SlideShare a Scribd company logo
HOW TO PROTECT THE COMMON HERITAGE SITES WITH
LIMITED IMPACT IN THE SURVEILLANCE? A DYNAMIC
AND NOT INVASIVE SURVEILLANCE SYSTEM THROUGH
THE USE OF DRONES AND OTHER TOOLS FROM
MILITARY KNOWLEDGE.
Andrea Praitano, Giuseppe G. Zorzino
Cybersecurity commission, Ordine degli Ingegneri di Roma, Italy
andrea.praitano@gmail.com
zorteam@mclink.it
Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission29/11/2017 1
ABOUT THE AUTHORS
Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission29/11/2017 2
Author Co-Author
Chairman of the Hybrid
Cyber Warfare WG
Lieutenant on
leave
Major on leave
Member of the
Board
Member of the
Board
22301:2012
ANDREA PRAITANO GIUSEPPE G. ZORZINO
TABLE OF CONTENTS
1. Description of the type of common heritage sites
2. Main problems in the protection of sites
3. State of the art of the physical security in site
protection
4. Alternative/integrative tools
5. Possible dynamic and not invasive solutions based on
military tools
6. Conclusions
7. Questions and Answers
29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 3
+
TYPES OF COMMON HERITAGE SITES
29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 4
High number of sites. The tentative list of UNESCO talk about 1681 sites located in 177
different countries.
Source: http://whc.unesco.org/en
1/2
DESCRIPTION OF THE TYPE OF COMMON HERITAGE SITES
29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 5
Some examples in the centre of Italy
Source: http://whc.unesco.org/en
Etruscan Necropolises of
Cerveteri and Tarquinia
Italy - Provinces of Rome and
Viterbo, Region of Latium
Date of Inscription: 2004
Property: 326.93 ha
Buffer zone: 4,932.11 ha
Ref: 1158
Villa Adriana (Tivoli)
Italy - Provinces of Rome,
Region of Latium
Date of Inscription: 1999
Property: 80 ha
Buffer zone: 500 ha
Ref: 907
Villa d'Este, Tivoli
Italy - Provinces of Rome,
Region of Latium
Date of Inscription: 2001
Property: 4.5 ha
Buffer zone: 7 ha
Ref: 1025
2/2
MAIN PROBLEMS IN THE PROTECTION OF SITES
• The size of the site is a problem for the protection:
• Number of security’s end-points;
• High number of events (and false positive events!);
• Impact on the beauty and structure of the site:
• Low (or zero) impact;
• Number of security’s end points;
• Size of some security’s end points;
• Shape of typical security’s end points;
• Types and numbers of threats to the sites:
• Many different threats (voluntary and involuntary);
• From static attack scenario to dynamic scenarios;
• Costs of the site’s protection.
29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 6
THE PROCESS OF THE PROTECTION DESIGN
29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 7
Threats
analysis
Information
gathering and
definition of
attacks
scenarios
Definition of
protection
strategy
Tools’
identification
Set-up of the
protection
infrastructure
ALTERNATIVE/INTEGRATIVE TOOLS
• Thermal sensors;
• Infrared sensors;
• Movement sensors;
• Short Wave Infrared (SWIR) Night Vision
Cameras;
• Drones/UAV 4-6-8 rotors;
• Drones/UAV fixed wings;
• Ranger HDC MultiSensor;
• Illuminator;
• Radar;
• ……..
29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 8
1/2
ALTERNATIVE/INTEGRATIVE TOOLS
29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 9
Visible SWIR
Thermal SWIR
Flight autonomy: around 30’
Distance: 100 Km
Flight autonomy: around 90’
Distance: 100 ÷ 150 Km
Range: from 3 to 20 Km
2/2
SURVEILLANCE STRATEGY
A possible surveillance strategy with low environmental impact:
• A central control room;
• Boundary control through video camera and enclosures;
• Remote sensors (with low environmental impact) in the site;
• Permanent control through radar(s);
• Time driven control through drone(s) fixed wing;
• Event driven control through:
• Drone(s) multi rotors with camera, microphone and speaker;
• Private/public policeman.
29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 10
THE SITE
POSSIBLE DYNAMIC AND NOT INVASIVE SOLUTIONS
BASED ON MILITARY TOOLS - SCENARIO
29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 11
Thermal sensor
Movement sensor
IR sensor
ALARM
ALARM
PERIODIC CONTROL
Drone/UAV Fixed wing
Drone/UAV multi rotors
PERMANENT
CONTROL
POSSIBLE DYNAMIC AND NOT INVASIVE SOLUTIONS
BASED ON MILITARY TOOLS - ARCHITECTURE
29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 12
CONCLUSIONS
• The heritage sites have a lot of threats;
• The heritage sites have many environmental constraint;
• The modern attacks are mixed and dynamic;
• The modern technologies have a limits (e.g. flight time);
• It is possible use a mixed approach to protect the sites;
• …and respect the beauty of the sites!
29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 13
29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 14
29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 15
ING. ANDREA PRAITANO
andrea.praitano@gmail.com
@apraitano
+39 328 8122642
it.linkedin.com/in/andreapraitano/
Cybersecurity
commission
ING. GIUSEPPE G. ZORZINO
zorteam@mclink.it
+39 347 1872858
it.linkedin.com/in/zorzinogiuseppe/

