NIEM is a data exchange model used across federal, state, local, and tribal governments. Business Architecture Committee (NBAC) June 2009 through November 2013. OmniClass facility types built in to advance public safety.
SiteFM presents a free education webinar on the following:
-The purpose and value of the annual evaluation
-Requirements for annual evals
Objective
Scope
Performance
Effectiveness
-The annual evaluation process
-Impact on safety and operations
Interop Concepts Dhs Preso Contestabile 09 27 11jcontestabile
A presentation on a conceptual approach to sharing in formation and addressing a lack of interoperability between systems in emergency management/public safety applications.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
CryptoLocker was a ransomware trojan which targeted computers running Microsoft Windows and was first observed by Dell SecureWorks in September 2013. CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message, which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid cash voucher) is made by a stated deadline, and threatened to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in Bitcoin
Explore the new 2014 TorrentLocker and get inside his C&C server
SiteFM presents a free education webinar on the following:
-The purpose and value of the annual evaluation
-Requirements for annual evals
Objective
Scope
Performance
Effectiveness
-The annual evaluation process
-Impact on safety and operations
Interop Concepts Dhs Preso Contestabile 09 27 11jcontestabile
A presentation on a conceptual approach to sharing in formation and addressing a lack of interoperability between systems in emergency management/public safety applications.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
CryptoLocker was a ransomware trojan which targeted computers running Microsoft Windows and was first observed by Dell SecureWorks in September 2013. CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message, which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid cash voucher) is made by a stated deadline, and threatened to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in Bitcoin
Explore the new 2014 TorrentLocker and get inside his C&C server
Public safety in a multi media era facilitating incident management responseJack Brown
Situational awareness
“Situational awareness” was a term originally used to describe the tactical situation during aerial combat . While the literal term doesn’t go back as far as World War I, the idea surfaced then, when pilots first took to the sky in combat. At first, the term referred to the pilot’s ability to know where he was in relation to the enemy and the other pilots of his flight. In reality, that is only positional awareness. However, when pilots added their knowledge of aircraft capabilities and known battle tactics with positional awareness, they were able to interpret, comprehend and anticipate. The comprehension of observations is the essence of situational awareness.
Topic Since information extracted from router or switch interfaces.docxjuliennehar
Topic Since information extracted from router or switch interfaces to not provide specific evidence of a particular crime in most cases, what use is the information collected from these devices.
Read and respond to atleast two other students Discussions. (5-6 lines would be more sufficient)
#1.Posted by Srikanth
Routers and switches give the availability, both inside the demilitarized Zone (DMZ) environment and to different tareas of the system to which the DMZ is connected. This makes Routers and switches prime targets for hackers to exploit and gather data about the system or just use as springboards on other devices. This section presents data on the best way to information and arrange some significant router and switch security includes that enable run safely and ensure the devices that they associate. Routers direct traffic all through the undertaking system and are normally the first line of barrier when the system is associating with the Internet. Hackers try to infiltrate routers to gather data or use them as launching pads for further attacks. This is the reason it is critical to secure switches' management interfaces and services to make them trouble for an interloper to hack. Similarly as with routers, switches have an expanding job in system security. The switch gives numerous highlights, including port security. VLANs and PVLANs give the tools to keep the devices on the DMZ secure. It is additionally imperative to secure the switch's management interfaces and services with the goal that hackers can't break into the switch to change VLAN designs, change port settings, or utilize the switch to connect with different parts of the network.
Network forensics is capture, recording and analysis of network packets in order to determine the source of network security attacks. The major goal of network forensics is to collect evidence. It tries to analyze network traffic data, which is collected from different sites and different network equipment, such as firewalls and IDS. In addition, it monitors on the network to detect attacks and analyze the nature of attackers. Network forensics is also the process of detecting intrusion patterns, focusing on attacker activity.
Computer documents, emails, text and instant messages, transactions, images and Internet histories are examples of information that can be gathered from electronic devices and used very effectively as evidence. For example, mobile devices use online-based based backup systems, also known as the “cloud”, that provide forensic investigators with access to text messages and pictures taken from a particular phone. These systems keep an average of 1,000–1,500 or more of the last text messages sent to and received from that phone.In addition, many mobile devices store information about the locations where the device traveled and when it was there. To gain this knowledge, investigators can access an average of the last 200 cell locations accessed by a mobile device. Satellite navig ...
