SlideShare a Scribd company logo
1 of 18
Download to read offline
CYBER SECURITY APPLICATIONS FOR SMART
COMMUNITIES
Angeloluca BARBA
Marketing Cyber Security
GENOVA, 30th October 2013
© Copyright Selex ES. S.p.A All rights reserved

COMPLEX
INFRASTRUCTU
RES

NOW
EXPOSED TO
CYBER
ATTACKS

CAN SUFFER
LOSS OF LIVES,
DAMAGES,
SERVICE
DISRUPTION

NEW CRIMINALS

VIOLATING
SYSTEMS
(WITH LOW
INVESTMENTS)

CAN CAUSE
LOSS OF
SERVICES,
MONEY AND
TRUST

LIVING (ALSO)
ON THE
INTERNET

CAUSE
LOSS OF LIVES,
DAMAGES,
SERVICE
DISRUPTION

NEW
SITUATIONS,
MOVEMENTS
PROTESTS
© Copyright Selex ES. S.p.A All rights reserved

How do you know what
will happen ?
PEOPLE CHATTING
DARKNETS
DOCUMENTS & ARCHIVES
SOCIAL NETWORKS & FORUM
We need high level, real-time, “weather
forecast like” decision support.
© Copyright Selex ES. S.p.A All rights reserved

Where is the information ?

WWW

DEEP
WEB

DARK
NET
© Copyright Selex ES. S.p.A All rights reserved

Traditional approach for BIG DATA Analysis:
Indexing of large quantities of data
Structured data fragmentation, analysis & movement
Distributed elaboration based on Map-Reduce paradigm
Need for substantial available space & high performance I/O

Disadvantages:
Inefficient management of unknown unstructured data
New data requires analysis re-execution
Storage of large quantities of early obsolete information
Difficult extraction and comprehension of information
Difficult or impossible management of complex algorithms and large graphs
© Copyright Selex ES. S.p.A All rights reserved

REALTIME ACTIONABLE
INTELLIGENCE

Multiple Artificial Intelligence
modules

Real-time situation dashboards

Owned infrastructure,
Total sensible data preservation

High-Performance Computing (HPC)
for large graph data analysis

XASMOS: Massive Online Data
Analysis
XASMOS: Massive Online Data Analysis
Analysis

Reporting Tools

© Copyright Selex ES. S.p.A All rights reserved

Intelligence Tools:
Adaptive Algorithms, Neural Networks, Artificial
Intelligence,etc.

Analysis of massive
social networks

Social Networks:
Facebook, Twitter, etc.

© Copyright Selex ES. All rights reserved
Architectural Highlights

Parallel Architecture

Composable Services

Elastic Access

«Open Source» Components

Core
Proprietary Components
High Performance
Architecture (MPI/CUDA)

Illustrative
High-Performance Computing
280 TFlops

Italian Technology
- Eurotech Aurora
HIGH
PERFORMANCEcooled – unique
Liquid
COMPUTING

technology

High level Integration
“Free Cooling” technology with
low power consumption

Solid State Storage
Composable Services

© Copyright Selex ES. S.p.A All rights reserved

Internet

Crawler

Engine

Expert Engine

Presentation

Motori di
ricerca

Phishing
Database

Image
Recognition
Anomaly
Detection
Pattern
Matching
Engine

Web Server
Log

Rete
Interna

Web Portal

System
Allerting
© Copyright Selex ES. S.p.A All rights reserved

Many Available Modules

•
•
•
•
•
•
•
•

Customizable crawlers
CASSANDRA NoSQL Database
HPCF Framework abstracting the entire platform
Intelligence Framework
Large Graph Analysis(MPI/CUDA)
Neural Networks, Self Organizing Maps, Machine Learning
Semantic Analysis
Programmable reporting portal
© Copyright Selex ES. S.p.A All rights reserved

Elastic Access
© Copyright Selex ES. S.p.A All rights reserved

Full Platform Access (owned node)
© Copyright Selex ES. S.p.A All rights reserved

Innovative Service Model

Dedicated web portal to access the
existing Intelligence Services
Direct access to the HPC platform to
develop custom services
No CAPEX
No maintenance costs
Flexible and modular service fees,
adaptable to the customer needs,
from single service to «Amazon
like» virtual istance renting
© Copyright Selex ES. S.p.A All rights reserved

So Why HPC?

