The Development of the Security Network
|
|
|
- Erik Richardson
- 10 years ago
- Views:
Transcription
1 Turvallisuus. Käytettävyys. Yhteistyö. The Development of the Security Network Ministry of Finance Security Network Project 03/2012
2 Contents of the Presentation 1. What is the Goverment Security Network? 2. Why introduce a Government Security Network? 3. Purpose of the Security Network Project 4. Timetable and Funding 5. Output and Benefits 6. Initialization of the Security Network 2
3 Government Security Network High preparedness telecommunications solution for the government and security authorities The security network ensures interaction and communication between the senior government officials, security authorities and other actors Secures the integrity, availability and confidentiality of critical information. Ministries Border Guard Defence Forces Police Emergency Responce Centres Rescue Authorities 3
4 Government telecommunications network Higher level of preparedness Higher costs Lower level of preparedness Lower costs Defence Forces Network Government Network Public networks e.g. Internet Military National Defence Security authorities ( persons) Other government authories ( persons) 4
5 Driving force behind the development Need to ensure telecommunication security and availability for senior government and security authorities growing cyber-threat Changes in the telecom-operator business in Finland traditional high dependency on multinational telecom operators Based on the Security Strategy for Society critical information and communication systems must function in all security situations same information systems must be available in all situations 5
6 Key guidelines of the project Critical information is stored in Finland Critical systems are controlled in Finland Information security is ensured with efficient surveillance and encryption Steering factors: High preparedness of the implemented solutions Integrated ICT services Cost efficiency and energy efficiency 6
7 Tasks of the Security Network Project Planning and implementing a high preparedness security network service for public authorities joint effort between 5 ministries Prime Minister s Office is in charge of the evaluation project Integration of the existing government ICT network solutions Development of the IT-services and the interoperability of the IT-services Out of the project s scope: development and funding of new applications 7
8 Project Organisation GOVERNMENT STEERING GROUP PROJECT GROUP MINISTRY OF FINANCE PROJECT MANAGER SECURITY NETWORK UNIT COORDINATION GROUP MINISTRY OF INTERIOR MINISTRY OF DEFENCE GMDSS PROJ. VIRVE PROJ. INFORMATION NETWORK PROJECT ITC-SOLUTIONS - DEVELOPMENT PROJECT TUVE- LOCAL NET- WORK PROJ. OPNET TUVE- PROJ. PALHA PROJ. HAL- NET- TUVE PROJ. DEVELOPMENT GROUPS PRIME MINISTER S OFFICE, MINISTRY FOR FOREIGN AFFAIRS, MINISTRY OF TRANSPORT AND COMMUNICATIONS Osasto Security Network Project 2011 pp.kk.vvvv 8
9 Time Schedule and Budget The project was established after a government plenary session on 8 April Finishing date of the project is 31 December 2012 Total budget EUR 187 million Investments necessary for improving security demands higher operating costs in different administrative branches of government These costs can be partly offset by gains achieved through more efficient procedures The Government s decision-in-principle on 12 May 2011: State Security Networks Ltd will take over the responsibility for the infrastructure of the Security Network 9
10 Project Output Government Security Network Solution Government Security Network Service Delivery Model Integrating the systems of the security authorities into the Government Security Network Secured integration of the Government Security Network into other ICT networks SecNet Architectures: Overall Architecture Integration Architecture SecNet Policies: Preparedness Policy Information Security Policy Telecommunications Policy 10
11 Security Network Project Benefits Ensuring the continuity of the activities of security authorities in all situations More effective interaction between different authorities Access by all users to a wide range of services provided by different authorities Better control of ICT costs 11