Disaster Risk Management in the Information Ageglobal
International Day for Disaster Reduction at the World Bank
Disaster Risk Management in the Information Age
A joint training workshop by GICT, GFDRR, infoDev and LCSUW to mark the International Day for Disaster Reduction
Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...Hamad Al Katheri
HOME LAND alert for a probable attack
"A medium priority incident may affect public health or safety, national security, economic security, foreign relations, civil liberties, or public confidence."
TOTEM: Threat Observation, Tracking, and Evaluation ModelJohn Gerber
Merriam-Webster defines a totem as any supposed entity that watches over or assists a group of people, such as a family, clan, or tribe. In this presentation I will focus on how TOTEM assists in watching over and evaluating the threat an IP represents. The idea behind TOTEM is simple: compare threat information from sources such as watchlists (DShield, Emerging Threats, SenderBase, etc.) to activities with the organization (IDS/IPS, flow logs, etc.) and other locations (SANS ISC, DOE federated model, etc.). As new threat information and activity sources are added, a better evaluation can be rendered.
DoS Forensic Exemplar Comparison to a Known SampleCSCJournals
The investigation of any event or incident often involves the evaluation of physical evidence. Occasionally, a comparison is conducted between an evidentiary sample of unknown origin and that of an appropriate known sample. In a Denial of Service (DoS) attack, items of evidentiary value may cross the spectrum from anecdotes to useful information in firewall logs or complete packet captures. Because of the spoofed or reflective nature of DoS attacks, relevant information leading to the direct identification of the perpetrator is rarely available. In many instances, this underscores the significance of the investigator's ability to accurately identify the tool utilized by the suspect. For a DoS attack scenario, this would likely involve a commercially available stresser or criminal bot infrastructure. In this paper, we propose the concept of a DoS exemplar and determine if the comparison of evidentiary samples to an appropriate known sample of DoS attributes could add value in the investigative process. We also provide a simple tool to compare two DoS flows.
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...Nexgen Technology
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
Connecting the Next Billion Devices to the Internet - Standards and ProtocolsSteve Ray
Presentation delivered at the IoTx Expo in Dubai, June 2015
Evolution of protocols and standards for the Internet of Things.
Why standards designed for different verticals need to interoperate to deliver business value.
How to avoid creating silos that will make bridging applications across different verticals challenging.
A secure network forensics system for cyber incidents analysisSwapnil Jagtap
Network forensics is the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents. (The term, attributed to firewall expert Marcus Ranum is borrowed from the legal and criminology fields where forensics pertains to the investigation of crimes.) According to Simson Garnkel, author of several books on security, network forensics systems can be one of two kinds.
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
this report is about how network security and privacy security works on Wireless and Wired system.It is also contain encryption method for network security and privacy.
Collecting and analyzing network-based evidenceCSITiaesprime
Since nearly the beginning of the Internet, malware has been a significant deterrent to productivity for end users, both personal and business related. Due to the pervasiveness of digital technologies in all aspects of human lives, it is increasingly unlikely that a digital device is involved as goal, medium or simply ‘witness’ of a criminal event. Forensic investigations include collection, recovery, analysis, and presentation of information stored on network devices and related to network crimes. These activities often involve wide range of analysis tools and application of different methods. This work presents methods that helps digital investigators to correlate and present information acquired from forensic data, with the aim to get a more valuable reconstructions of events or action to reach case conclusions. Main aim of network forensic is to gather evidence. Additionally, the evidence obtained during the investigation must be produced through a rigorous investigation procedure in a legal context.
The Internet of Things (IoT) includes huge quantities of things across all industries, these slides are things about buildings stored in computers, and the semantics of architecture
Most large buildings include a special keybox for the fire department to have access to all parts of the building in the event of an emergency. This slide show is a scenario with similar concept but for digital access.
Public safety in a multi media era facilitating incident management responseJack Brown
Situational awareness
“Situational awareness” was a term originally used to describe the tactical situation during aerial combat . While the literal term doesn’t go back as far as World War I, the idea surfaced then, when pilots first took to the sky in combat. At first, the term referred to the pilot’s ability to know where he was in relation to the enemy and the other pilots of his flight. In reality, that is only positional awareness. However, when pilots added their knowledge of aircraft capabilities and known battle tactics with positional awareness, they were able to interpret, comprehend and anticipate. The comprehension of observations is the essence of situational awareness.
