SlideShare a Scribd company logo
1 of 18
Download to read offline
CYBER SECURITY APPLICATIONS FOR SMART
COMMUNITIES
Angeloluca BARBA
Marketing Cyber Security
GENOVA, 30th October 2013
© Copyright Selex ES. S.p.A All rights reserved

COMPLEX
INFRASTRUCTU
RES

NOW
EXPOSED TO
CYBER
ATTACKS

CAN SUFFER
LOSS OF LIVES,
DAMAGES,
SERVICE
DISRUPTION

NEW CRIMINALS

VIOLATING
SYSTEMS
(WITH LOW
INVESTMENTS)

CAN CAUSE
LOSS OF
SERVICES,
MONEY AND
TRUST

LIVING (ALSO)
ON THE
INTERNET

CAUSE
LOSS OF LIVES,
DAMAGES,
SERVICE
DISRUPTION

NEW
SITUATIONS,
MOVEMENTS
PROTESTS
© Copyright Selex ES. S.p.A All rights reserved

How do you know what
will happen ?
PEOPLE CHATTING
DARKNETS
DOCUMENTS & ARCHIVES
SOCIAL NETWORKS & FORUM
We need high level, real-time, “weather
forecast like” decision support.
© Copyright Selex ES. S.p.A All rights reserved

Where is the information ?

WWW

DEEP
WEB

DARK
NET
© Copyright Selex ES. S.p.A All rights reserved

Traditional approach for BIG DATA Analysis:
Indexing of large quantities of data
Structured data fragmentation, analysis & movement
Distributed elaboration based on Map-Reduce paradigm
Need for substantial available space & high performance I/O

Disadvantages:
Inefficient management of unknown unstructured data
New data requires analysis re-execution
Storage of large quantities of early obsolete information
Difficult extraction and comprehension of information
Difficult or impossible management of complex algorithms and large graphs
© Copyright Selex ES. S.p.A All rights reserved

REALTIME ACTIONABLE
INTELLIGENCE

Multiple Artificial Intelligence
modules

Real-time situation dashboards

Owned infrastructure,
Total sensible data preservation

High-Performance Computing (HPC)
for large graph data analysis

XASMOS: Massive Online Data
Analysis
XASMOS: Massive Online Data Analysis
Analysis

Reporting Tools

© Copyright Selex ES. S.p.A All rights reserved

Intelligence Tools:
Adaptive Algorithms, Neural Networks, Artificial
Intelligence,etc.

Analysis of massive
social networks

Social Networks:
Facebook, Twitter, etc.

© Copyright Selex ES. All rights reserved
Architectural Highlights

Parallel Architecture

Composable Services

Elastic Access

«Open Source» Components

Core
Proprietary Components
High Performance
Architecture (MPI/CUDA)

Illustrative
High-Performance Computing
280 TFlops

Italian Technology
- Eurotech Aurora
HIGH
PERFORMANCEcooled – unique
Liquid
COMPUTING

technology

High level Integration
“Free Cooling” technology with
low power consumption

Solid State Storage
Composable Services

© Copyright Selex ES. S.p.A All rights reserved

Internet

Crawler

Engine

Expert Engine

Presentation

Motori di
ricerca

Phishing
Database

Image
Recognition
Anomaly
Detection
Pattern
Matching
Engine

Web Server
Log

Rete
Interna

Web Portal

System
Allerting
© Copyright Selex ES. S.p.A All rights reserved

Many Available Modules

•
•
•
•
•
•
•
•

Customizable crawlers
CASSANDRA NoSQL Database
HPCF Framework abstracting the entire platform
Intelligence Framework
Large Graph Analysis(MPI/CUDA)
Neural Networks, Self Organizing Maps, Machine Learning
Semantic Analysis
Programmable reporting portal
© Copyright Selex ES. S.p.A All rights reserved

Elastic Access
© Copyright Selex ES. S.p.A All rights reserved

Full Platform Access (owned node)
© Copyright Selex ES. S.p.A All rights reserved

Innovative Service Model

Dedicated web portal to access the
existing Intelligence Services
Direct access to the HPC platform to
develop custom services
No CAPEX
No maintenance costs
Flexible and modular service fees,
adaptable to the customer needs,
from single service to «Amazon
like» virtual istance renting
© Copyright Selex ES. S.p.A All rights reserved

So Why HPC?

