SlideShare a Scribd company logo
1 of 18
Next Generation 9-1-1:
Examination of Information Security
  Management In Public Safety
    Communications Centers
             By Natalie J. Yardley

     A Thesis Presented in Partial Fulfillment
       of the Requirements for the Degree
                Master of Science

       University of Advancing Technology
                   March 2012
The Defense Presentation:
   Purpose
   Rationale and Background
   Research Questions
   Methodology
   Sample
   Study Findings
   Discussion of findings
   Recommendations
   What I learned
Purpose
   This study explores the current level of
    progress towards achieving compliance
    of NG-SEC or noncompliance.
Rationale and Background
   9-1-1 is a vital societal system.

   U.S. 9-1-1 systems are transforming
    from closed analog systems to open
    Internet-Protocol systems, known as
    Next Generation 9-1-1 (NG9-1-1).

   NG9-1-1 need exists.
Research Questions
 What are the Next Generation 9-1-1 security
  standards and policies?
 What percentage of agencies have Next
  Generation 9-1-1 status?
   What percentage of agencies are compliant
    or noncompliant?
   What are the obstacles and/or challenges for
    public safety answering points (PSAPs) that are
    not compliant with public safety communication
    information security standards
Methodology
   Mixed Method study:
    ◦ Literature Review (secondary data)
    ◦ Survey (primary data – to receive field
               perspective)
• Descriptive (no tests were performed)

• Exploratory

• Evaluation
Sample
•   225 agencies were sent surveys.

•   Agencies were stratified into three segments
    based on the population of their jurisdiction:
    ◦ Small (1-99,999)
    ◦ Medium (100,000-499,999)
    ◦ Large (500,00 or greater)

• 56 agencies responded to the survey.
Study Findings #1
   NENA has provided the national
    security standards and best practices
    for public safety answering points with
    the National Emergency Number
    Association (NENA) Security for Next-
    Generation 9-1-1 Standards(NG-
    SEC).
Study Findings #2
Study Findings #3
 None of the agencies reported Next
  Generation 9-1-1 status (all reported
  Wireless Phase II status) and
  therefore are not required to be
  compliant to NG-SEC.
 Regardless of no NG9-1-1 status, 7 of
  56 agencies were compliant with NG-
  SEC standards (1 large, 4 medium, 2
  small).
Study Findings #4
   Non-compliant obstacles/or
    challenges:
    ◦ Cost
    ◦ Time
    ◦ Staff Constraints
Discussion of Findings
   What are the NG9-1-1 information
    security management standards?
    ◦ National Emergency Number Association
      (NENA) Security for Next-Generation 9-1-1
      Standards (NG-SEC).
Discussion (continued)
   What amount of agencies have NG9-
    1-1?
    ◦ The 56 agencies that responded to the
      research study were not NG9-1-1 status.
Discussion (continued)
   What percent of agencies are
    compliant or noncompliant?
    ◦ 7 of 56 agencies were compliant with NG-
      SEC standards (1 large, 4 medium, 2
      small).
    ◦ None of the 56 responding agencies were
      NG9-1-1.
Discussion (continued)
   What are the obstacles and/or
    challenges for not being compliant
    with NG-SEC?
    ◦ Again, none are required to be compliant
      (none NG9-1-1), but agencies responded.
    ◦ Time, cost, and staff constraints were the
      most responses for agencies.
Recommendations
   A study that surveyed the entire public
    agency population and allowed a better
    comparison of large, medium, and small
    agencies would be beneficial.

   Examining more specific areas of
    compliance within the NENA Security for
    Next-Generation 9-1-1 standards, such
    as examining national or regional
    physical security, acceptable usage, or
    incident response policies.
Recommendations
(continued)
   Studies comparing compliance
    between agency size segments, rural
    verses metropolitan entities, or
    regional sections within the United
    States.

   Examine survey styles that work best
    with government and/or public safety
    entities to allow a higher response
    rate.
What I learned

   Technology is fast. Government is
    slow.

   This is only the beginning.