Topic Since information extracted from router or switch interfaces.docxjuliennehar
Topic Since information extracted from router or switch interfaces to not provide specific evidence of a particular crime in most cases, what use is the information collected from these devices.
Read and respond to atleast two other students Discussions. (5-6 lines would be more sufficient)
#1.Posted by Srikanth
Routers and switches give the availability, both inside the demilitarized Zone (DMZ) environment and to different tareas of the system to which the DMZ is connected. This makes Routers and switches prime targets for hackers to exploit and gather data about the system or just use as springboards on other devices. This section presents data on the best way to information and arrange some significant router and switch security includes that enable run safely and ensure the devices that they associate. Routers direct traffic all through the undertaking system and are normally the first line of barrier when the system is associating with the Internet. Hackers try to infiltrate routers to gather data or use them as launching pads for further attacks. This is the reason it is critical to secure switches' management interfaces and services to make them trouble for an interloper to hack. Similarly as with routers, switches have an expanding job in system security. The switch gives numerous highlights, including port security. VLANs and PVLANs give the tools to keep the devices on the DMZ secure. It is additionally imperative to secure the switch's management interfaces and services with the goal that hackers can't break into the switch to change VLAN designs, change port settings, or utilize the switch to connect with different parts of the network.
Network forensics is capture, recording and analysis of network packets in order to determine the source of network security attacks. The major goal of network forensics is to collect evidence. It tries to analyze network traffic data, which is collected from different sites and different network equipment, such as firewalls and IDS. In addition, it monitors on the network to detect attacks and analyze the nature of attackers. Network forensics is also the process of detecting intrusion patterns, focusing on attacker activity.
Computer documents, emails, text and instant messages, transactions, images and Internet histories are examples of information that can be gathered from electronic devices and used very effectively as evidence. For example, mobile devices use online-based based backup systems, also known as the “cloud”, that provide forensic investigators with access to text messages and pictures taken from a particular phone. These systems keep an average of 1,000–1,500 or more of the last text messages sent to and received from that phone.In addition, many mobile devices store information about the locations where the device traveled and when it was there. To gain this knowledge, investigators can access an average of the last 200 cell locations accessed by a mobile device. Satellite navig ...
Disaster Risk Management in the Information Ageglobal
International Day for Disaster Reduction at the World Bank
Disaster Risk Management in the Information Age
A joint training workshop by GICT, GFDRR, infoDev and LCSUW to mark the International Day for Disaster Reduction
Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...Hamad Al Katheri
HOME LAND alert for a probable attack
"A medium priority incident may affect public health or safety, national security, economic security, foreign relations, civil liberties, or public confidence."
TOTEM: Threat Observation, Tracking, and Evaluation ModelJohn Gerber
Merriam-Webster defines a totem as any supposed entity that watches over or assists a group of people, such as a family, clan, or tribe. In this presentation I will focus on how TOTEM assists in watching over and evaluating the threat an IP represents. The idea behind TOTEM is simple: compare threat information from sources such as watchlists (DShield, Emerging Threats, SenderBase, etc.) to activities with the organization (IDS/IPS, flow logs, etc.) and other locations (SANS ISC, DOE federated model, etc.). As new threat information and activity sources are added, a better evaluation can be rendered.
DoS Forensic Exemplar Comparison to a Known SampleCSCJournals
The investigation of any event or incident often involves the evaluation of physical evidence. Occasionally, a comparison is conducted between an evidentiary sample of unknown origin and that of an appropriate known sample. In a Denial of Service (DoS) attack, items of evidentiary value may cross the spectrum from anecdotes to useful information in firewall logs or complete packet captures. Because of the spoofed or reflective nature of DoS attacks, relevant information leading to the direct identification of the perpetrator is rarely available. In many instances, this underscores the significance of the investigator's ability to accurately identify the tool utilized by the suspect. For a DoS attack scenario, this would likely involve a commercially available stresser or criminal bot infrastructure. In this paper, we propose the concept of a DoS exemplar and determine if the comparison of evidentiary samples to an appropriate known sample of DoS attributes could add value in the investigative process. We also provide a simple tool to compare two DoS flows.
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...Nexgen Technology
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
Connecting the Next Billion Devices to the Internet - Standards and ProtocolsSteve Ray
Presentation delivered at the IoTx Expo in Dubai, June 2015
Evolution of protocols and standards for the Internet of Things.
Why standards designed for different verticals need to interoperate to deliver business value.
