SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Safer Cities For A Better
Tomorrow
Vulnerability Assessment
Threats
• City Based Threats
• Organized Crime, Acts of TerrorCITY
• White Terror
• Large Amounts of Money LaunderingSTATE
•Destruction of Critical Infrastructure
Illegal landing of weaponry/merchandiseNATIONAL
Technological Framework for Safe and
Secure Cities (TFSSC)
Technol ogi cal Framework i nt ends t o be t he game changer
f or
Homel and Securi t y, provi di ng t he precursor t o generat i ng
t he
f unct i onal i t i es, t he out put of t he Homel and Securi t y
Syst em.
Lack of st andardi zat i on and uni f ormi t y of t echnol ogi cal
pl at f orms
has been t he maj or drawback. Thi s i s t he basi s of
creat i on of saf e and
Technological Framework for Safe
and Secure Cities(TFSSC)
Command and Control Center (CCC)
Interception Systems (IS)
City Based Video Surveillance System (CBVSS)
TETRA Radio Network (TRN)
Geospatial Technology for HLS (GTHLS)
ERP Solution, RDBMS and Integration (ERI)
Managerial Response to War on Terror (MRWT)
Command & Control Centers
City based command and control centers
integrating all feeds, radio, text, audio, video, data,
images and graphics from different angles, through
a viable command and control center software,
creating in the process a state of art C4I command
and control center. It would have the capability to
handle the worst of the terror attacks and natural
disasters at one end and day to day responsive
policing at the other end.
Command and Control Center
Integrated Command Control Coordination And Communication Syst
Command and Control Center
Ci t y based command and cont r ol cent er s
i nt egr at i ng al l f eeds r adi o, audi o, vi deo, t ext ,
dat a, i mages and gr aphi cs f r om di f f er ent
channel s, t hr ough a vi abl e command and cont r ol
cent er sof t war e, cr eat i ng i n t he pr ocess a st at e
of ar t C4I command and cont r ol cent er . I t woul d
have t he capabi l i t y t o handl e wor st of t he
t er r or at t acks and nat ur al di sast er s at one end
and day t o day r esponsi ve pol i ci ng at t he ot her
end.
Command and Control centers
ALERT
Map Data Video Data Incident Data
PCR
a
Ambulance
C4i Operator
Fire
Response Task Completed
Procedure & Reports
Activated Incident Closed
Flow Command and control center - Incident
Interception Systems (IP)
The capability to monitor and penetrate into any mode of
communication and storage for the required suspected
information/data and the capability to analyze and
connect to our requirements on a real time basis is the
urgent need and utility of the Interception Systems which
needs to be put in place, upgraded or scaled up, as the
case may be.
Interception Systems
ReveaLinx Architecture
Data Servers Data Modelling and Analysis Investigation Presentation
Analyst 1 Case A
DB1
WorkstationDeploy
Applications
Presenter
Analyst 2
Develop Applications
DB2 Case
Delivery
Workstation Case B
Results Analyst 3Direct connection to Delivery
systems to retrieve data
Data
Files
ReveaLinks Presenter
Workstation
Mobile ILD Fixed Sat IP
Networks
Verba PSV
Mediation
Storage and Archival
Processing Demand & Speech
WS 1 WS 2 WS3 WS4 WS5 WS6 WS7 WS8
Mass Interception Architecture
Interception Systems
City Based Video Surveillance
System (CBVSS)
CBVSS has a proven track record for providing the best
information (Video footage) to the investigators of terror
attacks across the globe, Kasab, being the prime example
here. Technologically, way ahead of CCTV networks, with
video analytics in build into the system, it helps find
meaning in hours and hours of video footage, giving the
