15
$ -:\ University of the Philippines lnformation Technology Development Center TRANSPORTATION SECURITY THREAT INFORMATION PORTAL SYSTEMS ANALYSIS AND DESIGN COURSE University of the Philippines System Information Technology Foundation Submitted by: Jonrfhan D. Maliwat Management Information Systems Division and Public Information Oflice Noted by: Department of Transportation and Communications OTT'ICE FOR TRANSPORTATION SECURITY oNo (RET)

TRANSPORTATION SECURITY THREAT INFORMATION PORTAL (TSTIP)

Embed Size (px)

Citation preview

$ -:\

University of the Philippines

lnformation Technology Development Center

TRANSPORTATION SECURITY THREATINFORMATION PORTAL

SYSTEMS ANALYSIS AND DESIGN COURSEUniversity of the Philippines System Information Technology Foundation

Submitted by:

Jonrfhan D. Maliwat

Management Information Systems Division and Public Information Oflice

Noted by:

Department of Transportation and CommunicationsOTT'ICE FOR TRANSPORTATION SECURITY

oNo (RET)

{l

UP lnformatian Technalagy Deveropmeilt Cenlet{rr*rrlr{:r;y *i1 ;1?{;}

Systems Aralysis & Design (SAD)January 37, February 7,74,27, 28, 2075Every Saturday, 9am to spmldr. Gabrie{ Vil}orente

GRADE SHEET

Gmding Systm: 1.0-96..100; 1.25- 91..95; 1.5 - 86.^90; 1"75 - 81..a5; 2-o - 75-.80; 2.25 - 72.-74i 2.5 - 69..71i 2.75 -

3.0-60..64; 4.O-Conditionalfailure;5.0-failure;S-Satisfactory;U-fhBatisfactor)aINC-Incomllete;NG-No

Prepared By:

up N#

R[b^""a,SlEa F. Shrhonte

Training Co-ordinalion & Admin Officer

Noted Ry: ffiSupervising Traihing Coordination Offi cer

In*ructor:

Student Name Grade inPercentage Score

FinalGrade Remarks

Maliwat, Jonathal D. 88 1.50 Passed

File Name: Grade Sheet ISO 9OO1:20O8 QMS Document

3/F Vidal A" Tan HalI, Quirino Ave. cor. Velasquez St.University of the Philippines, Diliman, Quezon City,Tel: 436.22.17, 920.2O.8O, Fax 920.20.36 Email [email protected] Website: http://itdcup.edu"ph

ffiffiffiffiffi*Kffi

Instructor

l-

JONATI-IAN D. MATIWATSydmsAnaldsand Desig Coune, Uniwmityof fre Phlppines Sy$mlnhmdim TcdmohgyFomdalim {IIPSIIF)

TNANSPORTATION SDCURITY TIIREAT INFORMATION FORTAL (TSfiP}

I. SYSTEMOVERYIEW:

The OFFICE FOR TRANSPORTAfiON SECURITY (OTS) is an attached agency

utrder Deptrtment of Transptrtation and Communications (DOTC) through ExecutiveOrder no. 2'17 and 3ll creatiag this Office as the preventive sec,urity regulator for thesecurity of all transportation system of the country namely Civil Aviatioo, MaritimeTransportation and Land & Rail Transportatior Systems. OTS provides nationaloversight to eflsure effective implemertation of international Eanspotrtation security

obligations and sfandards to safeguard the transportation systems of the country.

The need for better information sharing was one of the primary lessoos learned from the

September ll, 20Ol terorist attacks. Effective furforsration sharing will most likelyprovide the timely, accurate, and relevart information support to effective decision-

making and mission-focused actions by tbe appropriate level of the involved goveflmrent

&geEcy.

OTS will improve collection and analysis of &ta and information about mnsport security

uends &om broader range of sources. That is were this system project plan takes place,

The TSTIP wiu be used to collect, compile and share daa from othet transportstakeholders, agencies and international partners through information system or portal tosupport strategie and forecasting decisions.

The TSTIP is made up of these elements: accesVsearc.h" categorization, collaboration,analysis, profilirg, application irtegration and sec'urity.