How to avoid creating silos that will make bridging applications across different verticals challenging.
A secure network forensics system for cyber incidents analysisSwapnil Jagtap
Network forensics is the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents. (The term, attributed to firewall expert Marcus Ranum is borrowed from the legal and criminology fields where forensics pertains to the investigation of crimes.) According to Simson Garnkel, author of several books on security, network forensics systems can be one of two kinds.
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
this report is about how network security and privacy security works on Wireless and Wired system.It is also contain encryption method for network security and privacy.
Collecting and analyzing network-based evidenceCSITiaesprime
Since nearly the beginning of the Internet, malware has been a significant deterrent to productivity for end users, both personal and business related. Due to the pervasiveness of digital technologies in all aspects of human lives, it is increasingly unlikely that a digital device is involved as goal, medium or simply ‘witness’ of a criminal event. Forensic investigations include collection, recovery, analysis, and presentation of information stored on network devices and related to network crimes. These activities often involve wide range of analysis tools and application of different methods. This work presents methods that helps digital investigators to correlate and present information acquired from forensic data, with the aim to get a more valuable reconstructions of events or action to reach case conclusions. Main aim of network forensic is to gather evidence. Additionally, the evidence obtained during the investigation must be produced through a rigorous investigation procedure in a legal context.
The Internet of Things (IoT) includes huge quantities of things across all industries, these slides are things about buildings stored in computers, and the semantics of architecture
Most large buildings include a special keybox for the fire department to have access to all parts of the building in the event of an emergency. This slide show is a scenario with similar concept but for digital access.
Presentation to the National Emergency Number Association (NENA) to include building information in Next Generation 9-1-1. Content includes an overview of standards and a data architecture that would work.
Understanding the Challenges of Street ChildrenSERUDS INDIA
By raising awareness, providing support, advocating for change, and offering assistance to children in need, individuals can play a crucial role in improving the lives of street children and helping them realize their full potential
Donate Us
https://serudsindia.org/how-individuals-can-support-street-children-in-india/
#donatefororphan, #donateforhomelesschildren, #childeducation, #ngochildeducation, #donateforeducation, #donationforchildeducation, #sponsorforpoorchild, #sponsororphanage #sponsororphanchild, #donation, #education, #charity, #educationforchild, #seruds, #kurnool, #joyhome
This session provides a comprehensive overview of the latest updates to the Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (commonly known as the Uniform Guidance) outlined in the 2 CFR 200.
With a focus on the 2024 revisions issued by the Office of Management and Budget (OMB), participants will gain insight into the key changes affecting federal grant recipients. The session will delve into critical regulatory updates, providing attendees with the knowledge and tools necessary to navigate and comply with the evolving landscape of federal grant management.
Learning Objectives:
- Understand the rationale behind the 2024 updates to the Uniform Guidance outlined in 2 CFR 200, and their implications for federal grant recipients.
- Identify the key changes and revisions introduced by the Office of Management and Budget (OMB) in the 2024 edition of 2 CFR 200.
- Gain proficiency in applying the updated regulations to ensure compliance with federal grant requirements and avoid potential audit findings.
- Develop strategies for effectively implementing the new guidelines within the grant management processes of their respective organizations, fostering efficiency and accountability in federal grant administration.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Presentation by Jared Jageler, David Adler, Noelia Duchovny, and Evan Herrnstadt, analysts in CBO’s Microeconomic Studies and Health Analysis Divisions, at the Association of Environmental and Resource Economists Summer Conference.
ZGB - The Role of Generative AI in Government transformation.pdfSaeed Al Dhaheri
This keynote was presented during the the 7th edition of the UAE Hackathon 2024. It highlights the role of AI and Generative AI in addressing government transformation to achieve zero government bureaucracy
A process server is a authorized person for delivering legal documents, such as summons, complaints, subpoenas, and other court papers, to peoples involved in legal proceedings.
What is the point of small housing associations.pptxPaul Smith
Given the small scale of housing associations and their relative high cost per home what is the point of them and how do we justify their continued existance
1. FACILITY STANDARDS and NIEM
National Information Exchange Model (NIEM) Business Architecture Committee 21-22 July 2009
Deborah L. MacPherson Specifications and Research, Cannon Design, NBIMS
Ad-hoc Multihop by the University of Aachen
Communication and Distributed Systems Department
2. First Heard of
NIEM through
NIST ~ wonder
What fills in:
Building
UsageText ?