More Related Content

What's hot

CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
Paheerathan Sabaratnam
 
Introduction to video security
Introduction to video securityIntroduction to video security
Introduction to video security
ymcknight1596
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
Paheerathan Sabaratnam
 
Ditek RM16NM Data Sheet
Ditek RM16NM Data SheetDitek RM16NM Data Sheet
Ditek RM16NM Data Sheet
JMAC Supply
 
CVI
CVICVI
Video surveillance
Video surveillanceVideo surveillance
Video surveillance
naresh_arthem
 
Public Awareness on Defense Against IEDs (Improvised Explosive Devices)
Public Awareness on Defense Against IEDs (Improvised Explosive Devices)Public Awareness on Defense Against IEDs (Improvised Explosive Devices)
Public Awareness on Defense Against IEDs (Improvised Explosive Devices)
Tariq Mahmood
 
Cctv surveillance system | Unisol
Cctv  surveillance system | UnisolCctv  surveillance system | Unisol
Cctv surveillance system | Unisol
Unisol Communications Pvt.Ltd.
 
CCTV camera by_osama_noori
CCTV camera by_osama_nooriCCTV camera by_osama_noori
CCTV camera by_osama_noori
Osama Noori
 
Perimeter control for prison
Perimeter control for prisonPerimeter control for prison
Perimeter control for prison
Hafiza Abas
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
Paheerathan Sabaratnam
 
Brochure videofied outdoor home business en
Brochure videofied outdoor  home business enBrochure videofied outdoor  home business en
Brochure videofied outdoor home business en
Ilias Varsamis
 
Cctv presentation
Cctv presentation Cctv presentation
Cctv presentation
ZakarieBashir
 
groundview-sentinel-v3
groundview-sentinel-v3groundview-sentinel-v3
groundview-sentinel-v3
Mark Cromwell
 
Cctv setup
Cctv setupCctv setup
Cctv setup
Tapan Khilar
 
Navy Cyber Defense Operations Command: Commander Task Force 1020
Navy Cyber Defense Operations Command: Commander Task Force 1020Navy Cyber Defense Operations Command: Commander Task Force 1020
Navy Cyber Defense Operations Command: Commander Task Force 1020
DLT Solutions
 
Cd213 percy-audiocodes
Cd213 percy-audiocodesCd213 percy-audiocodes
Cd213 percy-audiocodes
Tran Thanh
 
Security Technology Systems
Security Technology SystemsSecurity Technology Systems
Security Technology Systems
Julius T Chibanga
 
Whitepaper perimeter protection
Whitepaper perimeter protectionWhitepaper perimeter protection
Whitepaper perimeter protection
Axis Communications
 

What's hot (19)

CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
Introduction to video security
Introduction to video securityIntroduction to video security
Introduction to video security
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
Ditek RM16NM Data Sheet
Ditek RM16NM Data SheetDitek RM16NM Data Sheet
Ditek RM16NM Data Sheet
 
CVI
CVICVI
CVI
 
Video surveillance
Video surveillanceVideo surveillance
Video surveillance
 
Public Awareness on Defense Against IEDs (Improvised Explosive Devices)
Public Awareness on Defense Against IEDs (Improvised Explosive Devices)Public Awareness on Defense Against IEDs (Improvised Explosive Devices)
Public Awareness on Defense Against IEDs (Improvised Explosive Devices)
 