12 Initialization of the Security Network The introduction of Security Network services will begin on 1 January 2013 The Ministry of Finance will be responsible for the strategic steering of the Security Network Suomen Turvallisuusverkko Ltd will be responsible for Security Network operator activity from 1 January 2013 founded on 15 Feb 2012, a subsidiary of State Security Networks Ltd The transfer of Security Network s operational, maintenance and development responsibility means that the tasks of these functions and of the personnel who do them will be discontinued in the current production units during the transition period the Defence Forces C4 Agency is the network operator and HALTIK Internal Security ICT Agency the service operator of the Security Network the transfer of functions will be implemented as transfers of business Osasto Security Network Project 2011 pp.kk.vvvv 12
13 Initialization of the Security Network A Security Network Act is intended to come into force on 1 January 2013 A Government proposal for a Government Security Network Act will be given to Parliament in September 2012 A Security Network Strategy has been ratified by the project s Steering Group on 12 March 2012 the strategy specifies Security Network services and funding as well as the steering of Security Network activity and transition periods The first security authority operating locations were integrated into the Security Network at the beginning of 2011 Osasto Security Network Project 2011 pp.kk.vvvv 13
14 Performance Development Path 201X Development of shared services 5. Shared corporate data 4. Data convergence SecNet X Shared services enable common planning and scenarios. Shared corporate data enables shared data storage and use. Data convergence enables data exchange 3. Shared data transfer - Other network services 2. Enabling data transfer - Infrastructure services 1. Shared network - transmission SecNet Shared secure network enables shared systems and services and secure use of dedicated systems 2009 Benefits 14
15 More Information Ministry of Finance Public Sector ICT Mr Olli Peltonen, Project Manager (switchboard) 15
The TORI project: 19 March 2013 Sari-Anne Hannula, Project Manager VM JulkICT function
The TORI project: bringing together domainindependent government ICT tasks 19 March 2013 Sari-Anne Hannula, Project Manager VM JulkICT function Government Programme Background > all functions of the State
Act on Background Checks
NB: Unofficial translation Ministry of Justice, Finland Act on Background Checks (177/2002) Chapter 1 General provisions Section 1 Scope of application (1) This Act applies to background checks, which
coordination structure
The national anti-fraud coordination structure By General Giovambattista Urso Florence, 9-10 May 2013 Community principles Article 325, Treaty on the Functioning of the European Union principle of assimilation,
The challenge of corporate safety and security
Safety and Security Engineering 821 The challenge of corporate safety and security M. Lanne & M. Räikkönen VTT Technical Research Centre of Finland Abstract Large organisations need to control several
Requirements for ICT Contingency Planning
MINISTRY OF FINANCE F inland Requirements for ICT Contingency Planning The Government Information Security Management Board 2b/2012 VAHTI Requirements for ICT Contingency Planning Government Information
OUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
DEFENCE INDUSTRY POLICY 2013-2022
DEFENCE INDUSTRY POLICY 2013-2022 Introduction Pursuant to Subsection 60 (1) of the Government of the Republic Act, the Ministry of Defence is responsible for developing the defence industry. Subsections
YOUTH GUARANTEE IS ON THE YOUNG PERSON'S SIDE! www.nuorisotakuu.fi 1
YOUTH GUARANTEE IS ON THE YOUNG PERSON'S SIDE! www.nuorisotakuu.fi 1 Contents What is the youth guarantee? Why the youth guarantee? Goals and messages of the youth guarantee Who implements the youth guarantee?
MEMORANDUM OF UNDERSTANDING
MEMORANDUM OF UNDERSTANDING BETWEEN THE GOVERNMENT OF THE KINGDOM OF SWEDEN AND THE MINISTRY OF DEFENCE OF THE KINGDOM OF DENMARK ON THE ENHANCED DEFENCE COOPERATION WITHIN THE AIR AND MARITIME DOMAIN
G-MOSAIC. Project introduction Luboš Kučera Gisat. Project managed by Sergio Proietti Telespazio S.p.A.