precise output and the connects the investigator is looking
for. A deterrent and a must for any big city.
City Based Video Surveillance System
System Management Protect the core
applications fromPolicy—Reputation—Identity
attack
Application Security
Protect the video
content from
Content Security misuse and
abuse
Network Security
Ensure no
attacks or
Endpoint Security malfunction in
the network
Self-Defending Network:
Ensure end
Best of Breed Security in a users cannot
abuse theSystems Approach
system
Secure access to Video Surveillance System
Management to Video Surveillance Systems
TETRA Radio Network (TRN)
TETRA telecommunications system takes the Police
Communication to the fully digital mode with a complete
integration of all communication gadgets and delivery of
high quality voice/data and other related outputs. TETRA
eludes India. In reality it is an excellent public safety
communication network, improves our response to War on
Terror, organized crime and disaster management.
Al l aut hor i t i es have t hei r own Vi r t ual Pr i vat e
Net wor k(VPN)
TETRA enables sharing of a common
infrastructure between all mission critical users
Geospatial Technology
for HLS (GTHLS)
Conventional inputs are unable to provide actionable data.
The map of today is geospatial imagery/information, the
third eye as it is nicknamed. Geospatial products and
intelligence are critical to planning, preparation and
response to terror attacks, natural & other disasters and
supports incident management. It is a great tool
for regulation, enforcement, monitoring and supervision.
Geospatial Technology provides enhanced
geospatial understanding of a facilities vulnerabilities
and thus speeds up detection and response time in the
event of a security breach
Rapid access to extensive data, displayed in a
geospatial medium helps protect critical assets and
infrastructure and ensures public safety
GEO Spatial Technology
Geo-spatial Information Changes
Geo
Technologies
Specialty
Core Data
Fields
Ideas
ERP Solution, RDBMS
& Integration (ERI)
RDBMS is critical to the functioning of any organization
and ERP provides for populating the data on a real time
basis, bringing the complete functioning of the dept. on
the ERP, in Karnataka, the POLICE IT. Then integration of
the legacy systems with the ERP provides for the
functionalities with which the end users have been
accustomed for long, on a single sign in sign out concept.
How should we implement ERP systems
Obtain the right mix of people, processes and technology!!
ERP Solution
Managerial Response to War
on Terror (MRWT)
Gap anal ysi s shows a huge gap i n t he l earni ng,
ski l l s and at t i t ude of i nt ernal securi t y
managers whi ch ought t o be bri dged. The human
resources shoul d be bet t er t han t he t echni cal
syst emcreat ed and made f unct i onal . Ut i l i t y i s
how best we ut i l i ze. I nnovat i ve met hods
i ncl usi ve of out bound l earni ng needs t o
i ncul cat ed as a part of hi gh end t rai ni ng.
Change management i s t he most cri t i cal
component of our way f orward.
Prof essi onal i sml eadi ng t o gl obal l y
For each technology
A city based network
Integrated into a national
network for that technology
All technologies together
All technologies should
integrate into National
Homeland Security Resource
Base and Incident Management
System
All technologies together
All technologies should
integrate into National
Homeland Security Resource
Base and Incident Management
System
Base Document for HLS
can be the beginning
National Home Security
Blueprint
A resource for all!!!
Visit our Web site HLS –India. Com.
We owe it to every
Indian
Sincere
thanks for
the rapt

