integrating cyber-physical security for a safer city · 2019-05-09 · addressing the emerging...

1
SCAN HERE TO READ THE WHITE PAPER OR VISIT Capture key insights on securing cities in an increasingly connected world nec.com/safecity Addressing the Emerging Risks to Critical Infrastructure with Cyber-Physical Solutions INTEGRATING CYBER-PHYSICAL SECURITY FOR A SAFER CITY Global Security Spending Overview The global security market is estimated to be worth US$72.6 billion at the end of 2016. Disconnect between physical security and cyber security Why Security is a Key Priority for Smart Cities Cyber-attacks potentially disrupting critical services Convergence of operational technology and information technology Connected infrastructure DDoS* Attacks: A Growing Threat Security Technology Forecast: Key Areas To Watch 240% increase in botnet activity, traced mostly to 900 compromised CCTV cameras 25,513 IP cameras compromised in a DDoS attack, including 24% from Taiwan, 9% from Indonesia, and 6% from Malaysia (2016) 152,000 IoT devices (e.g., CCTV cameras and personal video recorders) compromised in a 1Tbps DDoS attack US$ 8.22 billion US$ 12.67 billion US$ 10.60 billion US$ 15.75 billion US$ 18.26 billion US$ 44.04 billion AIRPORTS 2014 2023 ELECTRICITY 2014 2023 OIL & GAS 2014 2023 US$ BILLION 11.12 US$ BILLION 5.84 US$ BILLION 6.38 US$ BILLION 11.69 US$ BILLION 9.02 US$ BILLION 22.35 Electricity Oil & Gas Mass Transportation Maritime Security Banking & Finance Border & Biometrics Airport Security *Note: Distributed denial-of-services Source: Frost & Sullivan Source: Frost & Sullivan Global Security Spending Overview (2016) CRITICAL INFRASTRUCTURE OPERATIONS: TOP 6 AREAS OF AIRPORTS Physical Long screening queues at security checkpoints KEY TECHNOLOGIES • Multimodal biometrics • Facial recognition algorithms • Network-wide multilayer defenses • Advanced protection gateways for SCADA networks Cyber Automated check-ins, baggage drops, and ID scans ELECTRICITY Physical Vandalism/ terrorism of plants/critical facilities KEY TECHNOLOGIES • Multi-layered defence for SCADA • Intrusion Detection • High-resolution cameras • Behavioral & Video Data Analytics Cyber Connected devices as new grid invasion access points CITIZEN SAFETY Physical Physical threats in densely-populated areas KEY TECHNOLOGIES • Behavior Analysis • Video Data Analytics • Incidence Reporting • Cyber security forensics Cyber Data breaches in public domain GOVT SERVICES Physical Vandalism, theft, and/or disruption of services KEY TECHNOLOGIES • Multimodal biometrics for access control • Behavior Analysis • Detection of cyber threats and data leaks, and identification of cyber-attack patterns • Intrusion Detection Cyber Cyber-attacks motivated by political dissent NATURAL DISASTER MANAGEMENT Physical Lack of disaster planning and recovery practices KEY TECHNOLOGIES • Environmental sensors in risk-prone areas • Advanced predictive analytics • Emergency Incident Response • Vulnerability identification, mitigation and management system Cyber Remote attacks on critical infrastructure Stadium/ Big Events Physical Hostile-aggressive individuals/crowds KEY TECHNOLOGIES • High-resolution cameras • Behavioral analytics • Real-time networking monitoring • Next-generation firewalls Cyber Attacks on networks to cripple operations and cut power US$ BILLION 6.22

Upload: others

Post on 22-May-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: INTEGRATING CYBER-PHYSICAL SECURITY FOR A SAFER CITY · 2019-05-09 · Addressing the Emerging Risks to Critical Infrastructure with Cyber-Physical Solutions INTEGRATING CYBER-PHYSICAL

SCAN HERE TO READTHE WHITE PAPER OR VISITCapture key insights on securing cities in an

increasingly connected world nec.com/safecity

Addressing the Emerging Risks to Critical Infrastructure with Cyber-Physical Solutions INTEGRATING CYBER-PHYSICAL SECURITY FOR A SAFER CITY

Global SecuritySpending OverviewThe global security market is estimated to be worth US$72.6 billion at the end of 2016.

Disconnect between physical

security and cyber security

Why Security is a Key Priorityfor Smart Cities

Cyber-attacks potentially disrupting

critical services

Convergence of operational

technology and information technology

Connectedinfrastructure

DDoS* Attacks:A Growing Threat

Security Technology Forecast:Key Areas To Watch

240% increase in botnet activity, traced mostly to 900 compromised CCTV cameras

25,513 IP cameras compromised in a DDoS attack, including 24% from Taiwan, 9% from Indonesia, and 6% from Malaysia (2016)

152,000IoT devices (e.g., CCTV cameras and personal video recorders) compromised in a 1Tbps DDoS attack

US$8.22billion

US$12.67billion

US$10.60billion

US$15.75billion

US$18.26billion

US$44.04billion

AIRPORTS

2014 2023

ELECTRICITY

2014 2023

OIL & GAS

2014 2023

US$

BILLION

11.12

US$

BILLION

5.84 US$

BILLION

6.38US$

BILLION

11.69US$

BILLION

9.02

US$

BILLION

22.35

Electric

ity

Oil & G

as

Mass Tra

nsporta

tion

Maritime S

ecurity

Bankin

g & Fin

ance

Border

& Biom

etrics

Airport

Securit

y

*Note: Distributed denial-of-services

Source: Frost & Sullivan

Source: Frost & Sullivan Global Security Spending Overview (2016)

CRITIC

AL INF

RASTRU

CTURE

OPERAT

IONS:

TOP 6 A

REAS O

F

AIRPORTS Physical Long screening queues at security checkpoints

KEY TECHNOLOGIES• Multimodal biometrics • Facial recognition algorithms• Network-wide multilayer defenses • Advanced protection gateways for SCADA networks

CyberAutomated check-ins, baggage drops, and ID scans

ELECTRICITY Physical Vandalism/ terrorism of plants/critical facilities

KEY TECHNOLOGIES• Multi-layered defence for SCADA• Intrusion Detection• High-resolution cameras • Behavioral & Video Data Analytics

CyberConnected devices as new grid invasion access points

CITIZEN SAFETY Physical Physical threats in densely-populated areas

KEY TECHNOLOGIES• Behavior Analysis• Video Data Analytics• Incidence Reporting • Cyber security forensics

CyberData breaches in public domain

GOVT SERVICES Physical Vandalism, theft, and/or disruption of services

KEY TECHNOLOGIES• Multimodal biometrics for access control• Behavior Analysis• Detection of cyber threats and data leaks, and identification of cyber-attack patterns• Intrusion Detection

CyberCyber-attacks motivated by political dissent

NATURAL DISASTERMANAGEMENT Physical Lack of disaster planning and recovery practices

KEY TECHNOLOGIES• Environmental sensors in risk-prone areas• Advanced predictive analytics • Emergency Incident Response • Vulnerability identification, mitigation and management system

CyberRemote attacks on critical infrastructure

Stadium/Big Events Physical Hostile-aggressive individuals/crowds

KEY TECHNOLOGIES• High-resolution cameras• Behavioral analytics• Real-time networking monitoring • Next-generation firewalls

CyberAttacks on networks to cripple operations and cut power

US$

BILLION

6.22