The document proposes a Technological Framework for Safe and Secure Cities (TFSSC) to address homeland security threats. The framework includes:
1. Command and control centers to integrate different data feeds and coordinate emergency response.
2. Interception systems to monitor communications and gather intelligence.
3. A city-based video surveillance system to provide video evidence.
4. A TETRA radio network for secure digital police communication.
5. Geospatial technology to provide mapping and situational awareness.
6. An ERP system and database integration to share information across departments.
7. Training programs to improve managerial response to security threats.
This summary cloud security survey from Intel captures key findings from 800 IT managers in the U.S., the U.K., China, and Germany that provide insight into cloud computing security concerns and how those concerns might be alleviated.
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
When you think of Information Technology (IT) and Operational Technology (OT), which side are you on? You may not feel that you fall on any side of that technological skirmish, but when you stop to carefully consider the differences in these two disciplines, it is nearly impossible to avoid a tendentious leaning.
However, the time may be upon us when the conflicts of IT and OT will be put to rest for the broader purpose of making businesses more agile, efficient, resilient and ultimately, more profitable. We spoke with experts in the field who offered their insights about the challenges facing IT and OT convergence. Here’s what they shared!
This summary cloud security survey from Intel captures key findings from 800 IT managers in the U.S., the U.K., China, and Germany that provide insight into cloud computing security concerns and how those concerns might be alleviated.
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
When you think of Information Technology (IT) and Operational Technology (OT), which side are you on? You may not feel that you fall on any side of that technological skirmish, but when you stop to carefully consider the differences in these two disciplines, it is nearly impossible to avoid a tendentious leaning.
However, the time may be upon us when the conflicts of IT and OT will be put to rest for the broader purpose of making businesses more agile, efficient, resilient and ultimately, more profitable. We spoke with experts in the field who offered their insights about the challenges facing IT and OT convergence. Here’s what they shared!
Timo Lehtimäen esitys "Suomen Erillisverkot Oy:n palvelut valtionhallinnolle" Valtion IT-palvelukeskuksen Tietoturvallisuuden kevätseminaarissa 20.3.2013.
It’s not enough that you drink water every day. You have to make sure it’s the adequate amount and it’s absolutely safe and clean. To be guaranteed about your everyday drinking water, it would be a good idea buy water filter here in Singapore or anywhere you might be in the world.
The latest statistics from WeChat place its monthly active users (MAU) at 700million, with audiences visiting the application upwards of 30 times per day.
While follower numbers for most brands continue to grow, the honeymoon appears to be over. Signs are starting to emerge that follower growth rates for brand accounts are slowing.
At the same time, the government has started to apply pressure to regulate H5 apps built onto WeChat. And Tencent itself is applying greater control over brand activities.
Brands will have to employ more effective content strategies on WeChat moving forward. In this presentation we share our tips to help brands continue to grow by attracting/retaining audiences on WeChat.
Team research paper and project on network vulnerabilities with multiple attacks and defesnses:
Cybersecurity
-For this project, our class was paired with teams to attempt to find vulnerabilities in other teams networks and to successfully beach their network.
-My role in this group was to help breach other team vulnerabilities through different attacks like responder attacks, honeypots, etc.
-The main challenges of this project were trying to find the vulnerabilities successfully, as the whole team had troubles with each of our different attacks and defenses.
-We learned how to use cybersecurity tools to help find vulnerabilities in networks and how to protect against them better. For example, in the honeypot we used we deployed it to port 80, when the attacker tried to access our fake server we were notified. We also deployed palto alto firewall to create our private and secure network. For an attack, we also used password crackers like john the ripper. This project taught us how to breach networks as a team.