Building Type -
Description ?
Image courtesy Scott Parker IJIS, Data Elements Resolution Effort
3. 11 00 00 00 nc:FacilityType
A data type for a building, place, or structure that
provides a particular service.
11 00 00 00 nc:FacilityIdentification / Type An identification assigned to a facility.
nc:FacilityAssociation / Type A data type for an association between facilities.
nc:FacilityDocumentAssociation / Type An association between a facility and a document
nc:FacilityImageAssociation / Type An association between a facility and an image
34 00 00 00 nc:FacilityOrganizationAssociation / Type
An association between a facility and an
organization
34 00 00 00 nc:OrganizationOperatesFacilityAssociation / Type
34 00 00 00
nc:OrganizationSupervisesFacilityAssociation /
Type
34 00 00 00 nc:FacilityPersonAssociation / Type
nc:PersonResidesAtFacilityAssociation / Type
nc:PersonWorksAtFacilityAssociation / Type
11 00 00 00 nc:FacilityName / Type A name of a facility
11 00 00 00
nc:FacilityCategoryText / nc:
TextType A kind of facility
11 17 00 00
nc:FacilityCommercialIndicator /
niem-xsd:boolean
True if a facility is for commercial purpose; false
otherwise
nc:FacilityLocation / nc:
LocationType
34 00 00 00
nc:FacilityContactInformation /
nc:ContactInformationType A method of contact for a facility
First Step: NIEM Facility Subset Extraction
4. 11 00 00 00nc:FacilityType
A data type for a building, place, or structure that
provides a particular service.
11 00 00 00nc:FacilityIdentification / Type An identification assigned to a facility.
nc:FacilityAssociation / Type A data type for an association between facilities.
nc:FacilityDocumentAssociation /
Type An association between a facility and a document
nc:FacilityImageAssociation /
Type An association between a facility and an image
34 00 00 00
nc:
FacilityOrganizationAssociation /
Type
An association between a facility and an
organization
34 00 00 00
nc:
OrganizationOperatesFacilityAss
ociation / Type
34 00 00 00
nc:
OrganizationSupervisesFacilityAs
sociation / Type
34 00 00 00
nc:FacilityPersonAssociation /
Typenc:
PersonResidesAtFacilityAssociati
on / Typenc:
PersonWorksAtFacilityAssociatio
n / Type
11 00 00 00nc:FacilityName / Type A name of a facility
11 00 00 00
nc:FacilityCategoryText / nc:
TextType A kind of facility
11 17 00 00
nc:FacilityCommercialIndicator /
niem-xsd:boolean
True if a facility is for commercial purpose; false
otherwise
nc:FacilityLocation / nc:
LocationType
34 00 00 00
nc:FacilityContactInformation /
nc:ContactInformationType A method of contact for a facility
OmniClass Table 11 could work in NIEM
5. I believe the simple answer to Deborah's question is
certainly "YES." OmniClass codes for buildings and
facilities could easily fit into NIEM. All we really need
are the unique code values, definitions for each, and
the name for the data type that will carry these
enumerations (the codes).
Question Reference #090526-000000
---------------------------------------------------------------
Product Level 1: NIEM
Category Level 1: Technical Questions
Category Level 2: Model Structure
Category Level 3: Namespaces
Date Created: 05/26/2009 09:43 AM
Last Updated: 05/26/2009 11:25 AM
Status: Escalated
7. 11 00 00 00 nc:FacilityType
11 00 00 00 nc:FacilityIdentification / Type
nc:FacilityAssociation / Type
nc:FacilityDocumentAssociation /
Type
nc:FacilityImageAssociation /
Type
34 00 00 00
nc:
FacilityOrganizationAssociation /
Type
34 00 00 00
nc:
OrganizationOperatesFacilityAss
ociation / Type
34 00 00 00
nc:
OrganizationSupervisesFacilityAs
sociation / Type
34 00 00 00
nc:FacilityPersonAssociation /
Type
11 00 00 00nc:FacilityName / Type
11 00 00 00
nc:FacilityCategoryText / nc:
TextType
11 17 00 00
nc:FacilityCommercialIndicator /
niem-xsd:boolean
nc:FacilityLocation / nc:
LocationType
34 00 00 00
nc:FacilityContactInformation /
nc:ContactInformationType
Census OnTheMap could work in NIEM
Namespace
Prefix: census
URI: http://niem.gov/niem/census/2.0
Schema Location: http://niem.gov/niem/census/2.0/census.xsd
nc:
PersonResidesAtFacilityAssociation /
Type
nc:PersonWorksAtFacilityAssociation
/ Type
8. GML has a place in NIEM
Namespace
Prefix: gml
URI: http://niem.gov/niem/external/ogc-gml/3.1.1/dhs-gmo/1.0.0
Schema Location: http://niem.gov/niem/external/ogc-gml/3.1.1/dhs-gmo/1.0.0/gml.xsd
Description: A profile of Geography Markup Language (GML) version 3.1.1 schemas for niem. See http://www.
