Transcript
Page 1: INTEGRATING CYBER-PHYSICAL SECURITY FOR A SAFER CITYfrost-apac.com/BDS/infographics/NEC_global.pdf · The global security market is estimated to be worth US$72.6 billion at the end

SCAN HERE TO READTHE WHITE PAPER OR VISITCapture key insights on securing cities in an

increasingly connected world nec.com/safecity

Addressing the Emerging Risks to Critical Infrastructure with Cyber-Physical Solutions INTEGRATING CYBER-PHYSICAL SECURITY FOR A SAFER CITY

Global SecuritySpending OverviewThe global security market is estimated to be worth US$72.6 billion at the end of 2016.

Disconnect between physical

security and cyber security

Why Security is a Key Priorityfor Smart Cities

Cyber-attacks potentially disrupting

critical services

Convergence of operational

technology and information technology

Connectedinfrastructure

DDoS* Attacks:A Growing Threat

Security Technology Forecast:Key Areas To Watch

240% increase in botnet activity, traced mostly to 900 compromised CCTV cameras

25,513 IP cameras compromised in a DDoS attack, including 24% from Taiwan, 9% from Indonesia, and 6% from Malaysia (2016)

152,000IoT devices (e.g., CCTV cameras and personal video recorders) compromised in a 1Tbps DDoS attack

US$8.22billion

US$12.67billion

US$10.60billion

US$15.75billion

US$18.26billion

US$44.04billion

AIRPORTS

2014 2023

ELECTRICITY

2014 2023

OIL & GAS

2014 2023

US$

BILLION

11.12

US$

BILLION

5.84 US$

BILLION

6.38US$

BILLION

11.69US$

BILLION

9.02

US$

BILLION

22.35

Electric

ity

Oil & G

as

Mass Tra

nsporta

tion

Maritime S

ecurity

Bankin

g & Fin

ance

Border

& Biom

etrics

Airport

Securit

y

*Note: Distributed denial-of-services

Source: Frost & Sullivan

Source: Frost & Sullivan Global Security Spending Overview (2016)

CRITIC

AL INF

RASTRU

CTURE

OPERAT

IONS:

TOP 6 A

REAS O

F

AIRPORTS Physical Long screening queues at security checkpoints

KEY TECHNOLOGIES• Multimodal biometrics • Facial recognition algorithms• Network-wide multilayer defenses • Advanced protection gateways for SCADA networks

CyberAutomated check-ins, baggage drops, and ID scans

ELECTRICITY Physical Vandalism/ terrorism of plants/critical facilities

KEY TECHNOLOGIES• Multi-layered defence for SCADA• Intrusion Detection• High-resolution cameras • Behavioral & Video Data Analytics

CyberConnected devices as new grid invasion access points

CITIZEN SAFETY Physical Physical threats in densely-populated areas

KEY TECHNOLOGIES• Behavior Analysis• Video Data Analytics• Incidence Reporting • Cyber security forensics

CyberData breaches in public domain

GOVT SERVICES Physical Vandalism, theft, and/or disruption of services

KEY TECHNOLOGIES• Multimodal biometrics for access control• Behavior Analysis• Detection of cyber threats and data leaks, and identification of cyber-attack patterns• Intrusion Detection

CyberCyber-attacks motivated by political dissent

NATURAL DISASTERMANAGEMENT Physical Lack of disaster planning and recovery practices

KEY TECHNOLOGIES• Environmental sensors in risk-prone areas• Advanced predictive analytics • Emergency Incident Response • Vulnerability identification, mitigation and management system

CyberRemote attacks on critical infrastructure

Stadium/Big Events Physical Hostile-aggressive individuals/crowds

KEY TECHNOLOGIES• High-resolution cameras• Behavioral analytics• Real-time networking monitoring • Next-generation firewalls

CyberAttacks on networks to cripple operations and cut power

US$

BILLION

6.22

Recommended