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (8)

Nghich ly cuoc doi
Nghich ly cuoc doiNghich ly cuoc doi
Nghich ly cuoc doi
 
3 q11 results presentation
3 q11 results presentation3 q11 results presentation
3 q11 results presentation
 
SPEECH BY DR GALE T C RIGOBERT AT THE CARIBBEAN WOMEN OF POLITICAL DISTINCTION
SPEECH BY DR GALE T C RIGOBERT AT THE CARIBBEAN WOMEN OF POLITICAL DISTINCTIONSPEECH BY DR GALE T C RIGOBERT AT THE CARIBBEAN WOMEN OF POLITICAL DISTINCTION
SPEECH BY DR GALE T C RIGOBERT AT THE CARIBBEAN WOMEN OF POLITICAL DISTINCTION
 
Uwp soufriere fond st jacques constituency branch offers advise to slp soufri...
Uwp soufriere fond st jacques constituency branch offers advise to slp soufri...Uwp soufriere fond st jacques constituency branch offers advise to slp soufri...
Uwp soufriere fond st jacques constituency branch offers advise to slp soufri...
 
Construction update viracopos
Construction update   viracoposConstruction update   viracopos
Construction update viracopos
 
Emmanuel Lutheran Church 2014-2015 Narrative Spending Plan
Emmanuel Lutheran Church 2014-2015 Narrative Spending PlanEmmanuel Lutheran Church 2014-2015 Narrative Spending Plan
Emmanuel Lutheran Church 2014-2015 Narrative Spending Plan
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Towards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for IndiaTowards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for India
 

Ähnlich wie HLS Perspective. Safer cities for a better tomorrow

smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructureShreyas Satpute
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security InfrastructureGAURAV. H .TANDON
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...IAESIJAI
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
Proposal for System Analysis and Desing
Proposal for System Analysis and DesingProposal for System Analysis and Desing
Proposal for System Analysis and DesingMd Khaza Main Uddin
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Ageglobal
 
Tecnología Anti-Poaching una excelente solución
Tecnología Anti-Poaching una excelente soluciónTecnología Anti-Poaching una excelente solución
Tecnología Anti-Poaching una excelente soluciónEduardoDelCampo8
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDF
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDFSeven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDF
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDFTor Cannady
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 

Ähnlich wie HLS Perspective. Safer cities for a better tomorrow (20)

Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
 
Homeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism MechanismHomeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism Mechanism
 
Homeland security – A robust counter terrorism mechanism
Homeland security – A robust counter terrorism mechanismHomeland security – A robust counter terrorism mechanism
Homeland security – A robust counter terrorism mechanism
 
Geopolitics HLS Article
Geopolitics HLS ArticleGeopolitics HLS Article
Geopolitics HLS Article
 
Secure Cities 2013
Secure Cities 2013Secure Cities 2013
Secure Cities 2013
 
Mechatronics for Homeland Security
Mechatronics for Homeland SecurityMechatronics for Homeland Security
Mechatronics for Homeland Security
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
CCTNS & Homeland Security
CCTNS & Homeland SecurityCCTNS & Homeland Security
CCTNS & Homeland Security
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Proposal for System Analysis and Desing
Proposal for System Analysis and DesingProposal for System Analysis and Desing
Proposal for System Analysis and Desing
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
 
Tecnología Anti-Poaching una excelente solución
Tecnología Anti-Poaching una excelente soluciónTecnología Anti-Poaching una excelente solución
Tecnología Anti-Poaching una excelente solución
 
Purushottam Sharma
Purushottam SharmaPurushottam Sharma
Purushottam Sharma
 
WCIT 2016 Jan Ming Ho
WCIT 2016 Jan Ming HoWCIT 2016 Jan Ming Ho
WCIT 2016 Jan Ming Ho
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDF
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDFSeven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDF
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDF
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 

Mehr von ADGP, Public Grivences, Bangalore

Mehr von ADGP, Public Grivences, Bangalore (20)

Secure it0001
Secure it0001Secure it0001
Secure it0001
 
e-gov: Secure IT 2014
e-gov: Secure IT 2014e-gov: Secure IT 2014
e-gov: Secure IT 2014
 
Asymmetric warfare for geoworld
Asymmetric warfare for geoworldAsymmetric warfare for geoworld
Asymmetric warfare for geoworld
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop
 
KSP Composite Computerization Model
KSP Composite Computerization ModelKSP Composite Computerization Model
KSP Composite Computerization Model
 
CCTNS Karnataka Overview
CCTNS Karnataka OverviewCCTNS Karnataka Overview
CCTNS Karnataka Overview
 
Xime erp creation & change management 18082013
Xime erp creation & change management 18082013Xime erp creation & change management 18082013
Xime erp creation & change management 18082013
 
