La Gestione delle Infrastrutture Critiche. Prof. Roberto Setola Unità di Ricerca di AUTOMATICA Facoltà Dipartimentale di Ingegneria

Size: px
Start display at page:

Download "La Gestione delle Infrastrutture Critiche. Prof. Roberto Setola Unità di Ricerca di AUTOMATICA Facoltà Dipartimentale di Ingegneria"

Transcription

1 La Gestione delle Infrastrutture Critiche Prof. Roberto Setola Unità di Ricerca di AUTOMATICA Facoltà Dipartimentale di Ingegneria

2 La Gestione delle Infrastrutture Critiche Modellazione Identificazione Controllo Problem driven COSERITY Lab Laboratorio Sistemi Complessi & Sicurezza

3 Ongoing EU Projects Collaborations Past EU Projects Ongoing National Projects PNMR SIM CIA Cyber Keiron

4 Threat - Vulnerability Path Identification for Critical Infrastructures Developing a comprehensive and multi-dimensional all-hazards catalogue for critical infrastructures

5 Sensors SWITCH RISK PREDICTOR Pumps PLC SCADA (ifix) HMI IDS EXPERT SYSTEM FAULT DETECTION Valves 5

6 METRIP MEthodological Tools for Railway Infrastructure Protection De Cillis, F., De Maggio, M. C., Pragliola, C., & Setola, R. (2013). Analysis of criminal and terrorist related episodes in railway infrastructure scenarios. Journal of Homeland Security and Emergency Management, 10(2).

7

8 CI Operators DSS operator Critical Infrastructure Preparedness and Resilience Research NoE CI response on system of systems models Civil Protection and Local Authorities Simulator European Infrastructure Simulation & Analysis Center 7 July

9 (Real-time) hazard analysis Direct impact analysis First order impact analysis 0 CISIA (terminato) Residential 1 (FU) Residential 5 (FU) 800 Residential 2 (FU) Residential 4 (FU) Residential 6 (FU) Residential 3 (FU) PS 1 SS1 SS2 SS3 SS4 SS5 SS6 SS7 SS8 PS 2 Communication Hospital 2 (FU) Hospital 1 (FU) Telco BTS 1 (PAU) Water Water Pump 1 (SAU) Water Pump 2 (SAU) 1000 Minuto 10 Livelli:. ooo Telco BTS Master Telco BTS 2 (PAU) (SAU) Communication 7 July Communication Communication Water Higher order impact analysis

10 Risk Assessment Workflow Manager GIS Interface Impact Reporting Interface Consequence Reporting Interface Service Manager B1- Monitoring of Natural phenomena B2 - Prediction of Natural disasters and Event Detection B3 - Prediction of physical harm scenarios B4 - Estimation of impacts and consequences B5 - Support of efficient strategies for crisis scenarios. Persistence Layer Simulation Manager Information Sharing and Collaboration Module Security Data Access Manager

11 Damage estimate 11

12 Wealth function

13 Service Access Wealth (SAW) Indices

14 Inter-Dependency Input Output Inoperability (IIM) 0 * * * * 0 * * A * * 0 * * * * 0 a j i ij influence gain dependency index a i j ij Statistical data Expert knowledge Setola, R., De Porcellinis, S., & Sforna, M. (2009). Critical infrastructure dependency assessment using the input output inoperability model. International Journal of Critical Infrastructure Protection,

15 Dependency level vs. operating conditions and outage duration 0,25 Fuel & Petroleum 0,2 0,15 0,1 Air transportation Naval Ports 0,05 Finance F. Conte, G. Oliva and R. Setola, Time varying Input- Output inoperability model, International Journal on Infrastructure Systems, <1h 1h-6h 6h-12h 12h-24h 24h-48h Air Transportation TLC Wired TLC Wireless Water Management Rail Transportation Finance Naval Ports Fuel & Petroleum Grid Natural Gas Satellite Communication & Navigation

16 IIM Fuzzy System To manage uncertainty, the variables can be modelled as fuzzy numbers (believeness degree) Oliva, Gabriele, Stefano Panzieri, and Roberto Setola. "Discrete-time linear systems with fuzzy dynamics." Journal of Intelligent and Fuzzy Systems 27.3 (2014):

17 Worst case Most believed case Best case Oliva, Gabriele, Stefano Panzieri, and Roberto Setola. "Distributed consensus under ambiguous information." International Journal of System of Systems Engineering 4.1 (2013):