Cctv surveillance system | Unisol
Cctv  surveillance system | UnisolCctv  surveillance system | Unisol
Cctv surveillance system | Unisol
 
CCTV camera by_osama_noori
CCTV camera by_osama_nooriCCTV camera by_osama_noori
CCTV camera by_osama_noori
 
Perimeter control for prison
Perimeter control for prisonPerimeter control for prison
Perimeter control for prison
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
Brochure videofied outdoor home business en
Brochure videofied outdoor  home business enBrochure videofied outdoor  home business en
Brochure videofied outdoor home business en
 
Cctv presentation
Cctv presentation Cctv presentation
Cctv presentation
 
groundview-sentinel-v3
groundview-sentinel-v3groundview-sentinel-v3
groundview-sentinel-v3
 
Cctv setup
Cctv setupCctv setup
Cctv setup
 
Navy Cyber Defense Operations Command: Commander Task Force 1020
Navy Cyber Defense Operations Command: Commander Task Force 1020Navy Cyber Defense Operations Command: Commander Task Force 1020
Navy Cyber Defense Operations Command: Commander Task Force 1020
 
Cd213 percy-audiocodes
Cd213 percy-audiocodesCd213 percy-audiocodes
Cd213 percy-audiocodes
 
Security Technology Systems
Security Technology SystemsSecurity Technology Systems
Security Technology Systems
 
Whitepaper perimeter protection
Whitepaper perimeter protectionWhitepaper perimeter protection
Whitepaper perimeter protection
 

Similar to [Wef 2017] praitano v1.0

Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
Achu Anna
 
2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talk2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talk
James Atkinson
 
Drone Security and Surveillance Security Drone.pdf
Drone Security and Surveillance Security Drone.pdfDrone Security and Surveillance Security Drone.pdf
Drone Security and Surveillance Security Drone.pdf
Phoenix Protection Services
 
Beyond the Horizon: Exploring the Benefits of Drone-Assisted Roof Inspections
Beyond the Horizon: Exploring the Benefits of Drone-Assisted Roof InspectionsBeyond the Horizon: Exploring the Benefits of Drone-Assisted Roof Inspections
Beyond the Horizon: Exploring the Benefits of Drone-Assisted Roof Inspections
FALCON 3D
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
TI Safe
 
Protecting the manufacturing industry
Protecting the manufacturing industryProtecting the manufacturing industry
Protecting the manufacturing industry
Cybereason
 
Real Time Video Prosecution Unit
Real Time Video Prosecution UnitReal Time Video Prosecution Unit
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
African Cyber Security Summit
 
Securing Your Wearable Tech Brand
Securing Your Wearable Tech BrandSecuring Your Wearable Tech Brand
Securing Your Wearable Tech Brand
Simon Loe
 
Sogei2014 lisi v01
Sogei2014 lisi v01Sogei2014 lisi v01
Sogei2014 lisi v01
Marco Lisi
 
Wi-Fi Sensing: Attack on Privacy & Countermeasures
Wi-Fi Sensing: Attack on Privacy & CountermeasuresWi-Fi Sensing: Attack on Privacy & Countermeasures
Wi-Fi Sensing: Attack on Privacy & Countermeasures
Speck&Tech
 
Group no-03-2
Group no-03-2Group no-03-2
Group no-03-2
MdArifulIslam881241
 
WI-GIM Life: Wireless Sensor Network for Ground Instability Monitoring. The t...
WI-GIM Life: Wireless Sensor Network for Ground Instability Monitoring. The t...WI-GIM Life: Wireless Sensor Network for Ground Instability Monitoring. The t...
WI-GIM Life: Wireless Sensor Network for Ground Instability Monitoring. The t...
ICGCat
 
Coal Mine Safety Monitoring and Alerting System
Coal Mine Safety Monitoring and Alerting SystemCoal Mine Safety Monitoring and Alerting System
Coal Mine Safety Monitoring and Alerting System
IRJET Journal
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
Fabio Pietrosanti
 
403 10
403 10403 10
ZONeSEC in ERNCIP
ZONeSEC in ERNCIPZONeSEC in ERNCIP
ZONeSEC in ERNCIP
José Ramón Martínez Salio
 