Concentrated Power optimized for
different computations (MPI + CUDA)

Advanced Service Model with different
access levels

Dark Internet Crawling & Continuous
updates

Real-time alerts

Optimized information storage

Customizable platform

Owned Infrastructure protecting
customer confidentiality
Intelligence for smart communities

© Copyright Selex ES 2013 All rights reserved

Analysis of
Massive Social
Networks

Understand community networks and their dynamics;
Understand popular dynamics and trends;
Development of pandemic virus and / or worm on international scale;

Network
Analysis for
Intelligence and
Surveillance

Analysis of terrorist networks from public information domains;
Identification of interaction patterns;
Identification of unusual activity by analysis of variance in cognitive maps;

Security
Prevention

Intelligence services oriented to the proactive protection to potential hazards
to ensure safety and prevent illegal activities such as, attempts to attack or
disruption, theft of credentials or personal data

Brand
Protection Reputation
Analysis

Intelligence services oriented to the brand protection, allowing the
verification of what is said about the company / organization on specialized
sites on the web in general and identify attempts to discredit, not authorized
trading products, link abusive and others
Sentiment analysis

Fraud & Anti
Phishing

Intelligence services oriented to research (on specialized sources and on the
web) phishing attempts / farming, publication of owl sites, attempts to
Cybersquatting and Typosquatting, traffic redirection and more, attempts
known prime customers.
Thank you for your attention

Angeloluca Barba
Marketing Cyber Security
Via Laurentina 760
00143 Roma – Italia
angeloluca.barba@selex-es.com
www. selex-es.com

More Related Content

Similar to Cyber Security Applications for Smart Communities

Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSGeorge Wainblat
 
THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY HilalHarris
 
[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio Rosa[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio RosaTI Safe
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...Yiannis Verginadis
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochureGeorge Wainblat
 
Open System Interconnection Model Essay
Open System Interconnection Model EssayOpen System Interconnection Model Essay
Open System Interconnection Model EssayJessica Deakin
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxannettsparrow
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
Stack Identity OWASP Shadow Access Transform Cloud IAM.pdf
Stack Identity OWASP Shadow Access Transform Cloud IAM.pdfStack Identity OWASP Shadow Access Transform Cloud IAM.pdf
Stack Identity OWASP Shadow Access Transform Cloud IAM.pdfStack Identity
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentationomkar parab
 

Similar to Cyber Security Applications for Smart Communities (20)

Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017
 
Aensis idps 1000 v ext_eng
Aensis idps 1000  v ext_engAensis idps 1000  v ext_eng
Aensis idps 1000 v ext_eng
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY
 
Requirements for IoT platform technology
Requirements for IoT platform technologyRequirements for IoT platform technology
Requirements for IoT platform technology
 
[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio Rosa[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio Rosa
 
Internet Of Things (IOT)
Internet Of Things (IOT)Internet Of Things (IOT)
Internet Of Things (IOT)
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 
Online Security
Online SecurityOnline Security
Online Security
 
Blockchain for good
Blockchain for goodBlockchain for good
Blockchain for good
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
Open System Interconnection Model Essay
Open System Interconnection Model EssayOpen System Interconnection Model Essay
Open System Interconnection Model Essay
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
Stack Identity OWASP Shadow Access Transform Cloud IAM.pdf
Stack Identity OWASP Shadow Access Transform Cloud IAM.pdfStack Identity OWASP Shadow Access Transform Cloud IAM.pdf
Stack Identity OWASP Shadow Access Transform Cloud IAM.pdf
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Main Menu
Main MenuMain Menu
Main Menu
 

More from Community Protection Forum

Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Community Protection Forum
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Community Protection Forum
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...Community Protection Forum
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Community Protection Forum
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...Community Protection Forum
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachCommunity Protection Forum
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Community Protection Forum
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCommunity Protection Forum
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Community Protection Forum
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsCommunity Protection Forum
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesCommunity Protection Forum
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceCommunity Protection Forum
 

More from Community Protection Forum (20)

The Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in CyberspaceThe Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in Cyberspace
 
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
 
New Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants SafetyNew Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants Safety
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Security Projects & Projects Safety
Security Projects & Projects SafetySecurity Projects & Projects Safety
Security Projects & Projects Safety
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
 
A Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: SlowreqA Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: Slowreq
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
 
Touristic Port Security
Touristic Port SecurityTouristic Port Security
Touristic Port Security
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable Cities
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects Experience
 

Recently uploaded

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 

Recently uploaded (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Cyber Security Applications for Smart Communities