18 Criticality map Dependency index Oliva, G., Setola, R., & Barker, K. (2014). Fuzzy Importance Measures for Ranking Key Interdependent Sectors Under Uncertainty. Reliability, IEEE Transactions on, Influence gain

19 7/2/ In fault January 31, 2014 Working

20 Electrical System # impacted people 65+ July 10,

21 ACEA Rome HT/MT/LT Control Room 7/2/

22

Integrated On-Line Risk Prediction: Think Globally and Act Locally. Dr. Chiara Foglietta, chiara.foglietta@uniroma3.it

Integrated On-Line Risk Prediction: Think Globally and Act Locally. Dr. Chiara Foglietta, chiara.foglietta@uniroma3.it Integrated On-Line Risk Prediction: Think Globally and Act Locally Dr. Chiara Foglietta, chiara.foglietta@uniroma3.it Final Workshop Rome, December 16th, 2014 Motivation and Background Power Grid Operating

More information

CIPS 2011 Awarded Grants. Project number Applicant's name Ctry Title Description Grant

CIPS 2011 Awarded Grants. Project number Applicant's name Ctry Title Description Grant CIPS 2011 Awarded Grants Project number Applicant's name Ctry Title Description Grant HOME/2011/CIPS/AG/2012 NATIONAL INSTUTE COMMUNICATION TECHNOLOGIES (INTECO) ES SCADA laboratory and testbed as a service

More information

Antonio Di Pietro. antonio.dipietro@enea.it Italian

Antonio Di Pietro. antonio.dipietro@enea.it Italian CURRICULUM VITAE PERSONAL INFORMATION First name / Surname City Rome Telephone 39-339 48 92 925 39-06 3048 3821 Fax 39-06 3048 6511 E-mails Nationality Date of birth 08.25.1978 Gender antonio.dipietro@enea.it

More information

Technology applied to the most innovative and demanding sectors of the market.

Technology applied to the most innovative and demanding sectors of the market. STE is an Italian medium sized private Systems Integration Company leader in Information and Communication Technology applied to the most innovative and demanding sectors of the market. Established on

More information

Critical Infrastructure Security and Resilience

Critical Infrastructure Security and Resilience U.S. Department of Homeland Security in partnership with the National Coordination Office for Space-Based Positioning, Navigation and Timing Critical Infrastructure Security and Resilience International

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

Infrastructure Interdependencies

Infrastructure Interdependencies Infrastructure Interdependencies Terrence K. (Terry) Kelly, Ph.D. Senior National Security Officer White House Office of Science and Technology Policy based in part on an article to appear in IEEE Control

More information

Det talte ord gælder

Det talte ord gælder Thank you for the invitation. I m pleased to be given this opportunity to speak to you about Homeland Security, seen from my point of view. Homeland Security is a concept we ve all grown very familiar

More information

Progetti di ricerca internazionali

Progetti di ricerca internazionali Progetti di ricerca internazionali 2014 URANIUM - Unified Risk Assessment Negotiation via Interoperability Using Multi-sensor data Prevention Preparedness and Consequence Management of Terrorism and other

More information

D 8.2 DELIVERABLE PROJECT INFORMATION

D 8.2 DELIVERABLE PROJECT INFORMATION D 8.2 DELIVERABLE PROJECT INFORMATION Project Title: Acronym: Systemic Seismic Vulnerability and Risk Analysis for Buildings, Lifeline Networks and Infrastructures Safety Gain SYNER-G Project N : 244061

More information

Methods for Assessing Vulnerability of Critical Infrastructure

Methods for Assessing Vulnerability of Critical Infrastructure March 2010 Methods for Assessing Vulnerability of Critical Infrastructure Project Leads Eric Solano, PhD, PE, RTI International Statement of Problem Several events in the recent past, including the attacks

More information

Security systems URBAN SECURITY. Information systems protecting major cities with a main goal: to guarantee citizen s well being. indracompany.