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
Iidss 2017 sarwono sutikno   arwin  sumari (cps in defense)Iidss 2017 sarwono sutikno   arwin  sumari (cps in defense)
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
 
Wireless-Sensor-Systems-Security-Implications-for-the-Industrial-Environment-...
Wireless-Sensor-Systems-Security-Implications-for-the-Industrial-Environment-...Wireless-Sensor-Systems-Security-Implications-for-the-Industrial-Environment-...
Wireless-Sensor-Systems-Security-Implications-for-the-Industrial-Environment-...
Rishabhkumar224575
 
Wireless Sensor Systems Security Implications for the Industrial Environment ...
Wireless Sensor Systems Security Implications for the Industrial Environment ...Wireless Sensor Systems Security Implications for the Industrial Environment ...
Wireless Sensor Systems Security Implications for the Industrial Environment ...
PawachMetharattanara
 

Similar to [Wef 2017] praitano v1.0 (20)

Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talk2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talk
 
Drone Security and Surveillance Security Drone.pdf
Drone Security and Surveillance Security Drone.pdfDrone Security and Surveillance Security Drone.pdf
Drone Security and Surveillance Security Drone.pdf
 
Beyond the Horizon: Exploring the Benefits of Drone-Assisted Roof Inspections
Beyond the Horizon: Exploring the Benefits of Drone-Assisted Roof InspectionsBeyond the Horizon: Exploring the Benefits of Drone-Assisted Roof Inspections
Beyond the Horizon: Exploring the Benefits of Drone-Assisted Roof Inspections
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Protecting the manufacturing industry
Protecting the manufacturing industryProtecting the manufacturing industry
Protecting the manufacturing industry
 
Real Time Video Prosecution Unit
Real Time Video Prosecution UnitReal Time Video Prosecution Unit
Real Time Video Prosecution Unit
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
Securing Your Wearable Tech Brand
Securing Your Wearable Tech BrandSecuring Your Wearable Tech Brand
Securing Your Wearable Tech Brand
 
Sogei2014 lisi v01
Sogei2014 lisi v01Sogei2014 lisi v01
Sogei2014 lisi v01
 
Wi-Fi Sensing: Attack on Privacy & Countermeasures
Wi-Fi Sensing: Attack on Privacy & CountermeasuresWi-Fi Sensing: Attack on Privacy & Countermeasures
Wi-Fi Sensing: Attack on Privacy & Countermeasures
 
Group no-03-2
Group no-03-2Group no-03-2
Group no-03-2
 
WI-GIM Life: Wireless Sensor Network for Ground Instability Monitoring. The t...
WI-GIM Life: Wireless Sensor Network for Ground Instability Monitoring. The t...WI-GIM Life: Wireless Sensor Network for Ground Instability Monitoring. The t...
WI-GIM Life: Wireless Sensor Network for Ground Instability Monitoring. The t...
 
Coal Mine Safety Monitoring and Alerting System
Coal Mine Safety Monitoring and Alerting SystemCoal Mine Safety Monitoring and Alerting System
Coal Mine Safety Monitoring and Alerting System
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
403 10
403 10403 10
403 10
 
ZONeSEC in ERNCIP
ZONeSEC in ERNCIPZONeSEC in ERNCIP
ZONeSEC in ERNCIP
 
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
Iidss 2017 sarwono sutikno   arwin  sumari (cps in defense)Iidss 2017 sarwono sutikno   arwin  sumari (cps in defense)
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
 
Wireless-Sensor-Systems-Security-Implications-for-the-Industrial-Environment-...
Wireless-Sensor-Systems-Security-Implications-for-the-Industrial-Environment-...Wireless-Sensor-Systems-Security-Implications-for-the-Industrial-Environment-...
Wireless-Sensor-Systems-Security-Implications-for-the-Industrial-Environment-...
 
Wireless Sensor Systems Security Implications for the Industrial Environment ...
Wireless Sensor Systems Security Implications for the Industrial Environment ...Wireless Sensor Systems Security Implications for the Industrial Environment ...
Wireless Sensor Systems Security Implications for the Industrial Environment ...
 