The following are lhe futeractive features of this project:

. TransportadonRecordlnfortationo List of Transport Companies (e.g. Airline, Shipping and Bus)o ListofCargoandFreiglt Services

o List of Airports, Ports, Bus Temrinals, and Rail Stationso List of Security Compliant Transportation Facilitieso List of Transpoflariot Seemity Pexonnelo List of Issuance of National Ship Security Certificateso List of Issuance of International Ship Security Certificateso List of Approved Airport Operators Security Programo List of Approved Akport Security Programo Summary of Findings of Security Audit Result

o Summary of Findings of Security and Smvey Inspection Report

. Thre&tlnformatiorDatabtreo List of Tertorists GrouPso Termrist Profileso Methods and Tacticso Arcas of OPerationso Tsmristlncidents andThreat Seenarios

r lhanspor.t Security Advimryo Airport Security Advisoryo Port Security Advisoryo l-andandRail Security Advisoryo Security and Srnvey InspectionReport

JONATHAN D- MAUWATS)dms Andysis 8nd 0esigrr Course, Unir*mityof tre Ptr*pims Systm lnfomdim TtdmobgyFomdation (UPSttF)

N. SYSTEMREQTJIREMENTS:

. The TSTIP is operationally under the supervision of OTS Intelligence andOperarions Bueau (IOB) in coordination wi& OTS Management InformationSystems Division (MISD) for technical support and maintenance update.

. Data iil TSTIP can only be entered and managed by OTS lntelligence Analyst(IA) under IOB who has been given a user narrE, password and securityclearance. OTS IA is the oflicial and designated user of &is portal.

Transportafion Record Idormation (TRI). Data can be entered from any computer terminal with internet browser and

connection. Dara will be entered into the TRI in the fonn of a database

reflecting each informatioual category.. OTS IA categorizes all iaformtion so that it can be easily to access and

navigate within the proper context- Update of infomation will be done in aregular basis.

r In every request of information, OTS IA through the Directm, IOB secures

authenticatior and approval from the Administrator, OItrce forTransportation Security (A, OTS).

. The requesting party shall comply with the p,rescribed rules and regulationpertaining to request of information.

. Upon approval, OTS IA will retrieve and relerase the information to therequesting party.

Threat Inforrra{on Database (fID)r Data recording for TID will be eilered into tle system in the form of a

questionnaire or tesplate.. OTS IA assesses the completeness of data and threat information in the TID.r Data will be stord in a text file inside the portal.r On the criticality of tlreat infornration. Data will be entered oa a 2417 basis

via the web &ont-end for any information update.. Using the TID, OTS IA should detail aad evaluate methodology, scope and

repot of any identifred security dsts.. After tlorough evalodior, CITS IA will anatyze trerds of secnrity irciderts

affecting the tansportation system and develop early warning indicators to beused as a decision-rraking for known and anticipated threats.

r In addition, for TID risks and threals output. OTS IA should recommend apreferred strategy against possible terrorist attack ftrough in-depth analysisof intelligence and other available source of information-

o Using the portal, OTS IA will develop briefing materials on secrrity threatsand observed confidentiality and transmittal protocol.

r OTS IA will rcnder and submit executive report to the A, OTS in a timelymanner-

Transportation Security Advisory (TSA). Using t}re TSfiB OTS IA will take into consideration with the standrd rules

on intelligence processing and transmittal protocol-. Based on TID oulput, OTS IA will conduct specifrc tbreat and risk

assessment for ihe Eansportatiotr systematrd operations in specifrc region.- Otrce the assessmert is validated, OfS [A will disseminf,te relevant security

tlreat infornration in a timely manner.r Issuance of TSA will be based on determinedlevel of risk.. Issuaace and release ofTSA is orly upon the direction and approval of the A,

oTs.

JONATHAN D. MAUWATSy6lsyrs Andysis etd Design Come, Uniwrsily of tirc Ptrlppines Systm lnfomdion TrdrmbgyFoundalim {UPSIIF}

III. FUNCTIONALDECOMPTOSITIONDIAGRAMT

JONATHAN D. MAUWATsydmsAndSisand Design cource, uniwsity o{ilrc Phtpdnes sysiem lnfomdion TedrnologyFwndalim $JPSITF}

IV. ENTITY RELATIONSHIPDIAGRAM:

Transportation Secunity Threat lnforrnation Portal

Entity RelationshiP Diagram

Lisr aI Scty Pe€List ot kty cenLi$ of Sciy Prog

Pod Sdy AdvisryLarrd Scry Avisoiy

Rail scry Advisory

Scty Suruey lnsp npl

JONATMN D. MAUIVATSydmsAnalysis and Desig Course. Univereity of $n Phfrpinrs Sysrmlnformafon TmhnohgyFmdxiu {UPSIIF)

V. DATATLOWDIAGRAM:

TRANSpORIATTON SECTTR|TY THREAI lItlFORMATloN PORTAT frsnplDATA FLOW DIAGRAM

leuel O

Level I

da

JONATMN D. MAUWATSydems Andysis and Dcsign Couree, Uniureity of the Phfppines Sydem lnlomation TcdrnologyFundalion (UPSfff)