Security systems URBAN SECURITY. Information systems protecting major cities with a main goal: to guarantee citizen s well being. indracompany. Security systems URBAN SECURITY Information systems protecting major cities with a main goal: to guarantee citizen s well being indracompany.com isafety Urban Security Supports and strengthens coordination

More information

Threat and Hazard Identification and Risk Assessment

Threat and Hazard Identification and Risk Assessment Threat and Hazard Identification and Risk Assessment General Overview National Preparedness Directorate/National Integration Center April, 2015 Overview Background on the Threat and Hazard Identification

More information

Cybersecurity Converged Resilience :

Cybersecurity Converged Resilience : Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the

More information

Wireless Sensor Networks (WSN) for Distributed Solar Energy in Smart Grids

Wireless Sensor Networks (WSN) for Distributed Solar Energy in Smart Grids Wireless Sensor Networks (WSN) for Distributed Solar Energy in Smart Grids Dr. Driss Benhaddou Associate Professor and Fulbright Scholar University of Houston, TX dbenhaddou@uh.edu 06/26/2014 Outline Background

More information

GLOBAL VIRTUAL. Global Virtual Conference April, 8. - 12. 2013. SECTION 19. Information Technology

GLOBAL VIRTUAL. Global Virtual Conference April, 8. - 12. 2013. SECTION 19. Information Technology Computerized risk detection towards Critical Infrastructure Protection: An Introduction of CockpitCI Project Jianmin Jiang Department of Computing, University of Surrey, Guildford, GU2 7XH, United Kingdom.

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013 THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

More information

Il Ruolo delle Università nelle politiche di sicurezza cibernetica e di protezione delle infrastrutture critiche per il Paese

Il Ruolo delle Università nelle politiche di sicurezza cibernetica e di protezione delle infrastrutture critiche per il Paese Il Ruolo delle Università nelle politiche di sicurezza cibernetica e di protezione delle infrastrutture critiche per il Paese Roberto Baldoni (baldoni@dis.uniroma1.it) www.cis.uniroma1.it 4th Conference

More information

CYBER SECURITY GUIDANCE

CYBER SECURITY GUIDANCE CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires

More information

Establishing A Secure & Resilient Water Sector. Overview. Legislative Drivers

Establishing A Secure & Resilient Water Sector. Overview. Legislative Drivers Establishing A Secure & Resilient Water Sector December 14-15, 2010 LWQTC Overview Key Drivers Legislation Presidential Directives AWWA & Sector Initiatives Standards & Guidance Mutual Aid & Assistance

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION ALBERTO AL HERNANDEZ, ARMY RESERVE OFFICER, SOFTWARE ENGINEER PH.D. CANDIDATE, SYSTEMS ENGINEERING PRESENTATION

More information

Solving Big Data Challenges US Electric Utility Industry

Solving Big Data Challenges US Electric Utility Industry 1 Solving Big Data Challenges US Electric Utility Industry IEEE PES Meeting July 29, 2014 Sunil Pancholi 2 Agenda Smart Grid and Big Data Lockheed Martin Big Data Expertise Lockheed Martin Solutions in

More information

Cyber security: Practical Utility Programs that Work

Cyber security: Practical Utility Programs that Work Cyber security: Practical Utility Programs that Work Securing Strategic National Assets APPA National Conference 2009 Michael Assante Vice President & CSO, NERC June 15, 2009 The Electric Grid - Challenges

More information

Control of Boiler Operation using PLC SCADA

Control of Boiler Operation using PLC SCADA Control of Boiler Operation using PLC SCADA K. Gowri Shankar Abstract This paper outlines the various stages of operation involved in the conversion of a manually operated boiler towards a fully automated

More information

Cisco Disaster Recovery: Best Practices White Paper

Cisco Disaster Recovery: Best Practices White Paper Table of Contents Disaster Recovery: Best Practices White Paper...1 Introduction...1 Performance Indicators for Disaster Recovery...1 High Level Process Flow for Disaster Recovery...2 Management Awareness...2

More information

High rate and Switched WiFi. WiFi 802.11 QoS, Security 2G. WiFi 802.11a/b/g. PAN LAN Cellular MAN

High rate and Switched WiFi. WiFi 802.11 QoS, Security 2G. WiFi 802.11a/b/g. PAN LAN Cellular MAN Security Issues and Quality of Service in Real Time Wireless PLC/SCADA Process Control Systems Dr. Halit Eren & Dincer Hatipoglu Curtin University of Technology (Perth Australia) 2/27/2008 1 PRESENTATION

More information

Prepared by Rod Davis, ABCP, MCSA November, 2011

Prepared by Rod Davis, ABCP, MCSA November, 2011 Prepared by Rod Davis, ABCP, MCSA November, 2011 Disaster an event, which causes the loss of an essential service, or part of it, for a length of time which imperils mission achievement. (Andrew Hiles,