opengeospatial.org for documentation, http://schemas.opengis.net/gml/ for schemas./
9. EDXL has a place in NIEM
Namespace
Prefix: edxl
URI: http://niem.gov/niem/edxl/2.0
Schema Location: http://niem.gov/niem/edxl/2.0/edxl.xsd
Description: Emergency Data Exchange Language
Types in Namespace
edxl:ContentCategoryCodeSimpleType
edxl:ContentCategoryCodeType
edxl:ResponseCodeSimpleType
edxl:ResponseCodeType
Namespace
Prefix: de
URI: urn:oasis:names:tc:emergency:EDXL:DE:1.0
Schema Location: http://niem.gov/niem/external/de/1.0/de.xsd
Description: This Distribution Element specification describes a standard
message distribution framework for data sharing among emergency
information systems using the XML-based Emergency Data Exchange
Language (EDXL). This format may be used over any data transmission
system, including but not limited to the SOAP HTTP binding.
Namespace
Prefix: edxl-cap
URI: http://niem.gov/niem/edxl-cap/2.0
Schema Location: http://niem.gov/niem/edxl-cap/2.0/edxl-cap.xsd
Description: Common Alerting Protocol
10. Data Owner Metadata has a place in NIEM
Agency ID
Data Item ID
Data Item Status
Persons Full Name
System ID
Organization name
Contact Details Text
Dissemination Criteria Text
Data Submitter Metadata has a place in NIEM
Contact Details Text
Organization Name
Persons Full Name
System ID
Agency ID
Exchange Metadata has a Placeholder
11. Try Facility Exchanges Using NBIMS Hierarchy
Note: Move through
the next 12 slides
quickly
15. that is undergoing renovation. Contractors left out some vapor-producing chemicals that
have ignited after-hours, producing a small explosion and starting a fire.
18. The fire panel generates a Common Alerting Protocol CAP alert
CAP has a place
in NIEM
Namespace
Prefix: cap
URI: urn:oasis:names:tc:emergency:cap:1.1
Schema Location: http://niem.gov/niem/external/cap/1.1/cap.xsd
Description: Common Alerting Protocol (CAP) is a simple but general format for exchanging effective warning messages based
on best practices identified in academic research and real-world experience.
19. The alert is then passed to the subscribing central station alarm (CSA) company
Demonstrated in
Richmond VA
Milestone Reached in Alarm Data Transmission
Successful Conversion to National Information Exchange Model
The Public Safety Data Interoperability (PSDI) Program announces the
successful conversion of the External Alarm Interface Information Exchange
Packet Documentation (IEPD) to the National Information Exchange Model
(NIEM) Version 2.0. NIEM is designed to develop, disseminate, and support
information sharing standards and processes across the whole of the public
safety, justice, emergency and disaster management, intelligence, and
homeland security enterprise at all levels and across all branches of
government. The PSDI program and the IEPD conversion project were funded
by the Bureau of Justice Assistance, US Department of Justice. The PSDI program
is co-managed by the IJIS Institute and the Association of Public-Safety
Communications Officials (APCO) International.
The External Alarm IEPD has been in development since 2004, and has been
tested extensively through partnerships with APCO International, York County,
Virginia, Emergency Communications Division, City of Richmond, Virginia,
Department of Information Technology and Richmond Police Department’s Division
of Emergency Communications, the Central Station Alarm Association (CSAA), and
Vector Security.
The purpose of the External Alarm Interface IEPD is to provide a standard
data exchange for electronically transmitting information between an Alarm
Monitoring Company and a Public Safety Answering Point (PSAP). There are
three primary uses for this IEPD: initial notification of an alarm event, bi-
directional update of status between an alarm monitoring company and the
PSAP, and bi-directional update of other events between an alarm monitoring
company and a PSAP. The upgrade of the exchange from the Global Justice
Data XML Model (GJXDM), a reference model for the exchange of information
within public safety and justice communities, to NIEM 2.0 enables the
emergency communications community to more easily adopt NIEM as a
national data exchange standard.