Concentrated Power optimized for
different computations (MPI + CUDA)

Advanced Service Model with different
access levels

Dark Internet Crawling & Continuous
updates

Real-time alerts

Optimized information storage

Customizable platform

Owned Infrastructure protecting
customer confidentiality
Intelligence for smart communities

© Copyright Selex ES 2013 All rights reserved

Analysis of
Massive Social
Networks

Understand community networks and their dynamics;
Understand popular dynamics and trends;
Development of pandemic virus and / or worm on international scale;

Network
Analysis for
Intelligence and
Surveillance

Analysis of terrorist networks from public information domains;
Identification of interaction patterns;
Identification of unusual activity by analysis of variance in cognitive maps;

Security
Prevention

Intelligence services oriented to the proactive protection to potential hazards
to ensure safety and prevent illegal activities such as, attempts to attack or
disruption, theft of credentials or personal data

Brand
Protection Reputation
Analysis

Intelligence services oriented to the brand protection, allowing the
verification of what is said about the company / organization on specialized
sites on the web in general and identify attempts to discredit, not authorized
trading products, link abusive and others
Sentiment analysis

Fraud & Anti
Phishing

Intelligence services oriented to research (on specialized sources and on the
web) phishing attempts / farming, publication of owl sites, attempts to
Cybersquatting and Typosquatting, traffic redirection and more, attempts
known prime customers.
Thank you for your attention

Angeloluca Barba
Marketing Cyber Security
Via Laurentina 760
00143 Roma – Italia
angeloluca.barba@selex-es.com
www. selex-es.com

More Related Content

Similar to Cyber Security Applications for Smart Communities

Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSGeorge Wainblat
 
THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY HilalHarris
 
[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio Rosa[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio RosaTI Safe
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...Yiannis Verginadis
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochureGeorge Wainblat
 
Open System Interconnection Model Essay
Open System Interconnection Model EssayOpen System Interconnection Model Essay
Open System Interconnection Model EssayJessica Deakin
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxannettsparrow
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
Stack Identity OWASP Shadow Access Transform Cloud IAM.pdf
Stack Identity OWASP Shadow Access Transform Cloud IAM.pdfStack Identity OWASP Shadow Access Transform Cloud IAM.pdf
Stack Identity OWASP Shadow Access Transform Cloud IAM.pdfStack Identity
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentationomkar parab
 

Similar to Cyber Security Applications for Smart Communities (20)

Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017
 
Aensis idps 1000 v ext_eng
Aensis idps 1000  v ext_engAensis idps 1000  v ext_eng
Aensis idps 1000 v ext_eng
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY
 
Requirements for IoT platform technology
Requirements for IoT platform technologyRequirements for IoT platform technology
Requirements for IoT platform technology
 
[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio Rosa[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio Rosa
 
Internet Of Things (IOT)
Internet Of Things (IOT)Internet Of Things (IOT)
Internet Of Things (IOT)
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 
Online Security
Online SecurityOnline Security
Online Security
 
Blockchain for good
Blockchain for goodBlockchain for good
Blockchain for good
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
Open System Interconnection Model Essay
Open System Interconnection Model EssayOpen System Interconnection Model Essay
Open System Interconnection Model Essay
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
Stack Identity OWASP Shadow Access Transform Cloud IAM.pdf
Stack Identity OWASP Shadow Access Transform Cloud IAM.pdfStack Identity OWASP Shadow Access Transform Cloud IAM.pdf
Stack Identity OWASP Shadow Access Transform Cloud IAM.pdf
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
 

More from Community Protection Forum

Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Community Protection Forum
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Community Protection Forum
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...Community Protection Forum
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Community Protection Forum
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...Community Protection Forum
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachCommunity Protection Forum
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Community Protection Forum
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCommunity Protection Forum
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Community Protection Forum
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsCommunity Protection Forum
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesCommunity Protection Forum
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceCommunity Protection Forum
 

More from Community Protection Forum (20)

The Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in CyberspaceThe Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in Cyberspace
 
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
 
New Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants SafetyNew Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants Safety
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Security Projects & Projects Safety
Security Projects & Projects SafetySecurity Projects & Projects Safety
Security Projects & Projects Safety
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
 
A Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: SlowreqA Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: Slowreq
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
 
Touristic Port Security
Touristic Port SecurityTouristic Port Security
Touristic Port Security
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable Cities
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects Experience
 

Recently uploaded

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Cyber Security Applications for Smart Communities