GMES services for Management of Operations, Situation Awareness and Intelligence for regional Crises Project introduction Luboš Kučera Gisat Project managed by Sergio Proietti Telespazio S.p.A. G-MOSAIC
Performance Management and Budgeting in Finland
1.2.6. Performance Management and Performance Based Budgeting Performance Management and Budgeting in Finland Panu Kukkonen Administrative Governance and Development The Content of the Presentation Finnish
How To Improve The Finnish Public Sector Information Resources
Memorandum VM040:00/2013 885/00.01.00.01/2013 1 (11) 19.10.2015 Public Sector ICT Ministry of Finance Anne Kauhanen-Simanainen Margit Suurhasko Mikael Vakkari Open Data Policy in the Finnish Government
Danish Emergency Management Agency. Crisis Management in Denmark
Danish Emergency Management Agency Crisis Management in Denmark 1 Crisis Management in Denmark Published by: Danish Emergency Management Agency Datavej 16 3460 Birkerød Phone: +45 45 90 60 00 Fax: +45
CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the
CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the DECISION PROMULGATING THE ACT ON THE SECURITY INTELLIGENCE SYSTEM OF THE REPUBLIC OF CROATIA
Cloud Security Standardisation & Certification. Arjan de Jong Policy Advisor Information Security
Cloud Security Standardisation & Certification Arjan de Jong Policy Advisor Information Security Overview Economics of standardization and certification (EU) Legal requirements for (cloud) security International
Statistics on Requests for data under the Data Retention Directive
Statistics on Requests for data under the Data Retention Directive Introduction 1. Directive 2006/24/EC on data retention ('the DRD') 1 requires Member States to provide the Commission on a yearly basis
The Security Technologies Industry in Germany
Chris Schmidt - istockphoto Industry Forum on Security Technology and Chemicals 14 th December 2011 in Tel Aviv, Israel Jérôme Hull Manager Mechanical & Electronical Technologies Germany Trade & Invest
Internet of Things Development for the Promotion of Information Economy
2015/SOM2/TEL51/DSG/009 Agenda Item: 4.2 Internet of Things Development for the Promotion of Information Economy Purpose: Information Submitted by: China ICT Development Steering Group Meeting Boracay,
New Mobile Network Enhances Public Safety in Finland
Case Studies, M. Basso Research Note 8 July 2003 New Mobile Network Enhances Public Safety in Finland A private network based on TETRA technology is revolutionizing public safety in Finland. The Virve
Cyber Security Strategy
2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...
COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL
EUROPEAN COMMISSION Brussels, 8.7.2014 COM(2014) 451 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Better situational awareness by enhanced cooperation across maritime
Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva
Finnish Cyber Security Strategy Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva 1 Changing threat landscape 2 Annual losses caused by cybercrime over $400 billion
CYBER SECURITY. Marcin Olender Head of Unit Information Society Department
CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November
Your. Tax Dollar. Here s a quick overview of where your Tax Dollar went and how it was raised in the Fiscal year ended March 31, 2012
Your Tax Dollar Here s a quick overview of where your Tax Dollar went and how it was raised in the Fiscal year ended March 31, 2012 Table of Contents Transfer payments 3 Transfers to persons 4-6 Transfers
Secure telephony via classic and IP networks. office security solutions
Secure telephony via classic and IP networks office security solutions Every kind of telephone technology has its information risks... Telephone conversations are still a core function of daily communications
NATO Flirting with a More Comprehensive Approach to Alliance Security
Analysis, Modeling, Simulation and Experimentation NATO Flirting with a More Comprehensive Approach to Alliance Security 13 th ICCRTS June 17-19 2008 Mark N. Clemente Senior Effects-Based Analyst The Boeing
SAR Co-operation Plan. Parts 3 6
SAR Co-operation Plan Parts 3 6 Contents Introduction... 1 Description of a SAR Co-operation Plan... 1 Corrections and Updating... 1 Part 3 Maritime Rescue Co-ordination Centre and Sub-centre... 2 3.1
Finland s Cyber security Strategy
Finland s Cyber security Strategy FINLAND S CYBER SECURITY STRATEGY Government Resolution 24.1.2013 1 TABLE OF CONTENTS 1. INTRODUCTION... 1 2. VISION FOR CYBER SECURITY... 3 3. CYBER SECURITY MANAGEMENT
Freedom, Security, Privacy. European Home Affairs in an open world
Freedom, Security, Privacy European Home Affairs in an open world istockphoto.com/frankydemeyer, sam.7 Report of the Informal High Level Advisory Group on the Future of European Home Affairs Policy ( The
Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018
Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Summary in English of the Icelandic National Cyber Security Strategy approved by the Minister of the Interior in April 2015
Rules for the Public Administration
Cloud Computing & Healthcare Rules for the Public Administration Daniele Tatti [email protected] @DanieleTatti In the next 12 minutes What is DigitPA European scenario Cloud related activities ehealth
On the European experience in critical infrastructure protection
DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV [email protected] @ratchevv DCAF/CSDM 1 This presentation
CBRN National Action Plans
Chemical Biological Radiological Nuclear Risk Mitigation - Centres of Excellence CBRN National Action Plans Irakli Beridze Senior Strategy and Policy Advisor UNICRI Jointly implemented by the EC JRC and
MINISTRY OF AGRICULTURE OF HUNGARY
MINISTRY OF AGRICULTURE OF HUNGARY Introduction of the institutional framework of the Administration of the Hungarian Agriculture International Development Cooperation of the Ministry of Agriculture of
The Crisis Management System in Germany
The Crisis Management System in Germany www.bmi.bund.de Last update: January 2010 Contents Preliminary remarks... 5 1. Background... 5 2. Legal framework... 8 3. Crisis management at the federal level..