More information

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards A Concise Model to Evaluate Security of SCADA Systems based on Security Standards Nasser Aghajanzadeh School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran Alireza Keshavarz-Haddad

More information

An ESRI White Paper May 2007 GIS Supporting the Homeland Security Mission

An ESRI White Paper May 2007 GIS Supporting the Homeland Security Mission An ESRI White Paper May 2007 GIS Supporting the Homeland Security Mission ESRI 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB www.esri.com Copyright

More information

Energy Infrastructure Security: Advanced multidimensional threats and responses. By John Cogliandro November 17, 2009

Energy Infrastructure Security: Advanced multidimensional threats and responses. By John Cogliandro November 17, 2009 Energy Infrastructure Security: Advanced multidimensional threats and responses By John Cogliandro November 17, 2009 Outline Energy Infrastructure Security: Advanced multidimensional threats and responses

More information

SMART ENERGY. The only cloud that speeds up your. cloud services. broadband for smart grids. Last Mile Keeper

SMART ENERGY. The only cloud that speeds up your. cloud services. broadband for smart grids. Last Mile Keeper SMART ENERGY cloud services broadband for smart grids Last Mile Keeper The only cloud that speeds up your Energy Management System Introduction Smart Grids are the result of the merging between power and

More information

Outage Reporting in the US

Outage Reporting in the US Outage Reporting in the US Richard Krock September, 2010 Outage Reporting in the US Formal Processes Other Processes Best Practices Proposed Requirements ARECI guidance on information sharing 2 R. Krock

More information

Privacy and Security in Healthcare

Privacy and Security in Healthcare 5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical

More information

Cybersecurity Risk Assessment in Smart Grids

Cybersecurity Risk Assessment in Smart Grids Cybersecurity Risk Assessment in Smart Grids Lucie Langer, Paul Smith, Thomas Hecht firstname.lastname@ait.ac.at AIT Austrian Institute of Technology ComForEn Symposium 2014 Sept 30, 2014 1 Risk Assessment:

More information

Lessons Learned from a Basic Vulnerability Assessment and Emergency Response Plan Update Project in Greensboro

Lessons Learned from a Basic Vulnerability Assessment and Emergency Response Plan Update Project in Greensboro Lessons Learned from a Basic Vulnerability Assessment and Emergency Response Plan Update Project in Greensboro Steve Drew, Director, Greensboro Water Resources Department Jack Moyer, Carolinas / Tennessee

More information

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks CIBSI 2013 Panama City, Panama, October 30 th, 2013 On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks Paulo Simões, Tiago Cruz, Jorge Gomes, Edmundo Monteiro psimoes@dei.uc.pt

More information

Test di sicurezza in ambienti Smart Grid e SCADA

Test di sicurezza in ambienti Smart Grid e SCADA Test di sicurezza in ambienti Smart Grid e SCADA Simone Riccetti, IBM Italy simone.riccetti@it.ibm.com Agenda SCADA/Smart Grid overview SCADA/Smart Grid security issues Security test challenges Testing

More information

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

More information

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies

More information

Business Continuity & Disaster Recovery

Business Continuity & Disaster Recovery Business Continuity & Disaster Recovery Safety First Quality Every Time 1 Business Continuity & Disaster Recovery Planning Who here has a formal Business Continuity & Disaster Recovery plan? The purpose

More information

Panel Session: Lessons Learned in Smart Grid Cybersecurity

Panel Session: Lessons Learned in Smart Grid Cybersecurity PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory

More information

Italian Experiences in the Management of Dangerous Goods Transport

Italian Experiences in the Management of Dangerous Goods Transport Italian Experiences in the Management of Dangerous Goods Transport Luca Studer, Laboratory for Mobility and Transport, Politecnico di Milano, Dep. INDACO UdR DIS EasyWay 2008 Elena Caprile, Giovanna Marchionni,

More information

EU CIP Project DENSEK. Joining forces against cyber threats on European level

EU CIP Project DENSEK. Joining forces against cyber threats on European level EU CIP Project DENSEK Joining forces against cyber threats on European level DENSEK EU CIP Objectives Improving the resilience of the energy infrastructure i.e. improving the security of the Smart Energy