Hyperparameters optimization XGBoost for network intrusion detection using CS...IAESIJAI
With the introduction of high-speed internet access, the demand for security and dependable networks has grown. In recent years, network attacks have gotten more complex and intense, making security a vital component of organizational information systems. Network intrusion detection systems (NIDS) have become an essential detection technology to protect data integrity and system availability against such attacks. NIDS is one of the most well-known areas of machine learning software in the security field, with machine learning algorithms constantly being developed to improve performance. This research focuses on detecting abnormalities in societal infiltration using the hyperparameters optimization XGBoost (HO-XGB) algorithm with the Communications Security Establishment-The Canadian Institute for Cybersecurity-Intrusion Detection System2018 (CSE-CICIDS2018) dataset to get the best potential results. When compared to typical machine learning methods published in the literature, HO-XGB outperforms them. The study shows that XGBoost outperforms other detection algorithms. We refined the HO-XGB model's hyperparameters, which included learning_rate, subsample, max_leaves, max_depth, gamma, colsample_bytree, min_child_weight, n_estimators, max_depth, and reg_alpha. The experimental findings reveal that HO-XGB1 outperforms multiple parameter settings for intrusion detection, effectively optimizing XGBoost's hyperparameters.
Disaster Risk Management in the Information Ageglobal
International Day for Disaster Reduction at the World Bank
Disaster Risk Management in the Information Age
A joint training workshop by GICT, GFDRR, infoDev and LCSUW to mark the International Day for Disaster Reduction
Presentation given by Purushottam Sharma, IG of Police, SCRB, Madhya Pradesh on August 2nd, 2011 at eWorld Forum (www.eworldforum.net) in the session Public Safety, Security and Disaster Management
Timo Lehtimäen esitys "Suomen Erillisverkot Oy:n palvelut valtionhallinnolle" Valtion IT-palvelukeskuksen Tietoturvallisuuden kevätseminaarissa 20.3.2013.
It’s not enough that you drink water every day. You have to make sure it’s the adequate amount and it’s absolutely safe and clean. To be guaranteed about your everyday drinking water, it would be a good idea buy water filter here in Singapore or anywhere you might be in the world.
The latest statistics from WeChat place its monthly active users (MAU) at 700million, with audiences visiting the application upwards of 30 times per day.
While follower numbers for most brands continue to grow, the honeymoon appears to be over. Signs are starting to emerge that follower growth rates for brand accounts are slowing.
At the same time, the government has started to apply pressure to regulate H5 apps built onto WeChat. And Tencent itself is applying greater control over brand activities.
Brands will have to employ more effective content strategies on WeChat moving forward. In this presentation we share our tips to help brands continue to grow by attracting/retaining audiences on WeChat.
Team research paper and project on network vulnerabilities with multiple attacks and defesnses:
Cybersecurity
-For this project, our class was paired with teams to attempt to find vulnerabilities in other teams networks and to successfully beach their network.
-My role in this group was to help breach other team vulnerabilities through different attacks like responder attacks, honeypots, etc.
-The main challenges of this project were trying to find the vulnerabilities successfully, as the whole team had troubles with each of our different attacks and defenses.
-We learned how to use cybersecurity tools to help find vulnerabilities in networks and how to protect against them better. For example, in the honeypot we used we deployed it to port 80, when the attacker tried to access our fake server we were notified. We also deployed palto alto firewall to create our private and secure network. For an attack, we also used password crackers like john the ripper. This project taught us how to breach networks as a team.
Hyperparameters optimization XGBoost for network intrusion detection using CS...IAESIJAI
With the introduction of high-speed internet access, the demand for security and dependable networks has grown. In recent years, network attacks have gotten more complex and intense, making security a vital component of organizational information systems. Network intrusion detection systems (NIDS) have become an essential detection technology to protect data integrity and system availability against such attacks. NIDS is one of the most well-known areas of machine learning software in the security field, with machine learning algorithms constantly being developed to improve performance. This research focuses on detecting abnormalities in societal infiltration using the hyperparameters optimization XGBoost (HO-XGB) algorithm with the Communications Security Establishment-The Canadian Institute for Cybersecurity-Intrusion Detection System2018 (CSE-CICIDS2018) dataset to get the best potential results. When compared to typical machine learning methods published in the literature, HO-XGB outperforms them. The study shows that XGBoost outperforms other detection algorithms. We refined the HO-XGB model's hyperparameters, which included learning_rate, subsample, max_leaves, max_depth, gamma, colsample_bytree, min_child_weight, n_estimators, max_depth, and reg_alpha. The experimental findings reveal that HO-XGB1 outperforms multiple parameter settings for intrusion detection, effectively optimizing XGBoost's hyperparameters.