24. The CSA representative then immediately transmits these two alerts to 9-1-1 dispatch
electronically, with both CAP alerts grouped together in a message. The 9-1-1 dispatch center
receives the CAP alerts with data fields from the message loaded into form fields
Progress Stopped
25.
26.
27. Define 3 Levels of Detail
1. Public Data
Example: Address
Google Maps
2) Inside the Building
Owner coordination with
local Authorities Having
Jurisdiction (AHJ) Example:
Fire and Police
Departments
3) Full connections to NG9-1-1
Agency wide, nationwide
planning/coordination
Example: Which jail was the
prisoner taken to?
Slides for NIEM .
Seminar organized by Jim Pingel
Meeting held at
Can NIEM be used by an organization to harmonize data and standardize naming conventions for a logical data model not only regarding outside data transfers but within the individual entity itself
At the minimum, you need to consider your information exchange requirements as a proper subset of your future state enterprise information architecture. While considering national standards, I think it's important to add that your own unique enterprise requirements need to "drive the show" and take precedence where applicable -- in that we can't sacrafice an important enterprise information requirement, at the expense of NIEM standardization.
Mitchell Ummel
Owner and President/CEO, UmmelGroup International, Inc.
______________
a) You can take any schema import it into a template and then use the Tools / Create dictionary to make NIEM-style dictionaries. b) You can run the Template Evalution tool to apply NIEM-style NDR rules to check your names and type definitions for conformance. c) You can use the Renamer utility to rename everything to NIEM conformance. d) You can import an XSD of a data model from a tool such as ERwin - build a generic template of all those entities and then check your namings and types in the model and create dictionary from that.
David R.R. Webber
Enterprise Architect & Project Manager; CTO OpenVotingSolutions Inc; XML visionary; ebXML / NIEM & eBusiness advocate
______________
Data standardization for an external information exchange or external service interface architecture (NIEM) needs to be distinguished from an internal enterprise data or information architecture that is a proper component of enterprise software systems architecture. NIEM IEPDs standardize the external data interfaces as well as help to provide some lifecycle process methodology for external system exchanges that is often lacking at many organizations not focussed on IT systems as their primary mission. James Otis
Systems Engineer at Z-Otis Associates Inc.
Following is a use case scenario of a building fire incident and covers alert generation and propagation to dispatch followed by the first responder use of building data.
Global Office locations, Gary McLeod and Liz Chodosh for BIMForum
http://www.bimforum.org/
Country2008 Census PopulationTypeMunicipalityState / ProvinceZip BuildingsEmergency (Typ. Fire)Public Safety (Typ. Police)USA 1609,023CityBostonMass.02114Inspection ServicesCity of Boston Fire DepartmentCity of Boston Police DepartmentCity of Boston Maps GISEmergency Medical ServicesB-SMART InitiativeHousing AuthorityEmergency Preparedness Redevelopment Authority Water and Sewer Commission Public Health Commission Zoning USA 18,363,710CityNew York CityNew York10017Dept of BuildingsFDNYNYPDUSA 216,626,000MetroNew York City MetroBuildings Information SystemOffice of Emergency ManagementPublic Safety Answering CenterNYCityMap GIS Dept. of IT and Telecomm.Citywide Incident Management SystemFaçade Law EnforcementDepartment of (Building) InvestigationsIncident Monitoring Buildings Enforcement Safety TeamField Operations Buildings Special Investigations UnitVehicles Certificate of Occupancy OfficeEmergency Operations Center Construction InspectionsPublic Information LandmarksRecovery and Relief Elevator, Escalator, Amusement Rides Environmental Control Plan Examination Special Projects Waterfront Permitting Landmarks Property Information Zoning USA 1636,919CityBaltimore Maryland 21201Permits & Building InspectionsCity of Baltimore Fire DepartmentCity of Baltimore Police DepartmentUSA 2785,618CountyBaltimore CountyEnterprise Geographic Information System Office of the Fire MarshallCriminal Justice DepartmentPlanningOffice of Emergency Management Zoning
Try an exercise, similar to Golden Gate Safety Network's Common Operating Picture, or Onuma Planning System BIM storm