TBANSPORTAT|oN SECURTTY THREAT INTORMATION POftTAt (TsTrp)

DATA FLOW DIAC&AM

JONATHAN D, MALIWATSydms Andpis md Design Cource, Uniwreity of lhc Phlppincs $ldm lahmation TedrnologyFomdation (UPSftF)

:tE

6-Era:+iJ3

EEORLEztrIkE.<

=Nk6rr>E,AFIIsE<-UIIJJt,zo

toA.a?c

a5

E

t

s

g

JONATHAN D. MAUWATsydmsAndysismd Dcsign coumc, univemityof Bre Phlppincs Syaan lnfrmdirn TmhnohqyFunddim (UPSITF)

VI. USERCASEDIAGRAM:

I ---------------

O(< E

.(< E

CtrtllbJ

sa,orZotrE=&,48S2L?:<EolrluE<4-<FU>ecF- UJE{L)llJehzoL

Etoo-(,zEF

@

JONATHAN D. MAUWATSydems Anrlysis md Design Course, Uniwmity ofUrc Phlppiaas Sydenr ldoanalim TrdnologyFoundalion (UPSI'IF)

VII. STEP-BY.STEP DESCRIPTION PER USE CASE:

USECASE I: DATAENTRY

STEP BY STEP DESCRIPTION PER USE CASE

l. The IA will te asked to enter hislher Username and Password on the logon screen andclick the enter button.

2- When a login is successful he/she will be directed to his&er TSTIP account,otherwise a notiflcation window of failed entry will pop-up.

3. At the TSTIP Data Entry page, IA user will have a choice of what kind of report hasbeen forwarded to be entered in the &tabase.

4" Afts choosing rhe kind of report he/she will be dirccted to forms page where IA userwill enter data of the report.

5. If it is a tlreat report IA user will be moved to DATA Evaluation page.

USE CASE 2: DATA CLASSINCATION

STEP BY STEP DESCRIPTION PERUSE CASE

l. The IA user will have to click on the corresponding radio button fo the reportclassification^

2. Once the repo* has been classifid press submit to move to the next page.

USE CASE 3: DATA EVALUATION

STEP BY STEP DESCRIPTION PERUSE CASE

l. The IA user will have to give his assessment itr the rnessage arca-

2- Ctck on a coresponding radio button for the appropriarc rating of the reporr(l beingthe least security threat and 5 nrost security threat)

3. hess submit button to go to DATA ANALYSIS.

USECASE4: DATAANALYSE

l The IA user will do a final armlysis of the report and evaluation in a peview format"2. Edit buttou will be available to IA user in case ofrevision.3. Print button will open up a data rellort screen.

USECASE5: DATA REFORT

STEP BY STEP DESCRIPTION PERUSE CASE

l. A Print preview of the report will be shom to IA user in a Portable Data Fomrat(PDF).

2. hess the print button to print.

JONATIIAN D. MAUWATSydEms Analycis ild Dtsign Cource, Uninreity olth Phlgircs SydarrlnfixnationTcdrnobgyFomdation (UPSIIF)

VIII. COLI.ABORATION DIAGRAM PER USE CASE:

sEcuRtTY TIIREAT rilFORIrlA?rOrd PCRTAL {T3Tl P)COLLABO RATION D IAG NAMI

&

afAnalyst {User}: lntel

JONATHAN D, MALIWATSydms Anal6is and Dteign Coumc, Uniwnity of he Plilppincs Systm lnfurmalion TcdrnologyFoundalim {UPSITF)

D(. USERINTERFACE DESIGN:

$orsaue mp*,.o.e-r 98"', l tEl t r'E

1 /alsm€ to OTS Pqrtal ' Rti:ri ^i.rr!:

I

JONATHAN D. IVIAUWATSyg*tl"OS. -t Design Coursc, uniwn{ty of [rc Phlppims $6fanlnfm*ioTadnologyFoundat'xn $JPS[IF)

0 orsesecr"uityauoit

USERITAME

mssitvosu

JONATHAN D. MAUWATSydems Analpisand Desig Cor*sc, Udwmity of thc Phh,pin6 Sldeh lnfumation fcdrnologyFounddim {UP$IF }

X, DEPLOYMENTDIAGRAM:

TRAiEPoRTAflOi{ SECUiITY THreAr lI{FORllAnOil FOttrlL (fSTlPtDEPLOYI\IIENT DIAGRAM

I,.sl

r"... I 1,Y

.-.,r,

ffi"-'-':5JffiH ="",

, 866!d

;$

&ffi