  • 1. CYBER SECURITY APPLICATIONS FOR SMART COMMUNITIES Angeloluca BARBA Marketing Cyber Security GENOVA, 30th October 2013
  • 2. © Copyright Selex ES. S.p.A All rights reserved COMPLEX INFRASTRUCTU RES NOW EXPOSED TO CYBER ATTACKS CAN SUFFER LOSS OF LIVES, DAMAGES, SERVICE DISRUPTION NEW CRIMINALS VIOLATING SYSTEMS (WITH LOW INVESTMENTS) CAN CAUSE LOSS OF SERVICES, MONEY AND TRUST LIVING (ALSO) ON THE INTERNET CAUSE LOSS OF LIVES, DAMAGES, SERVICE DISRUPTION NEW SITUATIONS, MOVEMENTS PROTESTS
  • 3. © Copyright Selex ES. S.p.A All rights reserved How do you know what will happen ? PEOPLE CHATTING DARKNETS DOCUMENTS & ARCHIVES SOCIAL NETWORKS & FORUM We need high level, real-time, “weather forecast like” decision support.
  • 4. © Copyright Selex ES. S.p.A All rights reserved Where is the information ? WWW DEEP WEB DARK NET
  • 5. © Copyright Selex ES. S.p.A All rights reserved Traditional approach for BIG DATA Analysis: Indexing of large quantities of data Structured data fragmentation, analysis & movement Distributed elaboration based on Map-Reduce paradigm Need for substantial available space & high performance I/O Disadvantages: Inefficient management of unknown unstructured data New data requires analysis re-execution Storage of large quantities of early obsolete information Difficult extraction and comprehension of information Difficult or impossible management of complex algorithms and large graphs
  • 6. © Copyright Selex ES. S.p.A All rights reserved REALTIME ACTIONABLE INTELLIGENCE Multiple Artificial Intelligence modules Real-time situation dashboards Owned infrastructure, Total sensible data preservation High-Performance Computing (HPC) for large graph data analysis XASMOS: Massive Online Data Analysis
  • 7. XASMOS: Massive Online Data Analysis Analysis Reporting Tools © Copyright Selex ES. S.p.A All rights reserved Intelligence Tools: Adaptive Algorithms, Neural Networks, Artificial Intelligence,etc. Analysis of massive social networks Social Networks: Facebook, Twitter, etc. © Copyright Selex ES. All rights reserved
  • 8. Architectural Highlights Parallel Architecture Composable Services Elastic Access «Open Source» Components Core Proprietary Components
  • 10. High-Performance Computing 280 TFlops Italian Technology - Eurotech Aurora HIGH PERFORMANCEcooled – unique Liquid COMPUTING technology High level Integration “Free Cooling” technology with low power consumption Solid State Storage
  • 11. Composable Services © Copyright Selex ES. S.p.A All rights reserved Internet Crawler Engine Expert Engine Presentation Motori di ricerca Phishing Database Image Recognition Anomaly Detection Pattern Matching Engine Web Server Log Rete Interna Web Portal System Allerting
  • 12. © Copyright Selex ES. S.p.A All rights reserved Many Available Modules • • • • • • • • Customizable crawlers CASSANDRA NoSQL Database HPCF Framework abstracting the entire platform Intelligence Framework Large Graph Analysis(MPI/CUDA) Neural Networks, Self Organizing Maps, Machine Learning Semantic Analysis Programmable reporting portal
  • 13. © Copyright Selex ES. S.p.A All rights reserved Elastic Access
  • 14. © Copyright Selex ES. S.p.A All rights reserved Full Platform Access (owned node)
  • 15. © Copyright Selex ES. S.p.A All rights reserved Innovative Service Model Dedicated web portal to access the existing Intelligence Services Direct access to the HPC platform to develop custom services No CAPEX No maintenance costs Flexible and modular service fees, adaptable to the customer needs, from single service to «Amazon like» virtual istance renting
  • 16. © Copyright Selex ES. S.p.A All rights reserved So Why HPC? Concentrated Power optimized for different computations (MPI + CUDA) Advanced Service Model with different access levels Dark Internet Crawling & Continuous updates Real-time alerts Optimized information storage Customizable platform Owned Infrastructure protecting customer confidentiality
  • 17. Intelligence for smart communities © Copyright Selex ES 2013 All rights reserved Analysis of Massive Social Networks Understand community networks and their dynamics; Understand popular dynamics and trends; Development of pandemic virus and / or worm on international scale; Network Analysis for Intelligence and Surveillance Analysis of terrorist networks from public information domains; Identification of interaction patterns; Identification of unusual activity by analysis of variance in cognitive maps; Security Prevention Intelligence services oriented to the proactive protection to potential hazards to ensure safety and prevent illegal activities such as, attempts to attack or disruption, theft of credentials or personal data Brand Protection Reputation Analysis Intelligence services oriented to the brand protection, allowing the verification of what is said about the company / organization on specialized sites on the web in general and identify attempts to discredit, not authorized trading products, link abusive and others Sentiment analysis Fraud & Anti Phishing Intelligence services oriented to research (on specialized sources and on the web) phishing attempts / farming, publication of owl sites, attempts to Cybersquatting and Typosquatting, traffic redirection and more, attempts known prime customers.
  • 18. Thank you for your attention Angeloluca Barba Marketing Cyber Security Via Laurentina 760 00143 Roma – Italia angeloluca.barba@selex-es.com www. selex-es.com