Disaster Risk Management in the Information Ageglobal
International Day for Disaster Reduction at the World Bank
Disaster Risk Management in the Information Age
A joint training workshop by GICT, GFDRR, infoDev and LCSUW to mark the International Day for Disaster Reduction
Presentation given by Purushottam Sharma, IG of Police, SCRB, Madhya Pradesh on August 2nd, 2011 at eWorld Forum (www.eworldforum.net) in the session Public Safety, Security and Disaster Management
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
A presentation given in April 2019 in London during ICS Cyber Security Conference. I discuss an anonymized investigation conducted by our team to identify a real malware infection on a production network, the tools and techniques used to contain this threat and how to use threat intelligence and visibility to stay ahead of cyber adversaries.
Asset visibility and network baselining
Continuous network monitoring
Threat intelligence ingestion
Thorough incident response plans
Similar to HLS Perspective, Safer cities for a better tomorrow (20)
My article on Smart Policing Published In Express Computer, Jan '16 Edition, where i have covered Emerging Technologies for Better Policing and Technologies for Safe Cities in depth.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
HLS Perspective, Safer cities for a better tomorrow
1.
2.
3.
4.
5. Safer Cities For A Better
Tomorrow
Vulnerability Assessment
Threats
• City Based Threats
• Organized Crime, Acts of TerrorCITY
• White Terror
• Large Amounts of Money LaunderingSTATE
•Destruction of Critical Infrastructure
Illegal landing of weaponry/merchandiseNATIONAL
6. Technological Framework for Safe and
Secure Cities (TFSSC)
Technol ogi cal Framework i nt ends t o be t he game changer
f or
Homel and Securi t y, provi di ng t he precursor t o generat i ng
t he
f unct i onal i t i es, t he out put of t he Homel and Securi t y
Syst em.
Lack of st andardi zat i on and uni f ormi t y of t echnol ogi cal
pl at f orms
has been t he maj or drawback. Thi s i s t he basi s of
creat i on of saf e and
7. Technological Framework for Safe
and Secure Cities(TFSSC)
Command and Control Center (CCC)
Interception Systems (IS)
City Based Video Surveillance System (CBVSS)
TETRA Radio Network (TRN)
Geospatial Technology for HLS (GTHLS)
ERP Solution, RDBMS and Integration (ERI)
Managerial Response to War on Terror (MRWT)
8. Command & Control Centers
City based command and control centers
integrating all feeds, radio, text, audio, video, data,
images and graphics from different angles, through
a viable command and control center software,
creating in the process a state of art C4I command
and control center. It would have the capability to
handle the worst of the terror attacks and natural
disasters at one end and day to day responsive
policing at the other end.
9. Command and Control Center
Integrated Command Control Coordination And Communication Syst
10. Command and Control Center
Ci t y based command and cont r ol cent er s
i nt egr at i ng al l f eeds r adi o, audi o, vi deo, t ext ,
dat a, i mages and gr aphi cs f r om di f f er ent
channel s, t hr ough a vi abl e command and cont r ol
cent er sof t war e, cr eat i ng i n t he pr ocess a st at e
of ar t C4I command and cont r ol cent er . I t woul d
have t he capabi l i t y t o handl e wor st of t he
t er r or at t acks and nat ur al di sast er s at one end
and day t o day r esponsi ve pol i ci ng at t he ot her
end.
Command and Control centers
11. ALERT
Map Data Video Data Incident Data
PCR
a
Ambulance
C4i Operator
Fire
Response Task Completed
Procedure & Reports
Activated Incident Closed
Flow Command and control center - Incident
12. Interception Systems (IP)
The capability to monitor and penetrate into any mode of
communication and storage for the required suspected
information/data and the capability to analyze and
connect to our requirements on a real time basis is the
urgent need and utility of the Interception Systems which
needs to be put in place, upgraded or scaled up, as the
case may be.