More information

A COLLABORATIVE APPROACH TO INTERDEPENDENCY ANALYSIS OF REGIONAL CI

A COLLABORATIVE APPROACH TO INTERDEPENDENCY ANALYSIS OF REGIONAL CI A COLLABORATIVE APPROACH TO INTERDEPENDENCY ANALYSIS OF REGIONAL CI Irène CLOUTIER, M.A. Benoît ROBERT, ing., Ph.D. Luciano MORABITO, ing. Jr. Centre risque & performance (CRP) École Polytechnique de Montréal

More information

Public Safety and Homeland Security. National Broadband Plan Recommendations

Public Safety and Homeland Security. National Broadband Plan Recommendations Public Safety and Homeland Security National Broadband Plan Recommendations Nationwide Interoperable Public Safety Wireless Broadband Network Broadband Network Strategy Vision: For significantly less then

More information

New Era in Cyber Security. Technology Development

New Era in Cyber Security. Technology Development New Era in Cyber New Era in Cyber Security Security Technology Technology Development Development Combining the Power of the Oil and Gas Industry, DHS, and the Vendor Community to Combat Cyber Security

More information

Disaster management challenges in the Danube region related to environmental risks

Disaster management challenges in the Danube region related to environmental risks MINISTRY OF INTERIOR NATIONAL DIRECTORATE GENERAL FOR DISASTER MANAGEMENT Disaster management challenges in the Danube region related to environmental risks Ágnes Rajacic, project manager National Disaster

More information

Advanced Distribution Grid Management for Smart Cities

Advanced Distribution Grid Management for Smart Cities Smart Grid Solutions Advanced Distribution Grid Management for Smart Cities Kevin Corcoran, Director Product Line Management IEEE SmartGridComm 2015 Miami, FL Bridging Smart Cities & Smart Grids Common

More information

Secure SCADA Summit. Dan Mintz, CTO. Civil Health Services Group dmintz@csc.com. Twitter: technogeezer, December 2009

Secure SCADA Summit. Dan Mintz, CTO. Civil Health Services Group dmintz@csc.com. Twitter: technogeezer, December 2009 Secure SCADA Summit Dan Mintz, CTO Civil Health Services Group dmintz@csc.com Twitter: technogeezer, December 2009 For 50 years, CSC Has Helped Clients Ride Every Major Business- Driven Technology Wave

More information

Complete SCADA solution for Remote Monitoring and Control

Complete SCADA solution for Remote Monitoring and Control Complete SCADA solution for Remote Monitoring and Control FF-Automation (founded 1976) manufactures AutoLog RTUs, designs and supplies complete automation SCADA solutions for remote monitoring and control

More information

Flood Emergency Management at Morava River

Flood Emergency Management at Morava River Flood Emergency Management at Morava River an example for emergency management planning from Austria Albert SCHWINGSHANDL Markus VOLLMANN Consulting Engineers for Water Management and Environmental Informatics

More information

Traffic Monitoring and Control Systems and Tools

Traffic Monitoring and Control Systems and Tools Traffic Monitoring and Control Systems and Tools Roberto Horowitz Professor Mechanical Engineering PATH Director Pravin Varaiya Professor in the Graduate School EECS Carlos Canudas de Wit Director of Research

More information

Cyber Security of the Power Grid

Cyber Security of the Power Grid Cyber Security of the Power Grid Chen-Ching Ching Liu Professor of Power Systems University College Dublin Research for Ireland s Future Ireland -Country of natural beauty -Quality of life ranked among

More information

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary May 2007 Environmental Protection Agency Executive Summary

More information

Security Systems EMERGENCY MANAGEMENT. In security you cannot choose the second best option. indracompany.com

Security Systems EMERGENCY MANAGEMENT. In security you cannot choose the second best option. indracompany.com Security Systems EMERGENCY MANAGEMENT In security you cannot choose the second best option indracompany.com EMERGENCY MANAGEMENT EMERGENCY MANAGEMENT EMERGENCY C4i CENTRE Crisis management and preparednesss

More information

A Grid-enabled Workflow System for Reservoir Uncertainty Analysis

A Grid-enabled Workflow System for Reservoir Uncertainty Analysis UCoMS A Grid-enabled Workflow System for Reservoir Uncertainty Analysis Emrah Ceyhan, Gabrielle Allen, Chris White, Tevfik Kosar* Center for Computation & Technology Louisiana State University June 23,