More Related Content

What's hot

iwatchjr | Next Generation Wearable for Young Generation
iwatchjr | Next Generation Wearable for Young Generationiwatchjr | Next Generation Wearable for Young Generation
iwatchjr | Next Generation Wearable for Young Generationiwatchjr
 
Some musings on evaluating the impacts of integrated systems research
Some musings on evaluating the impacts of integrated systems researchSome musings on evaluating the impacts of integrated systems research
Some musings on evaluating the impacts of integrated systems researchWater, Land and Ecosystems (WLE)
 
A Systematic Review of Model-Driven Security
A Systematic Review of Model-Driven SecurityA Systematic Review of Model-Driven Security
A Systematic Review of Model-Driven SecurityPhu H. Nguyen
 
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...Chamila Wijayarathna
 
Improved Security Detection & Response via Optimized Alert Output: A Usabilit...
Improved Security Detection & Response via Optimized Alert Output: A Usabilit...Improved Security Detection & Response via Optimized Alert Output: A Usabilit...
Improved Security Detection & Response via Optimized Alert Output: A Usabilit...Russ McRee
 
Use of Qualitative Approaches for Impact Assessments of Integrated Systems Re...
Use of Qualitative Approaches for Impact Assessments of Integrated Systems Re...Use of Qualitative Approaches for Impact Assessments of Integrated Systems Re...
Use of Qualitative Approaches for Impact Assessments of Integrated Systems Re...Water, Land and Ecosystems (WLE)
 
11 problem solving with sara
11 problem solving with sara11 problem solving with sara
11 problem solving with saraJim Gilmer
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring SecurityChris Mullins
 
Forecasting
ForecastingForecasting
Forecastingsumit235
 
Approaches to Preservation Storage Technologies
Approaches to Preservation Storage Technologies Approaches to Preservation Storage Technologies
Approaches to Preservation Storage Technologies Micah Altman
 
Kopcha Sullivan 2008 Reaction
Kopcha Sullivan 2008 ReactionKopcha Sullivan 2008 Reaction
Kopcha Sullivan 2008 Reactionnicolalritter
 

What's hot (13)

iwatchjr | Next Generation Wearable for Young Generation
iwatchjr | Next Generation Wearable for Young Generationiwatchjr | Next Generation Wearable for Young Generation
iwatchjr | Next Generation Wearable for Young Generation
 
Some musings on evaluating the impacts of integrated systems research
Some musings on evaluating the impacts of integrated systems researchSome musings on evaluating the impacts of integrated systems research
Some musings on evaluating the impacts of integrated systems research
 
A Systematic Review of Model-Driven Security
A Systematic Review of Model-Driven SecurityA Systematic Review of Model-Driven Security
A Systematic Review of Model-Driven Security
 
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
 
Impact evaluation an overview
Impact evaluation  an overviewImpact evaluation  an overview
Impact evaluation an overview
 
Improved Security Detection & Response via Optimized Alert Output: A Usabilit...
Improved Security Detection & Response via Optimized Alert Output: A Usabilit...Improved Security Detection & Response via Optimized Alert Output: A Usabilit...
Improved Security Detection & Response via Optimized Alert Output: A Usabilit...
 
Use of Qualitative Approaches for Impact Assessments of Integrated Systems Re...
Use of Qualitative Approaches for Impact Assessments of Integrated Systems Re...Use of Qualitative Approaches for Impact Assessments of Integrated Systems Re...
Use of Qualitative Approaches for Impact Assessments of Integrated Systems Re...
 
11 problem solving with sara
11 problem solving with sara11 problem solving with sara
11 problem solving with sara
 
AAIC_2016_Cognition_Kit_-_Online_v2
AAIC_2016_Cognition_Kit_-_Online_v2AAIC_2016_Cognition_Kit_-_Online_v2
AAIC_2016_Cognition_Kit_-_Online_v2
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring Security
 
Forecasting
ForecastingForecasting
Forecasting
 
Approaches to Preservation Storage Technologies
Approaches to Preservation Storage Technologies Approaches to Preservation Storage Technologies
Approaches to Preservation Storage Technologies
 