13. Interception Systems
ReveaLinx Architecture
Data Servers Data Modelling and Analysis Investigation Presentation
Analyst 1 Case A
DB1
WorkstationDeploy
Applications
Presenter
Analyst 2
Develop Applications
DB2 Case
Delivery
Workstation Case B
Results Analyst 3Direct connection to Delivery
systems to retrieve data
Data
Files
ReveaLinks Presenter
Workstation
14. Mobile ILD Fixed Sat IP
Networks
Verba PSV
Mediation
Storage and Archival
Processing Demand & Speech
WS 1 WS 2 WS3 WS4 WS5 WS6 WS7 WS8
Mass Interception Architecture
Interception Systems
15. City Based Video Surveillance
System (CBVSS)
CBVSS has a proven track record for providing the best
information (Video footage) to the investigators of terror
attacks across the globe, Kasab, being the prime example
here. Technologically, way ahead of CCTV networks, with
video analytics in build into the system, it helps find
meaning in hours and hours of video footage, giving the
precise output and the connects the investigator is looking
for. A deterrent and a must for any big city.
17. System Management Protect the core
applications fromPolicy—Reputation—Identity
attack
Application Security
Protect the video
content from
Content Security misuse and
abuse
Network Security
Ensure no
attacks or
Endpoint Security malfunction in
the network
Self-Defending Network:
Ensure end
Best of Breed Security in a users cannot
abuse theSystems Approach
system
Secure access to Video Surveillance System
19. TETRA Radio Network (TRN)
TETRA telecommunications system takes the Police
Communication to the fully digital mode with a complete
integration of all communication gadgets and delivery of
high quality voice/data and other related outputs. TETRA
eludes India. In reality it is an excellent public safety
communication network, improves our response to War on
Terror, organized crime and disaster management.
20. Al l aut hor i t i es have t hei r own Vi r t ual Pr i vat e
Net wor k(VPN)
TETRA enables sharing of a common
infrastructure between all mission critical users
21. Geospatial Technology
for HLS (GTHLS)
Conventional inputs are unable to provide actionable data.
The map of today is geospatial imagery/information, the
third eye as it is nicknamed. Geospatial products and
intelligence are critical to planning, preparation and
response to terror attacks, natural & other disasters and
supports incident management. It is a great tool
for regulation, enforcement, monitoring and supervision.
22. Geospatial Technology provides enhanced
geospatial understanding of a facilities vulnerabilities
and thus speeds up detection and response time in the
event of a security breach
Rapid access to extensive data, displayed in a
geospatial medium helps protect critical assets and
infrastructure and ensures public safety
GEO Spatial Technology
24. ERP Solution, RDBMS
& Integration (ERI)
RDBMS is critical to the functioning of any organization
and ERP provides for populating the data on a real time
basis, bringing the complete functioning of the dept. on
the ERP, in Karnataka, the POLICE IT. Then integration of
the legacy systems with the ERP provides for the
functionalities with which the end users have been
accustomed for long, on a single sign in sign out concept.
25. How should we implement ERP systems
Obtain the right mix of people, processes and technology!!
ERP Solution
26. Managerial Response to War
on Terror (MRWT)
Gap anal ysi s shows a huge gap i n t he l earni ng,
ski l l s and at t i t ude of i nt ernal securi t y
managers whi ch ought t o be bri dged. The human
resources shoul d be bet t er t han t he t echni cal
syst emcreat ed and made f unct i onal . Ut i l i t y i s
how best we ut i l i ze. I nnovat i ve met hods
i ncl usi ve of out bound l earni ng needs t o
i ncul cat ed as a part of hi gh end t rai ni ng.
Change management i s t he most cri t i cal
component of our way f orward.
Prof essi onal i sml eadi ng t o gl obal l y
27. For each technology
A city based network
Integrated into a national
network for that technology
28. All technologies together
All technologies should
integrate into National
Homeland Security Resource
Base and Incident Management
System
29. All technologies together
All technologies should
integrate into National
Homeland Security Resource
Base and Incident Management
System
30. Base Document for HLS
can be the beginning
National Home Security
Blueprint
A resource for all!!!
31. Visit our Web site HLS –India. Com.
We owe it to every
Indian