More from Andrea Praitano

[Ord ing] data protection by design v1.6
[Ord ing] data protection by design v1.6[Ord ing] data protection by design v1.6
[Ord ing] data protection by design v1.6
Andrea Praitano
 
Le misure minime di sicurezza AgID e come questi si intrecciano all’applicazi...
Le misure minime di sicurezza AgID e come questi si intrecciano all’applicazi...Le misure minime di sicurezza AgID e come questi si intrecciano all’applicazi...
Le misure minime di sicurezza AgID e come questi si intrecciano all’applicazi...
Andrea Praitano
 
Introduzione al nuovo quadro normativo Europeo per la protezione dei dati (20...
Introduzione al nuovo quadro normativo Europeo per la protezione dei dati (20...Introduzione al nuovo quadro normativo Europeo per la protezione dei dati (20...
Introduzione al nuovo quadro normativo Europeo per la protezione dei dati (20...
Andrea Praitano
 
2017 07-10 - proposta di regolamento e privacy v2
2017 07-10 - proposta di regolamento e privacy v22017 07-10 - proposta di regolamento e privacy v2
2017 07-10 - proposta di regolamento e privacy v2
Andrea Praitano
 
L’applicazione del Disciplinare Tecnico della 196 alla luce degli standard IS...
L’applicazione del Disciplinare Tecnico della 196 alla luce degli standard IS...L’applicazione del Disciplinare Tecnico della 196 alla luce degli standard IS...
L’applicazione del Disciplinare Tecnico della 196 alla luce degli standard IS...
Andrea Praitano
 
Introduzione a ITIL v3
Introduzione a ITIL v3Introduzione a ITIL v3
Introduzione a ITIL v3
Andrea Praitano
 
ITIL e sicurezza
ITIL e sicurezzaITIL e sicurezza
ITIL e sicurezza
Andrea Praitano
 
Novità di ITIL 2011
Novità di ITIL 2011Novità di ITIL 2011
Novità di ITIL 2011
Andrea Praitano
 
ITIL e project management
ITIL e project managementITIL e project management
ITIL e project management
Andrea Praitano
 
Continual service improvement tutorial
Continual service improvement tutorialContinual service improvement tutorial
Continual service improvement tutorial
Andrea Praitano
 
Impatto dell’utilizzo dei droni sulla sicurezza e sulla privacy
Impatto dell’utilizzo dei droni sulla sicurezza e sulla privacyImpatto dell’utilizzo dei droni sulla sicurezza e sulla privacy
Impatto dell’utilizzo dei droni sulla sicurezza e sulla privacy
Andrea Praitano
 
Novità della norma ISO/IEC 27001:2013
Novità della norma ISO/IEC 27001:2013Novità della norma ISO/IEC 27001:2013
Novità della norma ISO/IEC 27001:2013
Andrea Praitano
 
Problem Management proattivo di sicurezza secondo ITIL: attività di Ethical H...
Problem Management proattivo di sicurezza secondo ITIL: attività di Ethical H...Problem Management proattivo di sicurezza secondo ITIL: attività di Ethical H...
Problem Management proattivo di sicurezza secondo ITIL: attività di Ethical H...
Andrea Praitano
 
L’utilizzo crescente dei droni, che implicazioni sulla privacy
L’utilizzo crescente dei droni, che implicazioni sulla privacyL’utilizzo crescente dei droni, che implicazioni sulla privacy
L’utilizzo crescente dei droni, che implicazioni sulla privacy
Andrea Praitano
 

More from Andrea Praitano (14)

[Ord ing] data protection by design v1.6
[Ord ing] data protection by design v1.6[Ord ing] data protection by design v1.6
[Ord ing] data protection by design v1.6
 
Le misure minime di sicurezza AgID e come questi si intrecciano all’applicazi...
Le misure minime di sicurezza AgID e come questi si intrecciano all’applicazi...Le misure minime di sicurezza AgID e come questi si intrecciano all’applicazi...
Le misure minime di sicurezza AgID e come questi si intrecciano all’applicazi...
 
Introduzione al nuovo quadro normativo Europeo per la protezione dei dati (20...
Introduzione al nuovo quadro normativo Europeo per la protezione dei dati (20...Introduzione al nuovo quadro normativo Europeo per la protezione dei dati (20...
Introduzione al nuovo quadro normativo Europeo per la protezione dei dati (20...
 