Kopcha Sullivan 2008 Reaction
Kopcha Sullivan 2008 ReactionKopcha Sullivan 2008 Reaction
Kopcha Sullivan 2008 Reaction
 

Viewers also liked

Thesis writing using apa format
Thesis writing using apa formatThesis writing using apa format
Thesis writing using apa formatBed Dhakal
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpointneha47
 
Thesis Power Point Presentation
Thesis Power Point PresentationThesis Power Point Presentation
Thesis Power Point Presentationriddhikapandya1985
 
MASTER'S THESIS DEFENSE PRESENTATION (Sept 16)
MASTER'S THESIS DEFENSE PRESENTATION (Sept 16)MASTER'S THESIS DEFENSE PRESENTATION (Sept 16)
MASTER'S THESIS DEFENSE PRESENTATION (Sept 16)Stacy Holton
 
Guestlecture Online & social media data, for masterstudents Business Administ...
Guestlecture Online & social media data, for masterstudents Business Administ...Guestlecture Online & social media data, for masterstudents Business Administ...
Guestlecture Online & social media data, for masterstudents Business Administ...Danny Oosterveer
 
Writing proposals
Writing proposalsWriting proposals
Writing proposalsVenu J S
 
Thesis Defence for Doctor of Information Science
Thesis Defence for Doctor of Information ScienceThesis Defence for Doctor of Information Science
Thesis Defence for Doctor of Information ScienceYuma Inoue
 
Online clinic reservation
Online clinic reservationOnline clinic reservation
Online clinic reservationMay Ann Mas
 
Developing A Blended Learning Strategy: Instructional Media & Pedagogical Con...
Developing A Blended Learning Strategy: Instructional Media & Pedagogical Con...Developing A Blended Learning Strategy: Instructional Media & Pedagogical Con...
Developing A Blended Learning Strategy: Instructional Media & Pedagogical Con...Jolly Holden
 
My Thesis Defense Presentation
My Thesis Defense PresentationMy Thesis Defense Presentation
My Thesis Defense PresentationOnur Taylan
 
Blended Learning PowerPoint
Blended Learning PowerPointBlended Learning PowerPoint
Blended Learning PowerPointdnoland
 
Thesis Defense Presentation
Thesis Defense PresentationThesis Defense Presentation
Thesis Defense Presentationosideloc
 
Dissertation oral defense presentation
Dissertation   oral defense presentationDissertation   oral defense presentation
Dissertation oral defense presentationDr. Naomi Mangatu
 
Powerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis DefencePowerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis DefenceCatie Chase
 
Masters Defense presentation
Masters Defense presentationMasters Defense presentation
Masters Defense presentationProyag Datta
 
Masters Thesis Defense Presentation
Masters Thesis Defense PresentationMasters Thesis Defense Presentation
Masters Thesis Defense Presentationprajon
 

Viewers also liked (18)

Thesis writing using apa format
Thesis writing using apa formatThesis writing using apa format
Thesis writing using apa format
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpoint
 
Thesis Power Point Presentation
Thesis Power Point PresentationThesis Power Point Presentation
Thesis Power Point Presentation
 
MASTER'S THESIS DEFENSE PRESENTATION (Sept 16)
MASTER'S THESIS DEFENSE PRESENTATION (Sept 16)MASTER'S THESIS DEFENSE PRESENTATION (Sept 16)
MASTER'S THESIS DEFENSE PRESENTATION (Sept 16)
 
Guestlecture Online & social media data, for masterstudents Business Administ...
Guestlecture Online & social media data, for masterstudents Business Administ...Guestlecture Online & social media data, for masterstudents Business Administ...
Guestlecture Online & social media data, for masterstudents Business Administ...
 
