SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
Critical
Infrastructure
Protection
David Alexander
University College London
“Those facilities, systems, sites and
networks necessary for the functioning
of society and the delivery of essential
services upon which daily life depends.”
What is critical infrastructure?
"Those infrastructure assets (physical
or electronic) that are vital to the
continued delivery and integrity of the
essential services upon which society
relies, the loss or compromise of which
would lead to severe economic or social
consequences or to loss of life."
What is critical infrastructure?
The sectors of critical infrastructure
• water
• energy
• food
• health
• transport
• communications
• finance
• government
• emergency
services
Elements of critical infrastructure
Water: dams, treatment plants, pipelines, sewers
Energy: power stations, transmission lines
Food: distribution networks, warehouses and sales points
Health: hospitals, emergency systems, pharmaceuticals
Transport: road, rail, air, water
airports, sea ports, roads, railways, bridges
Communications: telephone, radio, cyber
Finance: banks, money supply, financial services
Government: national, regional, local
Emergency services: fire, police, ambulance, specialist.
• national - of importance to the
functioning of national life and affairs
• local - of importance to the
functioning of local life and affairs.
The divisions of critical infrastructure
• natural events (floods, storms, etc.)
• technological failures and human error
• terrorism and sabotage.
Hazards to critical infrastructure
Water
treatment works Railway station
Fire station
Electricity sub-station
Broadband antenna
Hospital
Supermarket
Power station
Waste water
treatment works
FLOOD SITUATION
Generation
output
restricted
Generator
out of service
Generator
out of service
Generator
out of service
Generation
output
increased
Additional
generator
on stand-by
Example of regional flood impact on electricity grid
Previously affected
Near misses
At risk
(1 in 100)
Low risk
Risk exposure level
Low
Medium
High
Threat
Historic
Predicted
Low
Criticality scale
Impact
on life
Economic
impact
Impact on
essential
services
Impactcategories
5
4
3
2
1
Critical threshold
Critical national
infrastructure
Other national
infrastructure
Virtually
certain
HIGH
Probable
SIGNI-
FICANT
Possible
Improbable
INTER-
MEDIATE
Highly
unlikely
LOW
Trivial Low Moderate Extensive Catastrophic
Failureprobability
Effects and degree of damage
Infrastructure criticality matrix
HAZARD
VULNERABILITY
EXPOSURE
A simple
risk assessment
matrix
Different definitions of exposure:
• under threat for a
given period of time
• at risk to a given extent
of possible loss.
A person who spends five minutes
twice a day crossing a bridge that
is at risk of collapse is exposed
to that risk for 10/(60x24x7)=
0.00098 of a week
Command
& control
Delegation
to agency
Delegation
to agency &
negotiation
Enforced
self-
regulation
Voluntary
self-
regulation
More
interventionist
Less
interventionist
The regulatory continuum
Government
ownership
Market
forces
The ALARP concept
Negligible risk
Unacceptable risk
Broadly acceptable
region (no need for
detailed work to
demonstrate ALARP)
Unacceptable region
ALARP or tolerability
region: risk assumed
only if benefit warrants it
Cost of risk reduction
Risk Inefficient
measures
Disproportionate
measures
Insufficient
measures
Optimal
measures
Critical infrastructure
Safeguarding critical infrastructures
• redundant systems
• adequate levels of operating supplies
• fault-tolerant design
• "fail-safe" design
• adequate and reserve manpower
• scenarios for failures and disasters
• contingency and emergency plans
- kept current
• involvement of top management
• measuring weaknesses
• creating resilience and redundancy
• restoring essential services.
Critical infrastructure protection:
a programme, a plan or an activity
SMART criteria:
S - specific
M - measurable
A - attractive,
acceptable
R - realistic,
realisable
T - timing.
The risk management process
Establish
the context
Identify hazards
and threats
Analyse risks
Evaluate risks
Manage risks
Accept
risks
Communicateandconsult
Monitorandreview
Yes
No
1
2
3
Fully
opera-
tional
Opera-
tional
Life safe
Near
collapse
Frequent
Occa-
sional
Rare
Very
rare
Performance level
Design standards versus performance levels
Designlevel
Unacceptable
performance
for new
construction
• measure interdependency
• adopt design standards
• create resilience.
Protection strategies
Policy
adoption
Risk assessment
• hazard
• vulnerability
• exposure
Policy assessment
• costs
• benefits
• consequences
Disaster
Expected
losses
Risk Policy
Assessment
Cyber
Human
Physical
Set goals and objectives
Identify assets, systems and networks
Assess risks: vulnerabilities,
threats, consequences
Prioritise
Implement programmes
Measure effectiveness
Continuous
improvement
to enhance
protection
of
critical
infrastructure
and key
resources
Feedback loop
interim.cabinetoffice.gov.uk/media/349103/strategic-framework.pdf
http://www.bmi.bund.de/SharedDocs/Downloads/EN/Broschueren/
Basisschutzkonzept_kritische_Infrastrukturen_en.html?nn=441658