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
www.gipfelsoli.org http://euro-police.noblogs.org
www.gipfelsoli.org http://euro-police.noblogs.org Proactive Repression IMF: More public disorder "Economy-related riots and unrest in various global markets if the financial crisis is not addressed and
International Classification of Business Functions
ESA/STAT/AC.234/27 13 May 2011 UNITED NATIONS DEPARTMENT OF ECONOMIC AND SOCIAL AFFAIRS STATISTICS DIVISION Expert Group meeting on International economic and social classifications New York, 18-20 May
National Security Auditing Criteria (KATAKRI) version II, 2011
FINNISH NATIONAL SECURITY AUTHORITY National Security Auditing Criteria (KATAKRI) version II, 2011 This translation of the Finnish KATAKRI criteria has been slightly modified from the national version
Rescue services in Finland
Rescue services in Finland 2 Rescue services in Finland Accident prevention. Rescue operations. Preparedness and civil defence. Ready to deal with all types of incidents from the very minor to major disasters.
$1 Items included in these Supplementary Estimates
The following table presents authorities requested by organizations in $1 items. The underlined text indicates the authority being sought. Agriculture and Agri-Food Agriculture and Agri-Food Department
FINLAND S CYBER SECURITY STRATEGY. Background dossier
FINLAND S CYBER SECURITY STRATEGY Background dossier TABLE OF CONTENTS 1. INTRODUCTION... 3 2. CYBER DOMAIN AND CYBER THREAT... 3 3. PRINCIPLES OF CYBER SECURITY MANAGEMENT AND... THE MANAGEMENT OF DISTURBANCES...
Finnish Security Intelligence Service
Finnish Security Intelligence Service CONTENTS 4 Preventive task 7 National Counterterrorism Strategy 10 Operating environment 14 Counterterrorism 20 Countering of illegal intelligence 26 Security work
Response to the European Commission s consultation on the legal framework for the fundamental right to protection of personal data
Stockholm: Göteborg: Malmö: 105 24 Stockholm Box 57 Box 4221 Fax 08 640 94 02 401 20 Göteborg 203 13 Malmö Plusgiro: 12 41-9 Org. Nr: 556134-1248 www.intrum.se Bankgiro: 730-4124 [email protected] Response
Improving the fire safety of elderly people and reducing fire deaths
Improving the fire safety of elderly people and reducing fire deaths Olli-Pekka Ojanen Chief Executive Officer Tampere Regional Rescue Department Working group: Seppo Männikkö, Jouni Honkanen, Markku Suominen,
Ministry of Transport, Public Works and Water Management Bob Oudshoorn
PREVENTION CRIMINALITY IN ROAD TRANSPORT Ministry of Transport, Public Works and Water Management Bob Oudshoorn 29 april 2009 Covenant Tackling Crime in Road Transport Sector 50% of the enterprises are
Cyberspace Situational Awarness in National Security System
Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, [email protected], [email protected]
The New Dose Rate Monitoring Network in Finland
The New Dose Rate Monitoring Network in Finland Radiation and Nuclear Safety Authority Environmental surveillance and preparedness Head of Laboratory Kaj Vesterbacka September 20, 2007 RADIATION AND NUCLEAR
Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY
Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY December 2013 Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND
Database to support inter-psap communications in Europe CEPT/ECC Feasibility Study. Freddie McBride, European Communications Office
Database to support inter- communications in Europe CEPT/ECC Feasibility Study Freddie McBride, European Communications Office EENA Members Workshop Brussels, 19-20 October 2015 CEPT/ECC/WG NaN Organisation
EU Cybersecurity: Ensuring Trust in the European Digital Economy
EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'
THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA
INSTRUMENT FOR PRE-ACCESSION ASSISTANCE (IPA II) 2014-2020 THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA Implementation of business continuity and disaster recovery system phase 2 Action Summary The overall
