launcher failure
sommerville-videos
 
Airbus Flight Control System
Airbus Flight Control SystemAirbus Flight Control System
Airbus Flight Control System
sommerville-videos
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concerns
sommerville-videos
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processes
sommerville-videos
 
Intro to requirements eng.
Intro to requirements eng.Intro to requirements eng.
Intro to requirements eng.
sommerville-videos
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systemssommerville-videos
 
Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
sommerville-videos
 

More from sommerville-videos (20)

Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systems
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classification
 
Reuse landscape
Reuse landscapeReuse landscape
Reuse landscape
 
Scaling agile
Scaling agileScaling agile
Scaling agile
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systems
 
User stories
User storiesUser stories
User stories
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activities
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineering
 
Why se script
Why se scriptWhy se script
Why se script
 
Ariane 5 launcher failure
Ariane 5 launcher failure Ariane 5 launcher failure
Ariane 5 launcher failure
 
Airbus Flight Control System
Airbus Flight Control SystemAirbus Flight Control System
Airbus Flight Control System
 
Warsaw airbus accident
Warsaw airbus accidentWarsaw airbus accident
Warsaw airbus accident
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concerns
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processes
 
Intro to requirements eng.
Intro to requirements eng.Intro to requirements eng.
Intro to requirements eng.
 
Emergent properties
Emergent propertiesEmergent properties
Emergent properties
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systems
 
System success and failure
System success and failureSystem success and failure
System success and failure
 
Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Critical national infrastructure

  • 1. Critical national infrastructure introduction video Slide 1 Critical national infrastructure Ian Sommerville
  • 2. Critical national infrastructure introduction video Slide 2 What is infrastructure? • This national infrastructure is made up of networks, systems, sites , facilities and businesses that deliver goods and services to citizens, businesses, pu blic bodies and government.
  • 3. Critical national infrastructure introduction video Slide 3 Infrastructure services • Power, water, wast e disposal, the internet, transport networks, • Government services, financial services, emergenc y services, hospitals etc.
  • 4. Critical national infrastructure introduction video Slide 4 Physical infrastructure • National physical infrastructure is a set of networks that facilitate the movement of people, goods, e nergy, water, wa ste, data, etc. around a
  • 5. Critical national infrastructure introduction video Slide 5 Infrastructure networks • Transport • Energy • Communication s • Data • Water • Waste
  • 6. Critical national infrastructure introduction video Slide 6 Organisational infrastructure • Financial services • Medical services • Emergency services • Government services • Food supply © Dwight Burdette
  • 7. Critical national infrastructure introduction video Slide 7 Digital infrastructure • Hardware and software systems and networks on which businesses and society depends – Fibre communication links – Mobile phone and data network – Data centres and servers – ISPs
  • 8. Critical national infrastructure introduction video Slide 8 Critical infrastructure • Assets which are part of the national and organisational infrastructure whose availability is essential to the delivery of infrastructure services and whose unavailability has significant human, social and economic consequences.
  • 9. Critical national infrastructure introduction video Slide 9 Critical infrastructure • Critical infrastructure assets include – Structures and buildings – Networks – Computer-based systems – Organisations
  • 10. Critical national infrastructure introduction video Slide 10 Critical assets • Not all components of the national infrastructure are critical elements • Criticality does not just depend on the type of facility but also on the number of people affected or other consequences if the facility is damaged or unavailable and cannot easily be replaced.
  • 11. Critical national infrastructure introduction video Slide 11 © Kenneth Iwelumo. http://commons.wikimedia.org/wiki/File:Heathrow_Terminal_5C_Iwelumo-1.jpg
  • 12. Critical national infrastructure introduction video Slide 12 © Gareth James. www.world-airport-codes.com
  • 13. Critical national infrastructure introduction video Slide 13 Landline Phones Mobile Telecommunicatio ns Postal Services Broadcast Communications Ambulance Fire and Rescue Marine Police Communication s Food Emergency Services Energy Electricity Gas Oil Fuel Production Processing Import Distribution Retail
  • 14. Critical national infrastructure introduction video Slide 14 Health and Social Care Finance Government Health Transport Water Payment, Clearing and Settlement Systems Public Finances Markets and Exchanges Central Government Parliament Devolved Administrations Regional and Local Authorities Maritime Aviation Land (Road and rail) Potable water supply Dams Waste Water Services
  • 15. Critical national infrastructure introduction video Slide 15 Critical infrastructure systems • Our infrastructure is controlled and managed by a wide range of interacting, computer-based systems • Businesses and essential services to citizens are completely dependent on our ‘digital infrastructure’ • Therefore, all of the systems involved in critical infrastructure management are critical software-intensive systems
  • 16. Critical national infrastructure introduction video Slide 16 Summary • National infrastructure is a set of services such as energy, communications and medical services on which society depends. • Critical national infrastructure are those assets which are needed to deliver these services whose unavailability has serious social consequences. • Software-intensive systems are used to manage, organize and control our critical national infrastructure so these are critical systems.
  • 17. Critical national infrastructure introduction video Slide 17 slideshare.com/so mmerville-videos