Weitere ähnliche Inhalte

Was ist angesagt?

IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatMotorola Solutions
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessmentprimeteacher32
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructureUnisys Corporation
 
Information Security
Information SecurityInformation Security
Information Securitychenpingling
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment PresentationLionel Medina
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of viewS.E. CTS CERT-GOV-MD
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsKarthikeyan Dhayalan
 
Cyber Threat Management
Cyber Threat Management Cyber Threat Management
Cyber Threat Management Rishi Kant
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005ControlCase
 
Basic Concepts of information security.ppt
Basic Concepts of information security.pptBasic Concepts of information security.ppt
Basic Concepts of information security.pptZaheer720515
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...BCM Institute
 

Was ist angesagt? (20)

IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Information security
Information securityInformation security
Information security
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
 
Cyber Security Threat Modeling
Cyber Security Threat ModelingCyber Security Threat Modeling
Cyber Security Threat Modeling
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Information Security
Information SecurityInformation Security
Information Security
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
Cyber Threat Management
Cyber Threat Management Cyber Threat Management
Cyber Threat Management
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Basic Concepts of information security.ppt
Basic Concepts of information security.pptBasic Concepts of information security.ppt
Basic Concepts of information security.ppt
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 

Andere mochten auch

Symantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection StudySymantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection StudySymantec
 
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...Bryn Davidson
 
Crisis communication
Crisis communicationCrisis communication
Crisis communicationJohn Kroll
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Securitydocomusa
 
Hacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00bHacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00bPriyanka Aash
 
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015tmuehleisen
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetJuniper Networks
 
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...Carlos Moreno
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorEuropean Services Institute
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure CybersecurityLogitek Solutions
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropePositive Hack Days
 
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...AVEVA
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policieswardjo
 
U.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceU.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceGwanhoo Lee
 

Andere mochten auch (20)

Symantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection StudySymantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection Study
 
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
 
A Critical Overview of Disaster Theory
A Critical Overview of Disaster TheoryA Critical Overview of Disaster Theory
A Critical Overview of Disaster Theory
 
Crisis communication
Crisis communicationCrisis communication
Crisis communication
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
Hacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00bHacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00b
 
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
 
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Presentation
Presentation Presentation
Presentation
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure Cybersecurity
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
 
Bio Daniel Donatelli
Bio Daniel DonatelliBio Daniel Donatelli
Bio Daniel Donatelli
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 
U.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceU.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity Governance
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
Trauma in Disaster
Trauma in DisasterTrauma in Disaster
Trauma in Disaster
 

Ähnlich wie Critical infrastructure

Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security Adhar kashyap
 
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docxAppendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docxjustine1simpson78276
 
noaa_csc1231455445156555455656666566.ppt
noaa_csc1231455445156555455656666566.pptnoaa_csc1231455445156555455656666566.ppt
noaa_csc1231455445156555455656666566.pptPapuKumarNaik1
 
2015.10.06 emerging risks
2015.10.06 emerging risks2015.10.06 emerging risks
2015.10.06 emerging risksFERMA
 
CMD OTC Mitigation
CMD OTC MitigationCMD OTC Mitigation
CMD OTC Mitigationrynicholls
 
Disaster Management Plan for Metro Railway
Disaster Management Plan for Metro RailwayDisaster Management Plan for Metro Railway
Disaster Management Plan for Metro RailwayBhaskar Kumar Dan
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCandice Tang
 
CS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructureCS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructureJohn Rooksby
 
Public Health Preparedness for Disaster Management
Public Health Preparedness for Disaster ManagementPublic Health Preparedness for Disaster Management
Public Health Preparedness for Disaster ManagementKattey Kattey
 