Technological framework
Technological frameworkTechnological framework
Technological framework
 
E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013
 
Leadership casestudy
Leadership casestudyLeadership casestudy
Leadership casestudy
 
Reaching out to the unreached
Reaching out to the unreachedReaching out to the unreached
Reaching out to the unreached
 
LTC Word
LTC WordLTC Word
LTC Word
 
LTC - 1
LTC - 1LTC - 1
LTC - 1
 
LTC - 2
LTC - 2LTC - 2
LTC - 2
 
Unreached
UnreachedUnreached
Unreached
 
Reaching out to the unreached
Reaching out to the unreachedReaching out to the unreached
Reaching out to the unreached
 
HLS Perspective, Safer cities for a better tomorrow
HLS Perspective, Safer cities for a better tomorrowHLS Perspective, Safer cities for a better tomorrow
HLS Perspective, Safer cities for a better tomorrow
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 

Kürzlich hochgeladen

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Kürzlich hochgeladen (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

HLS Perspective. Safer cities for a better tomorrow

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. Safer Cities For A Better Tomorrow Vulnerability Assessment Threats • City Based Threats • Organized Crime, Acts of TerrorCITY • White Terror • Large Amounts of Money LaunderingSTATE •Destruction of Critical Infrastructure Illegal landing of weaponry/merchandiseNATIONAL
  • 6. Technological Framework for Safe and Secure Cities (TFSSC) Technol ogi cal Framework i nt ends t o be t he game changer f or Homel and Securi t y, provi di ng t he precursor t o generat i ng t he f unct i onal i t i es, t he out put of t he Homel and Securi t y Syst em. Lack of st andardi zat i on and uni f ormi t y of t echnol ogi cal pl at f orms has been t he maj or drawback. Thi s i s t he basi s of creat i on of saf e and
  • 7. Technological Framework for Safe and Secure Cities(TFSSC) Command and Control Center (CCC) Interception Systems (IS) City Based Video Surveillance System (CBVSS) TETRA Radio Network (TRN) Geospatial Technology for HLS (GTHLS) ERP Solution, RDBMS and Integration (ERI) Managerial Response to War on Terror (MRWT)
  • 8. Command & Control Centers City based command and control centers integrating all feeds, radio, text, audio, video, data, images and graphics from different angles, through a viable command and control center software, creating in the process a state of art C4I command and control center. It would have the capability to handle the worst of the terror attacks and natural disasters at one end and day to day responsive policing at the other end.
  • 9. Command and Control Center Integrated Command Control Coordination And Communication Syst
  • 10. Command and Control Center Ci t y based command and cont r ol cent er s i nt egr at i ng al l f eeds r adi o, audi o, vi deo, t ext , dat a, i mages and gr aphi cs f r om di f f er ent channel s, t hr ough a vi abl e command and cont r ol cent er sof t war e, cr eat i ng i n t he pr ocess a st at e of ar t C4I command and cont r ol cent er . I t woul d have t he capabi l i t y t o handl e wor st of t he t er r or at t acks and nat ur al di sast er s at one end and day t o day r esponsi ve pol i ci ng at t he ot her end. Command and Control centers
  • 11. ALERT Map Data Video Data Incident Data PCR a Ambulance C4i Operator Fire Response Task Completed Procedure & Reports Activated Incident Closed Flow Command and control center - Incident
  • 12. Interception Systems (IP) The capability to monitor and penetrate into any mode of communication and storage for the required suspected information/data and the capability to analyze and connect to our requirements on a real time basis is the urgent need and utility of the Interception Systems which needs to be put in place, upgraded or scaled up, as the case may be.
  • 13. Interception Systems ReveaLinx Architecture Data Servers Data Modelling and Analysis Investigation Presentation Analyst 1 Case A DB1 WorkstationDeploy Applications Presenter Analyst 2 Develop Applications DB2 Case Delivery Workstation Case B Results Analyst 3Direct connection to Delivery systems to retrieve data Data Files ReveaLinks Presenter Workstation