How to prepare_for_your_viva
How to prepare_for_your_vivaHow to prepare_for_your_viva
How to prepare_for_your_viva
 
Writing proposals
Writing proposalsWriting proposals
Writing proposals
 
Master thesis presentation
Master thesis presentationMaster thesis presentation
Master thesis presentation
 
Thesis Defence for Doctor of Information Science
Thesis Defence for Doctor of Information ScienceThesis Defence for Doctor of Information Science
Thesis Defence for Doctor of Information Science
 
Online clinic reservation
Online clinic reservationOnline clinic reservation
Online clinic reservation
 
Developing A Blended Learning Strategy: Instructional Media & Pedagogical Con...
Developing A Blended Learning Strategy: Instructional Media & Pedagogical Con...Developing A Blended Learning Strategy: Instructional Media & Pedagogical Con...
Developing A Blended Learning Strategy: Instructional Media & Pedagogical Con...
 
My Thesis Defense Presentation
My Thesis Defense PresentationMy Thesis Defense Presentation
My Thesis Defense Presentation
 
Blended Learning PowerPoint
Blended Learning PowerPointBlended Learning PowerPoint
Blended Learning PowerPoint
 
Thesis Defense Presentation
Thesis Defense PresentationThesis Defense Presentation
Thesis Defense Presentation
 
Dissertation oral defense presentation
Dissertation   oral defense presentationDissertation   oral defense presentation
Dissertation oral defense presentation
 
Powerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis DefencePowerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis Defence
 
Masters Defense presentation
Masters Defense presentationMasters Defense presentation
Masters Defense presentation
 
Masters Thesis Defense Presentation
Masters Thesis Defense PresentationMasters Thesis Defense Presentation
Masters Thesis Defense Presentation
 

Similar to Next Generation 9-1-1 Security Study

2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity SurveyAdobe
 
Applying a Systematic Review on Adaptive Security for DSPL
 Applying a Systematic Review on Adaptive Security for DSPL Applying a Systematic Review on Adaptive Security for DSPL
Applying a Systematic Review on Adaptive Security for DSPLcsandit
 
The intelligence community has not always learned the lessons of i.docx
The intelligence community has not always learned the lessons of i.docxThe intelligence community has not always learned the lessons of i.docx
The intelligence community has not always learned the lessons of i.docxcherry686017
 
Arj97 tolentino
Arj97 tolentinoArj97 tolentino
Arj97 tolentinoGBMV
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Emily Brady
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
Please read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxPlease read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxLeilaniPoolsy
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveyEdgar Alejandro Villegas
 
How To Optimize Your EDC Solution For Risk Based Monitoring
How To Optimize Your EDC Solution For Risk Based MonitoringHow To Optimize Your EDC Solution For Risk Based Monitoring
How To Optimize Your EDC Solution For Risk Based Monitoringwww.datatrak.com
 
Here are 4 discussion posts by class mates from the 495 class that.docx
Here are 4 discussion posts by class mates from the 495 class that.docxHere are 4 discussion posts by class mates from the 495 class that.docx
Here are 4 discussion posts by class mates from the 495 class that.docxpooleavelina
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Marcello Marchesini
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)PwC France
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-StudyTam Nguyen
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalSelectedPresentations
 
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESSTATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESIJCSES Journal
 
Census results
Census resultsCensus results
Census resultsJisc
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015Capgemini
 

Similar to Next Generation 9-1-1 Security Study (20)

2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey
 
Applying a Systematic Review on Adaptive Security for DSPL
 Applying a Systematic Review on Adaptive Security for DSPL Applying a Systematic Review on Adaptive Security for DSPL
Applying a Systematic Review on Adaptive Security for DSPL
 
The intelligence community has not always learned the lessons of i.docx
The intelligence community has not always learned the lessons of i.docxThe intelligence community has not always learned the lessons of i.docx
The intelligence community has not always learned the lessons of i.docx
 
Arj97 tolentino
Arj97 tolentinoArj97 tolentino
Arj97 tolentino
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
Please read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxPlease read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docx
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 
How To Optimize Your EDC Solution For Risk Based Monitoring
How To Optimize Your EDC Solution For Risk Based MonitoringHow To Optimize Your EDC Solution For Risk Based Monitoring
How To Optimize Your EDC Solution For Risk Based Monitoring
 