  • 1. CYBER SECURITY APPLICATIONS FOR SMART COMMUNITIES Angeloluca BARBA Marketing Cyber Security GENOVA, 30th October 2013
  • 2. © Copyright Selex ES. S.p.A All rights reserved COMPLEX INFRASTRUCTU RES NOW EXPOSED TO CYBER ATTACKS CAN SUFFER LOSS OF LIVES, DAMAGES, SERVICE DISRUPTION NEW CRIMINALS VIOLATING SYSTEMS (WITH LOW INVESTMENTS) CAN CAUSE LOSS OF SERVICES, MONEY AND TRUST LIVING (ALSO) ON THE INTERNET CAUSE LOSS OF LIVES, DAMAGES, SERVICE DISRUPTION NEW SITUATIONS, MOVEMENTS PROTESTS
  • 3. © Copyright Selex ES. S.p.A All rights reserved How do you know what will happen ? PEOPLE CHATTING DARKNETS DOCUMENTS & ARCHIVES SOCIAL NETWORKS & FORUM We need high level, real-time, “weather forecast like” decision support.
  • 4. © Copyright Selex ES. S.p.A All rights reserved Where is the information ? WWW DEEP WEB DARK NET
  • 5. © Copyright Selex ES. S.p.A All rights reserved Traditional approach for BIG DATA Analysis: Indexing of large quantities of data Structured data fragmentation, analysis & movement Distributed elaboration based on Map-Reduce paradigm Need for substantial available space & high performance I/O Disadvantages: Inefficient management of unknown unstructured data New data requires analysis re-execution Storage of large quantities of early obsolete information Difficult extraction and comprehension of information Difficult or impossible management of complex algorithms and large graphs
  • 6. © Copyright Selex ES. S.p.A All rights reserved REALTIME ACTIONABLE INTELLIGENCE Multiple Artificial Intelligence modules Real-time situation dashboards Owned infrastructure, Total sensible data preservation High-Performance Computing (HPC) for large graph data analysis XASMOS: Massive Online Data Analysis
  • 7. XASMOS: Massive Online Data Analysis Analysis Reporting Tools © Copyright Selex ES. S.p.A All rights reserved Intelligence Tools: Adaptive Algorithms, Neural Networks, Artificial Intelligence,etc. Analysis of massive social networks Social Networks: Facebook, Twitter, etc. © Copyright Selex ES. All rights reserved
  • 8. Architectural Highlights Parallel Architecture Composable Services Elastic Access «Open Source» Components Core Proprietary Components
  • 10. High-Performance Computing 280 TFlops Italian Technology - Eurotech Aurora HIGH PERFORMANCEcooled – unique Liquid COMPUTING technology High level Integration “Free Cooling” technology with low power consumption Solid State Storage
  • 11. Composable Services © Copyright Selex ES. S.p.A All rights reserved Internet Crawler Engine Expert Engine Presentation Motori di ricerca Phishing Database Image Recognition Anomaly Detection Pattern Matching Engine Web Server Log Rete Interna Web Portal System Allerting
  • 12. © Copyright Selex ES. S.p.A All rights reserved Many Available Modules • • • • • • • • Customizable crawlers CASSANDRA NoSQL Database HPCF Framework abstracting the entire platform Intelligence Framework Large Graph Analysis(MPI/CUDA) Neural Networks, Self Organizing Maps, Machine Learning Semantic Analysis Programmable reporting portal
  • 13. © Copyright Selex ES. S.p.A All rights reserved Elastic Access
  • 14. © Copyright Selex ES. S.p.A All rights reserved Full Platform Access (owned node)
  • 15. © Copyright Selex ES. S.p.A All rights reserved Innovative Service Model Dedicated web portal to access the existing Intelligence Services Direct access to the HPC platform to develop custom services No CAPEX No maintenance costs Flexible and modular service fees, adaptable to the customer needs, from single service to «Amazon like» virtual istance renting
  • 16. © Copyright Selex ES. S.p.A All rights reserved So Why HPC? Concentrated Power optimized for different computations (MPI + CUDA) Advanced Service Model with different access levels Dark Internet Crawling & Continuous updates Real-time alerts Optimized information storage Customizable platform Owned Infrastructure protecting customer confidentiality
  • 17. Intelligence for smart communities © Copyright Selex ES 2013 All rights reserved Analysis of Massive Social Networks Understand community networks and their dynamics; Understand popular dynamics and trends; Development of pandemic virus and / or worm on international scale; Network Analysis for Intelligence and Surveillance Analysis of terrorist networks from public information domains; Identification of interaction patterns; Identification of unusual activity by analysis of variance in cognitive maps; Security Prevention Intelligence services oriented to the proactive protection to potential hazards to ensure safety and prevent illegal activities such as, attempts to attack or disruption, theft of credentials or personal data Brand Protection Reputation Analysis Intelligence services oriented to the brand protection, allowing the verification of what is said about the company / organization on specialized sites on the web in general and identify attempts to discredit, not authorized trading products, link abusive and others Sentiment analysis Fraud & Anti Phishing Intelligence services oriented to research (on specialized sources and on the web) phishing attempts / farming, publication of owl sites, attempts to Cybersquatting and Typosquatting, traffic redirection and more, attempts known prime customers.
  • 18. Thank you for your attention Angeloluca Barba Marketing Cyber Security Via Laurentina 760 00143 Roma – Italia angeloluca.barba@selex-es.com www. selex-es.com