2017 07-10 - proposta di regolamento e privacy v2
2017 07-10 - proposta di regolamento e privacy v22017 07-10 - proposta di regolamento e privacy v2
2017 07-10 - proposta di regolamento e privacy v2
 
L’applicazione del Disciplinare Tecnico della 196 alla luce degli standard IS...
L’applicazione del Disciplinare Tecnico della 196 alla luce degli standard IS...L’applicazione del Disciplinare Tecnico della 196 alla luce degli standard IS...
L’applicazione del Disciplinare Tecnico della 196 alla luce degli standard IS...
 
Introduzione a ITIL v3
Introduzione a ITIL v3Introduzione a ITIL v3
Introduzione a ITIL v3
 
ITIL e sicurezza
ITIL e sicurezzaITIL e sicurezza
ITIL e sicurezza
 
Novità di ITIL 2011
Novità di ITIL 2011Novità di ITIL 2011
Novità di ITIL 2011
 
ITIL e project management
ITIL e project managementITIL e project management
ITIL e project management
 
Continual service improvement tutorial
Continual service improvement tutorialContinual service improvement tutorial
Continual service improvement tutorial
 
Impatto dell’utilizzo dei droni sulla sicurezza e sulla privacy
Impatto dell’utilizzo dei droni sulla sicurezza e sulla privacyImpatto dell’utilizzo dei droni sulla sicurezza e sulla privacy
Impatto dell’utilizzo dei droni sulla sicurezza e sulla privacy
 
Novità della norma ISO/IEC 27001:2013
Novità della norma ISO/IEC 27001:2013Novità della norma ISO/IEC 27001:2013
Novità della norma ISO/IEC 27001:2013
 
Problem Management proattivo di sicurezza secondo ITIL: attività di Ethical H...
Problem Management proattivo di sicurezza secondo ITIL: attività di Ethical H...Problem Management proattivo di sicurezza secondo ITIL: attività di Ethical H...
Problem Management proattivo di sicurezza secondo ITIL: attività di Ethical H...
 
L’utilizzo crescente dei droni, che implicazioni sulla privacy
L’utilizzo crescente dei droni, che implicazioni sulla privacyL’utilizzo crescente dei droni, che implicazioni sulla privacy
L’utilizzo crescente dei droni, che implicazioni sulla privacy
 

Recently uploaded

Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
OECD Directorate for Financial and Enterprise Affairs
 
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij
 
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussionPro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
OECD Directorate for Financial and Enterprise Affairs
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Rosie Wells
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
Frederic Leger
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
artemacademy2
 
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPointMẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
1990 Media
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
SkillCertProExams
 
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfWhy Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Ben Linders
 
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdfBRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
Robin Haunschild
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
samililja
 
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussionArtificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
gharris9
 
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
gpww3sf4
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
OECD Directorate for Financial and Enterprise Affairs
 
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussionArtificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
OECD Directorate for Financial and Enterprise Affairs
 

Recently uploaded (20)

Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
 
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
 
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussionPro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
 
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPointMẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
 
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfWhy Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
 
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdfBRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
 
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussionArtificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
 
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
 
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussionArtificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
 