Here are 4 discussion posts by class mates from the 495 class that.docx
Here are 4 discussion posts by class mates from the 495 class that.docxHere are 4 discussion posts by class mates from the 495 class that.docx
Here are 4 discussion posts by class mates from the 495 class that.docx
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
 
when minutes counts
when minutes countswhen minutes counts
when minutes counts
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
 
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESSTATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
 
Census results
Census resultsCensus results
Census results
 
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, EthiopiaPresentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 

Recently uploaded

Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxgeorgebrinton95
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 

Next Generation 9-1-1 Security Study

  • 1. Next Generation 9-1-1: Examination of Information Security Management In Public Safety Communications Centers By Natalie J. Yardley A Thesis Presented in Partial Fulfillment of the Requirements for the Degree Master of Science University of Advancing Technology March 2012
  • 2. The Defense Presentation:  Purpose  Rationale and Background  Research Questions  Methodology  Sample  Study Findings  Discussion of findings  Recommendations  What I learned
  • 3. Purpose  This study explores the current level of progress towards achieving compliance of NG-SEC or noncompliance.
  • 4. Rationale and Background  9-1-1 is a vital societal system.  U.S. 9-1-1 systems are transforming from closed analog systems to open Internet-Protocol systems, known as Next Generation 9-1-1 (NG9-1-1).  NG9-1-1 need exists.
  • 5. Research Questions  What are the Next Generation 9-1-1 security standards and policies?  What percentage of agencies have Next Generation 9-1-1 status?  What percentage of agencies are compliant or noncompliant?  What are the obstacles and/or challenges for public safety answering points (PSAPs) that are not compliant with public safety communication information security standards
  • 6. Methodology  Mixed Method study: ◦ Literature Review (secondary data) ◦ Survey (primary data – to receive field perspective) • Descriptive (no tests were performed) • Exploratory • Evaluation
  • 7. Sample • 225 agencies were sent surveys. • Agencies were stratified into three segments based on the population of their jurisdiction: ◦ Small (1-99,999) ◦ Medium (100,000-499,999) ◦ Large (500,00 or greater) • 56 agencies responded to the survey.
  • 8. Study Findings #1  NENA has provided the national security standards and best practices for public safety answering points with the National Emergency Number Association (NENA) Security for Next- Generation 9-1-1 Standards(NG- SEC).
  • 10. Study Findings #3  None of the agencies reported Next Generation 9-1-1 status (all reported Wireless Phase II status) and therefore are not required to be compliant to NG-SEC.  Regardless of no NG9-1-1 status, 7 of 56 agencies were compliant with NG- SEC standards (1 large, 4 medium, 2 small).
  • 11. Study Findings #4  Non-compliant obstacles/or challenges: ◦ Cost ◦ Time ◦ Staff Constraints
  • 12. Discussion of Findings  What are the NG9-1-1 information security management standards? ◦ National Emergency Number Association (NENA) Security for Next-Generation 9-1-1 Standards (NG-SEC).
  • 13. Discussion (continued)  What amount of agencies have NG9- 1-1? ◦ The 56 agencies that responded to the research study were not NG9-1-1 status.
  • 14. Discussion (continued)  What percent of agencies are compliant or noncompliant? ◦ 7 of 56 agencies were compliant with NG- SEC standards (1 large, 4 medium, 2 small). ◦ None of the 56 responding agencies were NG9-1-1.
  • 15. Discussion (continued)  What are the obstacles and/or challenges for not being compliant with NG-SEC? ◦ Again, none are required to be compliant (none NG9-1-1), but agencies responded. ◦ Time, cost, and staff constraints were the most responses for agencies.
  • 16. Recommendations  A study that surveyed the entire public agency population and allowed a better comparison of large, medium, and small agencies would be beneficial.  Examining more specific areas of compliance within the NENA Security for Next-Generation 9-1-1 standards, such as examining national or regional physical security, acceptable usage, or incident response policies.
  • 17. Recommendations (continued)  Studies comparing compliance between agency size segments, rural verses metropolitan entities, or regional sections within the United States.  Examine survey styles that work best with government and/or public safety entities to allow a higher response rate.
  • 18. What I learned  Technology is fast. Government is slow.  This is only the beginning.