  • 14. Mobile ILD Fixed Sat IP Networks Verba PSV Mediation Storage and Archival Processing Demand & Speech WS 1 WS 2 WS3 WS4 WS5 WS6 WS7 WS8 Mass Interception Architecture Interception Systems
  • 15. City Based Video Surveillance System (CBVSS) CBVSS has a proven track record for providing the best information (Video footage) to the investigators of terror attacks across the globe, Kasab, being the prime example here. Technologically, way ahead of CCTV networks, with video analytics in build into the system, it helps find meaning in hours and hours of video footage, giving the precise output and the connects the investigator is looking for. A deterrent and a must for any big city.
  • 16. City Based Video Surveillance System
  • 17. System Management Protect the core applications fromPolicy—Reputation—Identity attack Application Security Protect the video content from Content Security misuse and abuse Network Security Ensure no attacks or Endpoint Security malfunction in the network Self-Defending Network: Ensure end Best of Breed Security in a users cannot abuse theSystems Approach system Secure access to Video Surveillance System
  • 18. Management to Video Surveillance Systems
  • 19. TETRA Radio Network (TRN) TETRA telecommunications system takes the Police Communication to the fully digital mode with a complete integration of all communication gadgets and delivery of high quality voice/data and other related outputs. TETRA eludes India. In reality it is an excellent public safety communication network, improves our response to War on Terror, organized crime and disaster management.
  • 20. Al l aut hor i t i es have t hei r own Vi r t ual Pr i vat e Net wor k(VPN) TETRA enables sharing of a common infrastructure between all mission critical users
  • 21. Geospatial Technology for HLS (GTHLS) Conventional inputs are unable to provide actionable data. The map of today is geospatial imagery/information, the third eye as it is nicknamed. Geospatial products and intelligence are critical to planning, preparation and response to terror attacks, natural & other disasters and supports incident management. It is a great tool for regulation, enforcement, monitoring and supervision.
  • 22. Geospatial Technology provides enhanced geospatial understanding of a facilities vulnerabilities and thus speeds up detection and response time in the event of a security breach Rapid access to extensive data, displayed in a geospatial medium helps protect critical assets and infrastructure and ensures public safety GEO Spatial Technology
  • 24. ERP Solution, RDBMS & Integration (ERI) RDBMS is critical to the functioning of any organization and ERP provides for populating the data on a real time basis, bringing the complete functioning of the dept. on the ERP, in Karnataka, the POLICE IT. Then integration of the legacy systems with the ERP provides for the functionalities with which the end users have been accustomed for long, on a single sign in sign out concept.
  • 25. How should we implement ERP systems Obtain the right mix of people, processes and technology!! ERP Solution
  • 26. Managerial Response to War on Terror (MRWT) Gap anal ysi s shows a huge gap i n t he l earni ng, ski l l s and at t i t ude of i nt ernal securi t y managers whi ch ought t o be bri dged. The human resources shoul d be bet t er t han t he t echni cal syst emcreat ed and made f unct i onal . Ut i l i t y i s how best we ut i l i ze. I nnovat i ve met hods i ncl usi ve of out bound l earni ng needs t o i ncul cat ed as a part of hi gh end t rai ni ng. Change management i s t he most cri t i cal component of our way f orward. Prof essi onal i sml eadi ng t o gl obal l y
  • 27. For each technology A city based network Integrated into a national network for that technology
  • 28. All technologies together All technologies should integrate into National Homeland Security Resource Base and Incident Management System
  • 29. All technologies together All technologies should integrate into National Homeland Security Resource Base and Incident Management System
  • 30. Base Document for HLS can be the beginning National Home Security Blueprint A resource for all!!!
  • 31. Visit our Web site HLS –India. Com. We owe it to every Indian