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
Regulatory Framework for Disaster Recovery Planning for the ICT Industry
Regulatory Framework for Disaster Recovery Planning for the ICT Industry Kingdom of Saudi Arabia Regulatory Framework for Disaster Recovery Planning for the ICT Industry Page 1 of 6 1. INTRODUCTION 1.1
Cyber Security VTT and the Finnish Approach
Cyber Security VTT and the Finnish Approach September 22, 2015 Reijo Savola, Principal Scientist CHALLENGES Explosive increase in number and impact of cyber security attacks Use of Internet technologies
The German interagency approach to SSA
Lieutenant Colonel (GS) Karsten Auras, German Air Force Headquarters, 1 I b Space Concepts Presentation for the 2015 Japan Space Forum SSA Symposium, Tokyo, Japan The German interagency approach to SSA
Ensuring operational continuity
Certification of BCMS (Business Continuity Management Systems) Standard BS 25999-2 Certification of BCMS (Business Continuity Management System Ensuring operational continuity in the event of interruptions,
Final reports on deepened defence cooperation between Finland and Sweden
Final reports on deepened defence cooperation between Finland and Sweden Report by the Finnish Defence Forces and the Swedish Armed Forces 1 Background In this joint final report the Finnish Defence Forces
European Organization for Security (EOS) - Description and Envisaged Activities for 2012
European Organization for Security (EOS) - Description and Envisaged Activities for 2012 EOS Objectives and Activities EOS is a tool for European security stakeholders for the comprehensive implementation
H2020-EUJ-2016: EU-Japan Joint Call. EUJ-02-2016: IoT/Cloud/Big Data platforms in social application contexts
H2020-EUJ-2016: EU-Japan Joint Call EUJ-02-2016: IoT/Cloud/Big Data platforms in social application contexts EUJ-02-2016: IoT/Cloud/Big Data The Challenge The Integration and federation of IoT with Big
successstory Security for Diplomacy High Security for Embassy Networks
successstory Security for Diplomacy High Security for Embassy Networks Today the consistent deployment of strong cryptography, along with key management that regulates access to data, are the only ways
ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
The guidance will be developed over time in the light of practical experience.
Freedom of Information Act Awareness Guidance No. 14 International Relations The Information Commissioner s Office (ICO) has produced this guidance as part of a series of good practice guidance designed
Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union
Council of the European Union Brussels, 4 July 2014 (OR. en) 11603/14 ADD 1 COVER NOTE From: date of receipt: 2 July 2014 To: No. Cion doc.: Subject: RECH 323 TELECOM 140 MI 521 DATAPROTECT 100 COMPET
Targeting and reporting performance - Finnish experiences
1.2.6 Performance Management and Performance Based Budgeting Day 4 Targeting and reporting performance - Finnish experiences Mr Heikki Joustie 20 January 2011 20 years of result orientation Lump sum budgets
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com [email protected] David T.S. Fraser Partner McInnes Cooper [email protected]
ValueSec use case scenario: Alcohol abuse intervention in Finland
ValueSec use case scenario: Alcohol abuse intervention in Finland Director Tarja Mankkinen Ministry of the Interior Finland Brussels, 10 th December 2013 7.1.2014 Government Programme, 22 June 2011: The
Egyptian Best Practices Securing E-Services
Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats
Agile Information Security Management in Software R&D
Agile Information Security Management in Software R&D Rational and WebSphere User Group Finland Seminar 29.01.2008 Reijo Savola Network and Information Security Research Coordinator VTT Technical Research
The internet and digital technologies play an integral part
The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet
