disaster & smart city in aging society – designing a secure and resilient smart city smart...

Post on 25-Dec-2015

216 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Disaster & Smart City in Aging Society – Designing a secure and resilient smart city

Smart City and Resiliency

Jirapon SunkphoCollege of InnovationThammasat University

Outline

❖ What is Smart City and What makes a city Smart?

❖ Smarter Thailand: outsmart Bangkok Traffic

❖ What is Resiliency and what make a city more resilience?

What is Smart city? It depends on whom you ask.

❖ Engineer - potential for efficiency and optimization.

❖ App developer - a vision of novel social interactions and experiences in public places.

❖ Mayor - it’s all about participation and democracy.

What is Smart City?“places where information technology is combined with infrastructure , architecture, everyday objects, and even our bodies to address social, economic, and environmental problems” (Anthony M. Towsend, the author of Smart Cities:Big Data, Civic Hackers, and the Quest for a New Utopia)

From Symatec: Transformational ‘smart cities’: cyber security and resilience

Bangkok Traffic

http://bk.asia-city.com/city-living/article/plans-fix-bangkok-traffic-problems

Out Smart Bangkok Traffic

❖ Social @traffy @js100

❖ Traffy API

Sample Apps Using Traffy API

A GPS-BASED TRAFFIC INCIDENT MANAGEMENT

SYSTEM

Smart City Challenges❖ Like any other ICT system, the smart city

technological and communication environment – the network infrastructure and the Internet of Things – will present vulnerabilities to cyber attacks

What is Resiliency?

❖ Cyber resilience: The organisation’s capability to withstand negative impacts due to known, predictable, unknown, unpredictable, uncertain and unexpected threats from activities in cyberspace (Information Security Forum).

How to become more cyber resilience?Franklin Kramer

Diversity

❖ Diversity—The creation of cyber systems with multiple forms of programming

RedundancyThe frequent creation of snapshots or checkpoints of data and systems in a known and stable operation so that critical systems can be readily restored.

Isolationthe infected portion of the system can be isolated so that a single failure will not cascade across the system.

Detection and Monitoring

❖ Advanced persistent threats can be resident, unobserved within a cyber system for a long time.

Principle of Least PrivilegeMany intrusions are by insiders who take advantage of access to install malicious software.

Distributedness and Moving Target Defense

If targets are concentrated in a single place and protected by an unchanging defense, a malicious intruder has a fixed target against which to plan.

Hack Back

Thank YouJirapon SunkphoCollege of InnovationThammasat Universityjirapon.s@gmail.com

–Isaac Ben-Israel [Major-General Israeli Air Force]

“If you want to hit a country severely you hit its power and water supplies. Cyber

technology can do this without shooting a single bullet”

top related