More information

v. 03/03/2015 Page ii

v. 03/03/2015 Page ii The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course

More information

BRIDGING THE GAP BETWEEN EMERGENCY MANAGEMENT AND TRANSPORTATION. Sheena Connolly Open Roads Consulting

BRIDGING THE GAP BETWEEN EMERGENCY MANAGEMENT AND TRANSPORTATION. Sheena Connolly Open Roads Consulting BRIDGING THE GAP BETWEEN EMERGENCY MANAGEMENT AND TRANSPORTATION Sheena Connolly Open Roads Consulting Your Perspective on Transportation 1. What s your perspective on transportation? (e.g. experience,

More information

Severe Weather Event Grid Damage Forecasting

Severe Weather Event Grid Damage Forecasting Severe Weather Event Grid Damage Forecasting Meng Yue On behalf of Tami Toto, Scott Giangrande, Michael Jensen, and Stephanie Hamilton The Resilience Smart Grid Workshop April 16 17, 2015 Brookhaven National

More information

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests

More information

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios Lucie Langer and Paul Smith firstname.lastname@ait.ac.at AIT Austrian Institute of Technology ComForEn Workshop Monday 29 th September,

More information

Description of Homeland Security

Description of Homeland Security Majoring in.... Homeland Security Description of Homeland Security What is homeland security? Homeland security and emergency preparedness (the official name of the major) is the study of international

More information

Network Security Landscape

Network Security Landscape Cole p01.tex V3-07/28/2009 3:46pm Page 1 Network Security Landscape COPYRIGHTED MATERIAL IN THIS PART Chapter 1 State of Network Security Chapter 2 New Approaches to Cyber Security Chapter 3 Interfacing

More information

WP 7: Build prototype software

WP 7: Build prototype software Systemic Seismic Vulnerability and Risk Analysis for Buildings, Lifeline Networks and Infrastructures Safety Gain WP 7: Build prototype software D. Schäfer, VCE A. Bosi, VCE T. Gruber, VCE H. Wenzel, VCE

More information

Department of Homeland Security Office for Domestic Preparedness. Campus Preparedness Assessment Process

Department of Homeland Security Office for Domestic Preparedness. Campus Preparedness Assessment Process Department of Homeland Security Office for Domestic Preparedness Campus Preparedness Assessment Process Campus Preparedness Assessment-Overview Purpose of the CPA Elements of the CPA How to use the CPA

More information

The death valley of innovation

The death valley of innovation The death valley of innovation The methaphor and some comments from the field Prof. Paolo Gaudenzi Dipartimento di Ingegneria Meccanica e Aerospaziale Life & path of an innovative project in France Or

More information

The Strategic Importance, Causes and Consequences of Terrorism

The Strategic Importance, Causes and Consequences of Terrorism The Strategic Importance, Causes and Consequences of Terrorism How Terrorism Research Can Inform Policy Responses Todd Stewart, Ph.D. Major General, United States Air Force (Retired) Director, Program

More information

How To Protect The Railway From Attack

How To Protect The Railway From Attack FOCUS Security Research projects No 1 - November 2014 In its role as technical platform and forum for gathering and expressing members ideas, UIC is able to synthesise these research needs, along with

More information

Hybrid Simulation von Kommunikationsnetzen für das Smart Grid

Hybrid Simulation von Kommunikationsnetzen für das Smart Grid für das Smart rid Hanno eorg 15.11.2013 Faculty of Electrical Engineering & Information Technology Communication Networks Institute Prof. Dr.-Ing. Christian Wietfeld für das Smart rid Overview Motivation

More information

Solutions and IT services for Oil-Gas & Energy markets

Solutions and IT services for Oil-Gas & Energy markets Solutions and IT services for The context Companies operating in the Oil-Gas & Energy sectors are facing radical changes that have a significant impact on their business processes. In this context, compliance

More information

Homeland Security Solutions

Homeland Security Solutions Homeland Security Solutions Homeland Security - RAD Solutions Many organizations in the public and private sectors today require Homeland Security (HLS) systems: Defense agencies and defense industries,

More information

SCADA / Smart Grid Security Who is really in control of our Control Systems?