Disaster management approaches in chhattishgarh
Disaster management approaches in chhattishgarhDisaster management approaches in chhattishgarh
Disaster management approaches in chhattishgarhShubham Agrawal
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Bay - The Incident Command System.pptx
Bay -   The Incident Command System.pptxBay -   The Incident Command System.pptx
Bay - The Incident Command System.pptxDesireeFlorendo
 
Blackoutslidesharefinalfinal 150610082252-lva1-app6892
Blackoutslidesharefinalfinal 150610082252-lva1-app6892Blackoutslidesharefinalfinal 150610082252-lva1-app6892
Blackoutslidesharefinalfinal 150610082252-lva1-app6892Vera Kovaleva
 
Blackout of Critical Services: Do you know your exposure?
Blackout of Critical Services: Do you know your exposure?Blackout of Critical Services: Do you know your exposure?
Blackout of Critical Services: Do you know your exposure?Gen Re
 

Ähnlich wie Critical infrastructure (20)

Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
 
CIP eu 2016 114(-8)
CIP eu 2016 114(-8)CIP eu 2016 114(-8)
CIP eu 2016 114(-8)
 
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docxAppendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
 
Cascading Disasters
Cascading DisastersCascading Disasters
Cascading Disasters
 
noaa_csc1231455445156555455656666566.ppt
noaa_csc1231455445156555455656666566.pptnoaa_csc1231455445156555455656666566.ppt
noaa_csc1231455445156555455656666566.ppt
 
Disaster Resilient Critical Infrastructure
Disaster Resilient Critical InfrastructureDisaster Resilient Critical Infrastructure
Disaster Resilient Critical Infrastructure
 
2015.10.06 emerging risks
2015.10.06 emerging risks2015.10.06 emerging risks
2015.10.06 emerging risks
 
CMD OTC Mitigation
CMD OTC MitigationCMD OTC Mitigation
CMD OTC Mitigation
 
Disaster Management Plan for Metro Railway
Disaster Management Plan for Metro RailwayDisaster Management Plan for Metro Railway
Disaster Management Plan for Metro Railway
 
Infrastructure Interdependencies: Connections that Alter Consequences
Infrastructure Interdependencies: Connections that Alter ConsequencesInfrastructure Interdependencies: Connections that Alter Consequences
Infrastructure Interdependencies: Connections that Alter Consequences
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
 
DISASTER MANAGEMENT
DISASTER MANAGEMENT DISASTER MANAGEMENT
DISASTER MANAGEMENT
 
Vulnerability to Disasters
Vulnerability to DisastersVulnerability to Disasters
Vulnerability to Disasters
 
CS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructureCS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructure
 
Public Health Preparedness for Disaster Management
Public Health Preparedness for Disaster ManagementPublic Health Preparedness for Disaster Management
Public Health Preparedness for Disaster Management
 
Disaster management approaches in chhattishgarh
Disaster management approaches in chhattishgarhDisaster management approaches in chhattishgarh
Disaster management approaches in chhattishgarh
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Bay - The Incident Command System.pptx
Bay -   The Incident Command System.pptxBay -   The Incident Command System.pptx
Bay - The Incident Command System.pptx
 
Blackoutslidesharefinalfinal 150610082252-lva1-app6892
Blackoutslidesharefinalfinal 150610082252-lva1-app6892Blackoutslidesharefinalfinal 150610082252-lva1-app6892
Blackoutslidesharefinalfinal 150610082252-lva1-app6892
 
Blackout of Critical Services: Do you know your exposure?
Blackout of Critical Services: Do you know your exposure?Blackout of Critical Services: Do you know your exposure?
Blackout of Critical Services: Do you know your exposure?
 

Mehr von Prof. David E. Alexander (UCL)

For a Reliable Civil Protection System That Keeps Citizens Safe
For a Reliable Civil Protection System That Keeps Citizens SafeFor a Reliable Civil Protection System That Keeps Citizens Safe
For a Reliable Civil Protection System That Keeps Citizens SafeProf. David E. Alexander (UCL)
 
How to Make Your Article More Acceptable for Publication
How to Make Your Article More Acceptable for PublicationHow to Make Your Article More Acceptable for Publication
How to Make Your Article More Acceptable for PublicationProf. David E. Alexander (UCL)
 
Managing Today's Complex Crises: Lessons From the Past
Managing Today's Complex Crises: Lessons From the PastManaging Today's Complex Crises: Lessons From the Past
Managing Today's Complex Crises: Lessons From the PastProf. David E. Alexander (UCL)
 