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
 

[Wef 2017] praitano v1.0

  • 1. HOW TO PROTECT THE COMMON HERITAGE SITES WITH LIMITED IMPACT IN THE SURVEILLANCE? A DYNAMIC AND NOT INVASIVE SURVEILLANCE SYSTEM THROUGH THE USE OF DRONES AND OTHER TOOLS FROM MILITARY KNOWLEDGE. Andrea Praitano, Giuseppe G. Zorzino Cybersecurity commission, Ordine degli Ingegneri di Roma, Italy andrea.praitano@gmail.com zorteam@mclink.it Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission29/11/2017 1
  • 2. ABOUT THE AUTHORS Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission29/11/2017 2 Author Co-Author Chairman of the Hybrid Cyber Warfare WG Lieutenant on leave Major on leave Member of the Board Member of the Board 22301:2012 ANDREA PRAITANO GIUSEPPE G. ZORZINO
  • 3. TABLE OF CONTENTS 1. Description of the type of common heritage sites 2. Main problems in the protection of sites 3. State of the art of the physical security in site protection 4. Alternative/integrative tools 5. Possible dynamic and not invasive solutions based on military tools 6. Conclusions 7. Questions and Answers 29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 3 +
  • 4. TYPES OF COMMON HERITAGE SITES 29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 4 High number of sites. The tentative list of UNESCO talk about 1681 sites located in 177 different countries. Source: http://whc.unesco.org/en 1/2
  • 5. DESCRIPTION OF THE TYPE OF COMMON HERITAGE SITES 29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 5 Some examples in the centre of Italy Source: http://whc.unesco.org/en Etruscan Necropolises of Cerveteri and Tarquinia Italy - Provinces of Rome and Viterbo, Region of Latium Date of Inscription: 2004 Property: 326.93 ha Buffer zone: 4,932.11 ha Ref: 1158 Villa Adriana (Tivoli) Italy - Provinces of Rome, Region of Latium Date of Inscription: 1999 Property: 80 ha Buffer zone: 500 ha Ref: 907 Villa d'Este, Tivoli Italy - Provinces of Rome, Region of Latium Date of Inscription: 2001 Property: 4.5 ha Buffer zone: 7 ha Ref: 1025 2/2
  • 6. MAIN PROBLEMS IN THE PROTECTION OF SITES • The size of the site is a problem for the protection: • Number of security’s end-points; • High number of events (and false positive events!); • Impact on the beauty and structure of the site: • Low (or zero) impact; • Number of security’s end points; • Size of some security’s end points; • Shape of typical security’s end points; • Types and numbers of threats to the sites: • Many different threats (voluntary and involuntary); • From static attack scenario to dynamic scenarios; • Costs of the site’s protection. 29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 6
  • 7. THE PROCESS OF THE PROTECTION DESIGN 29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 7 Threats analysis Information gathering and definition of attacks scenarios Definition of protection strategy Tools’ identification Set-up of the protection infrastructure
  • 8. ALTERNATIVE/INTEGRATIVE TOOLS • Thermal sensors; • Infrared sensors; • Movement sensors; • Short Wave Infrared (SWIR) Night Vision Cameras; • Drones/UAV 4-6-8 rotors; • Drones/UAV fixed wings; • Ranger HDC MultiSensor; • Illuminator; • Radar; • …….. 29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 8 1/2
  • 9. ALTERNATIVE/INTEGRATIVE TOOLS 29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 9 Visible SWIR Thermal SWIR Flight autonomy: around 30’ Distance: 100 Km Flight autonomy: around 90’ Distance: 100 ÷ 150 Km Range: from 3 to 20 Km 2/2
  • 10. SURVEILLANCE STRATEGY A possible surveillance strategy with low environmental impact: • A central control room; • Boundary control through video camera and enclosures; • Remote sensors (with low environmental impact) in the site; • Permanent control through radar(s); • Time driven control through drone(s) fixed wing; • Event driven control through: • Drone(s) multi rotors with camera, microphone and speaker; • Private/public policeman. 29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 10
  • 11. THE SITE POSSIBLE DYNAMIC AND NOT INVASIVE SOLUTIONS BASED ON MILITARY TOOLS - SCENARIO 29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 11 Thermal sensor Movement sensor IR sensor ALARM ALARM PERIODIC CONTROL Drone/UAV Fixed wing Drone/UAV multi rotors PERMANENT CONTROL
  • 12. POSSIBLE DYNAMIC AND NOT INVASIVE SOLUTIONS BASED ON MILITARY TOOLS - ARCHITECTURE 29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 12
  • 13. CONCLUSIONS • The heritage sites have a lot of threats; • The heritage sites have many environmental constraint; • The modern attacks are mixed and dynamic; • The modern technologies have a limits (e.g. flight time); • It is possible use a mixed approach to protect the sites; • …and respect the beauty of the sites! 29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 13
  • 14. 29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 14
  • 15. 29/11/2017 Ing. A. Praitano and Ing. G. Zorzino : Ordine degli Ingegneri di Roma - Cybersecurity commission 15 ING. ANDREA PRAITANO andrea.praitano@gmail.com @apraitano +39 328 8122642 it.linkedin.com/in/andreapraitano/ Cybersecurity commission ING. GIUSEPPE G. ZORZINO zorteam@mclink.it +39 347 1872858 it.linkedin.com/in/zorzinogiuseppe/