SCADA / Smart Grid Security Who is really in control of our Control Systems? SCADA / Smart Grid Security Who is really in control of our Control Systems? Simone Riccetti Certified SCADA Security Architect Agenda Overview of Security landscape SCADA security problem How to protect

More information

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative Final Draft/Pre-Decisional/Do Not Cite Forging a Common Understanding for Critical Infrastructure Shared Narrative March 2014 1 Forging a Common Understanding for Critical Infrastructure The following

More information

BUSINESS CONTINUITY PLANNING

BUSINESS CONTINUITY PLANNING Policy 8.3.2 Business Responsible Party: President s Office BUSINESS CONTINUITY PLANNING Overview The UT Health Science Center at San Antonio (Health Science Center) is committed to its employees, students,

More information

Opportunities to Overcome Key Challenges

Opportunities to Overcome Key Challenges The Electricity Transmission System Opportunities to Overcome Key Challenges Summary Results of Breakout Group Discussions Electricity Transmission Workshop Double Tree Crystal City, Arlington, Virginia

More information

Secure Access Solutions for the Petroleum Industry. Secure. Easy. Protected. Access.

Secure Access Solutions for the Petroleum Industry. Secure. Easy. Protected. Access. for the Petroleum Industry Secure. Easy. Protected. Access. Cybersecurity A Growing Concern for Oil Companies Oil and gas companies utilize Supervisory Control and Data Acquisition Systems (SCADA) to control

More information

INSPIRE: INcreasing Security and Protection through Infrastructure REsilience

INSPIRE: INcreasing Security and Protection through Infrastructure REsilience INSPIRE: INcreasing Security and Protection through Infrastructure REsilience Salvatore D Antonio Consorzio Interuniversitario Nazionale per l Informatica saldanto@unina.it CRITIS 2008 - Frascati (Italy)

More information

CenterPoint Energy drives smart grid analytics through the power of GIS

CenterPoint Energy drives smart grid analytics through the power of GIS IBM Software Group CenterPoint Energy drives smart grid analytics through the power of GIS Business Challenge Like the rest of the electric transmission and distribution industry, CenterPoint Energy needs

More information

Using Big Data for Crisis Management. Mohammad Khaled AL Hassan

Using Big Data for Crisis Management. Mohammad Khaled AL Hassan Using Big Data for Crisis Management Mohammad Khaled AL Hassan Agenda 1 2 3 4 Introduction Purpose of Big Data for Crises Management Crisiss Description Mission & Vision Crises Management & Business Need

More information

Improving Distribution Reliability with Smart Fault Indicators and the PI System

Improving Distribution Reliability with Smart Fault Indicators and the PI System Improving Distribution Reliability with Smart Fault Indicators and the PI System Presented by Cameron D. Sherding, Sr. Software Engineer Mark R. Blaszkiewicz, Manager IT DTE Energy is an Integrated Energy

More information

National Communications System. December 6, 2007

National Communications System. December 6, 2007 1 National Communications System December 6, 2007 2 National Communications System (NCS) Established in 1963 in response to communications failures associated with the Cuban Missile Crisis The mandate

More information

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure. MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message

More information

Small or Medium scale focused research project STREP MICIE

Small or Medium scale focused research project STREP MICIE FP7-ICT-SEC-2007.1.7 ICT-SEC 225353 - MICIE Small or Medium scale focused research project STREP MICIE Tool for systemic risk analysis and secure mediation of data exchanged across linked CI information

More information

The Geospatial Dimensions of Critical Infrastructure and Emergency Response. White Paper Series. No. 1 - Infrastructure Interdependencies

The Geospatial Dimensions of Critical Infrastructure and Emergency Response. White Paper Series. No. 1 - Infrastructure Interdependencies The Geospatial Dimensions of Critical Infrastructure and Emergency Response White Paper Series No. 1 - Infrastructure Interdependencies Infrastructure Interdependencies 1 November 2008 INTRODUCTION In

More information

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board Comprehensive European Security Approaches: EU Security Programmes Robert HAVAS EOS Chairman of the Board INTRODUCTION the EOS Programmes rationale Why implementing EU Security Programmes / ASPIDA approach?