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptx
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptxCivil Protection and Intersectionality 2022-09-26 Science Forum.pptx
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptxProf. David E. Alexander (UCL)
 
Disasters in Italy: Environmental and Cultural Resilience
Disasters in Italy: Environmental and Cultural ResilienceDisasters in Italy: Environmental and Cultural Resilience
Disasters in Italy: Environmental and Cultural ResilienceProf. David E. Alexander (UCL)
 
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-IT
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-ITManaging the Covid Recovery / Gestire la Ripresa da Covid EN-IT
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-ITProf. David E. Alexander (UCL)
 
Civil Defence to Civil Protection (IRDR Taster Lecture)
Civil Defence to Civil Protection (IRDR Taster Lecture)Civil Defence to Civil Protection (IRDR Taster Lecture)
Civil Defence to Civil Protection (IRDR Taster Lecture)Prof. David E. Alexander (UCL)
 

Mehr von Prof. David E. Alexander (UCL) (20)

For a Reliable Civil Protection System That Keeps Citizens Safe
For a Reliable Civil Protection System That Keeps Citizens SafeFor a Reliable Civil Protection System That Keeps Citizens Safe
For a Reliable Civil Protection System That Keeps Citizens Safe
 
Systemic Risks and Emerging Challenges.pdf
Systemic Risks and Emerging Challenges.pdfSystemic Risks and Emerging Challenges.pdf
Systemic Risks and Emerging Challenges.pdf
 
How to Make Your Article More Acceptable for Publication
How to Make Your Article More Acceptable for PublicationHow to Make Your Article More Acceptable for Publication
How to Make Your Article More Acceptable for Publication
 
Extreme Weather Preparedness
Extreme Weather PreparednessExtreme Weather Preparedness
Extreme Weather Preparedness
 
Managing Today's Complex Crises: Lessons From the Past
Managing Today's Complex Crises: Lessons From the PastManaging Today's Complex Crises: Lessons From the Past
Managing Today's Complex Crises: Lessons From the Past
 
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptx
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptxCivil Protection and Intersectionality 2022-09-26 Science Forum.pptx
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptx
 
Cascading disasters 2022 03-02
Cascading disasters 2022 03-02Cascading disasters 2022 03-02
Cascading disasters 2022 03-02
 
Il Futuro delle Grandi Emergenze
Il Futuro delle Grandi EmergenzeIl Futuro delle Grandi Emergenze
Il Futuro delle Grandi Emergenze
 
Disasters in Italy: Environmental and Cultural Resilience
Disasters in Italy: Environmental and Cultural ResilienceDisasters in Italy: Environmental and Cultural Resilience
Disasters in Italy: Environmental and Cultural Resilience
 
Cultura e disastri
Cultura e disastriCultura e disastri
Cultura e disastri
 
Covid lessons for disaster risk governance
Covid lessons for disaster risk governanceCovid lessons for disaster risk governance
Covid lessons for disaster risk governance
 
Black swans a critique
Black swans   a critiqueBlack swans   a critique
Black swans a critique
 
Planning for Pandemics
Planning for PandemicsPlanning for Pandemics
Planning for Pandemics
 
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-IT
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-ITManaging the Covid Recovery / Gestire la Ripresa da Covid EN-IT
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-IT
 
Civil Defence to Civil Protection (IRDR Taster Lecture)
Civil Defence to Civil Protection (IRDR Taster Lecture)Civil Defence to Civil Protection (IRDR Taster Lecture)
Civil Defence to Civil Protection (IRDR Taster Lecture)
 
Readiness for Post-Covid-19 Challenges
Readiness for Post-Covid-19 ChallengesReadiness for Post-Covid-19 Challenges
Readiness for Post-Covid-19 Challenges
 
Scenario Methodology for Planning Future Activities
Scenario Methodology for Planning Future ActivitiesScenario Methodology for Planning Future Activities
Scenario Methodology for Planning Future Activities
 
Disastri a cascata
Disastri a cascataDisastri a cascata
Disastri a cascata
 
Grenfell Tower - Controlled Anger
Grenfell Tower - Controlled AngerGrenfell Tower - Controlled Anger
Grenfell Tower - Controlled Anger
 
Warning and Evacuation
Warning and EvacuationWarning and Evacuation
Warning and Evacuation
 

Kürzlich hochgeladen

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 

Kürzlich hochgeladen (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Critical infrastructure