disaster & smart city in aging society – designing a secure and resilient smart city smart...
TRANSCRIPT
Disaster & Smart City in Aging Society – Designing a secure and resilient smart city
Smart City and Resiliency
Jirapon SunkphoCollege of InnovationThammasat University
Outline
❖ What is Smart City and What makes a city Smart?
❖ Smarter Thailand: outsmart Bangkok Traffic
❖ What is Resiliency and what make a city more resilience?
What is Smart city? It depends on whom you ask.
❖ Engineer - potential for efficiency and optimization.
❖ App developer - a vision of novel social interactions and experiences in public places.
❖ Mayor - it’s all about participation and democracy.
What is Smart City?“places where information technology is combined with infrastructure , architecture, everyday objects, and even our bodies to address social, economic, and environmental problems” (Anthony M. Towsend, the author of Smart Cities:Big Data, Civic Hackers, and the Quest for a New Utopia)
From Symatec: Transformational ‘smart cities’: cyber security and resilience
Bangkok Traffic
http://bk.asia-city.com/city-living/article/plans-fix-bangkok-traffic-problems
Out Smart Bangkok Traffic
❖ Social @traffy @js100
❖ Traffy API
Sample Apps Using Traffy API
A GPS-BASED TRAFFIC INCIDENT MANAGEMENT
SYSTEM
Smart City Challenges❖ Like any other ICT system, the smart city
technological and communication environment – the network infrastructure and the Internet of Things – will present vulnerabilities to cyber attacks
What is Resiliency?
❖ Cyber resilience: The organisation’s capability to withstand negative impacts due to known, predictable, unknown, unpredictable, uncertain and unexpected threats from activities in cyberspace (Information Security Forum).
How to become more cyber resilience?Franklin Kramer
Diversity
❖ Diversity—The creation of cyber systems with multiple forms of programming
RedundancyThe frequent creation of snapshots or checkpoints of data and systems in a known and stable operation so that critical systems can be readily restored.
Isolationthe infected portion of the system can be isolated so that a single failure will not cascade across the system.
Detection and Monitoring
❖ Advanced persistent threats can be resident, unobserved within a cyber system for a long time.
Principle of Least PrivilegeMany intrusions are by insiders who take advantage of access to install malicious software.
Distributedness and Moving Target Defense
If targets are concentrated in a single place and protected by an unchanging defense, a malicious intruder has a fixed target against which to plan.
Hack Back
Thank YouJirapon SunkphoCollege of InnovationThammasat [email protected]
–Isaac Ben-Israel [Major-General Israeli Air Force]
“If you want to hit a country severely you hit its power and water supplies. Cyber
technology can do this without shooting a single bullet”