More information

Applicazione di tecniche di controllo predittivo multivariabile ad impianti di produzione a Ciclo Combinato

Applicazione di tecniche di controllo predittivo multivariabile ad impianti di produzione a Ciclo Combinato MPC of Combined Cycle Power Plants Torna al programma Applicazione di tecniche di controllo predittivo multivariabile ad impianti di produzione a Ciclo Combinato C. Aurora, P. Colombo, F. Pretolani - CESI

More information

National Preparedness for Surge Capacity

National Preparedness for Surge Capacity H National Preparedness for Surge Capacity Protecting Critical Assets Against Threats and Vulnerabilities Serving Government Customers Globally K. John Pournoor Ph.D., 3M Global Emergency Preparedness

More information

CGF & Data Fusion for Simulating Harbor Protection & Asymmetric Marine Scenarios

CGF & Data Fusion for Simulating Harbor Protection & Asymmetric Marine Scenarios 1 CGF & Data Fusion for Simulating Harbor Protection & Asymmetric Marine Scenarios Agostino G. Bruzzone MISS DIPTEM Genoa University Email: agostino@itim.unige.it URL: www.itim.unite.it www.simulationteam.com

More information

Valutazione e gestione del rischio nell'esercizio del sistema elettrico

Valutazione e gestione del rischio nell'esercizio del sistema elettrico Valutazione e gestione del rischio nell'esercizio del sistema elettrico Emanuele Ciapessoni, Diego Cirio, Andrea Pitto Workshop nazionale Simulazione del sistema energetico ENEA, Roma, 25 marzo 2015 Operational

More information

Office of Professional & Continuing Education 301 OD Smith Hall Auburn, AL 36849 http://www.auburn.edu/mycaa Contact: Shavon Williams 334-844-3108

Office of Professional & Continuing Education 301 OD Smith Hall Auburn, AL 36849 http://www.auburn.edu/mycaa Contact: Shavon Williams 334-844-3108 Student Full Name: Office of Professional & Continuing Education 301 OD Smith Hall Auburn, AL 36849 http://www.auburn.edu/mycaa Contact: Shavon Williams 334-844-3108 Auburn University is an equal opportunity

More information

Improving city infrastructure resilience capacity: water-supply network case study

Improving city infrastructure resilience capacity: water-supply network case study mproving city infrastructure resilience capacity: -supply network case study O. Jukić,. Heđi,. Špeh Virovitica College, Virovitica, Republic of Croatia {oliver.jukic ivan.hedi ivan.speh}@vsmti.hr Abstract

More information

Energy Data Management for Future Cities. Mr. Bejay Jayan 2 nd year PhD Researcher Supervisors : Dr. Haijiang Li & Prof.

Energy Data Management for Future Cities. Mr. Bejay Jayan 2 nd year PhD Researcher Supervisors : Dr. Haijiang Li & Prof. Energy Data Management for Future Cities Mr. Bejay Jayan 2 nd year PhD Researcher Supervisors : Dr. Haijiang Li & Prof. Yacine Rezgui Content Sustainability Challenges -ENERGY. Why Buildings. Saving energy

More information

Executive summary. by Tony Collins

Executive summary. by Tony Collins 998-2095-11-21-Y13AR0 by Tony Collins Executive summary Regulatory compliance is an expensive and critical business issue for oil and gas pipeline operators. Any approach that expedites compliance efforts

More information

Threat and Hazard Identification and Risk Assessment

Threat and Hazard Identification and Risk Assessment Threat and Hazard Identification and Risk Assessment Background/Overview and Process Briefing Homeland Security Preparedness Technical Assistance Program May 2012 PPD-8 Background A linking together of

More information

Preparedness in the Southwest

Preparedness in the Southwest Preparedness in the Southwest Risk Assessment and Hazard Vulnerability Developed by The Arizona Center for Public Health Preparedness Cover Art www.azcphp.publichealth.arizona.edu Chapter 1 Importance

More information

Disaster Risk Assessment:

Disaster Risk Assessment: Disaster Risk Assessment: Disaster Risk Modeling Dr. Jianping Yan Disaster Risk Assessment Specialist Session Outline Overview of Risk Modeling For insurance For public policy Conceptual Model Modeling

More information

> THE SEVEN GREATEST THREATS TO PROCESS PLANT > WHAT S INSIDE: SAFETY, AND HOW TO MANAGE THEM WHITE PAPER

> THE SEVEN GREATEST THREATS TO PROCESS PLANT > WHAT S INSIDE: SAFETY, AND HOW TO MANAGE THEM WHITE PAPER WHITE PAPER > THE SEVEN GREATEST THREATS TO PROCESS PLANT SAFETY, > WHAT S INSIDE: Introduction 1. Nuisance Trips 2. Not Using the Full Functionality of the Control and Safety System 3. Human Error 4.

More information