200 likes | 654 Views
Disaster & Smart City in Aging Society – Designing a secure and resilient smart city. Smart City and Resilienc y. Jirapon Sunkpho College of Innovation Thammasat University. Outline. What is Smart City and What makes a city Smart? Smarter Thailand : outsmart Bangkok Traffic
E N D
Disaster & Smart City in Aging Society – • Designing a secure and resilient smart city SmartCityand Resiliency Jirapon Sunkpho College of Innovation Thammasat University
Outline • What is Smart City and What makes a city Smart? • Smarter Thailand: outsmart Bangkok Traffic • What is Resiliency and what make a city more resilience?
What is Smart city?It depends on whom you ask. • Engineer - potential for efficiency and optimization. • App developer - a vision of novel social interactions and experiences in public places. • Mayor - it’s all about participation and democracy.
What is Smart City? “places where information technology is combined with infrastructure , architecture, everyday objects, and even our bodies to address social, economic, and environmental problems”(Anthony M. Towsend, the author of Smart Cities:Big Data, Civic Hackers, and the Quest for a New Utopia) From Symatec: Transformational ‘smart cities’: cyber security and resilience
Bangkok Traffic • http://bk.asia-city.com/city-living/article/plans-fix-bangkok-traffic-problems
Out Smart Bangkok Traffic • Social @traffy @js100 • Traffy API
Smart City Challenges • Like any other ICT system, the smart city technological and communication environment – the network infrastructure and the Internet of Things – will present vulnerabilities to cyber attacks
What is Resiliency? • Cyber resilience: The organisation’s capability to withstand negative impacts due to known, predictable, unknown, unpredictable, uncertain and unexpected threats from activities in cyberspace (Information Security Forum).
How to becomemore cyber resilience? Franklin Kramer
Diversity • Diversity—The creation of cyber systems with multiple forms of programming
Redundancy The frequent creation of snapshots or checkpoints of data and systems in a known and stable operation so that critical systems can be readily restored.
Isolation the infected portion of the system can be isolated so that a single failure will not cascade across the system.
Detection and Monitoring • Advanced persistent threats can be resident, unobserved within a cyber system for a long time.
Principle of Least Privilege Many intrusions are by insiders who take advantage of access to install malicious software.
Distributedness and Moving Target Defense If targets are concentrated in a single place and protected by an unchanging defense, a malicious intruder has a fixed target against which to plan.
“If you want to hit a country severely you hit its power and water supplies. Cyber technology can do this without shooting a single bullet” • –Isaac Ben-Israel [Major-General Israeli Air Force] Thank You Jirapon Sunkpho College of Innovation Thammasat University jirapon.s@gmail.com