SlideShare une entreprise Scribd logo
1  sur  16
The importance of CIE
in the digital era
AWARENESS DECK
BY: RICARDO MANUEL BAIAO JORGE DE ALMEIDA
WHAT IS CIE?
IMPACT ON SOCIETY
RISKS
CONCLUSIONS
What is CIE?
The principal scopes of practice
for CIE are:
• Planning and design of trusted communication networks
• Operational oversight of trusted communication networks
• Risk analysis of, and contingency planning for, network infrastructure
Communications Infrastructure Engineering (CIE) is related to the design and operation of the electronic networks
that support all types of data communications.
CIE looks after the data in transit and is primarily focused on the reliability, availability, security, and privacy of
networks, calledTrusted Network, rather than on their physical aspects (such as cabling, Wi-Fi, 3G, 4G, 5G,
transmission and receiving devices, etc.)
The essential activity of CIE is the system-level design and management of secure or trusted communications
networks.
WHAT IS CIE?
IMPACT ON SOCIETY
RISKS
CONCLUSIONS
Impact on Society
With the massive growth of Digital
Infrastructure to cover the rapid
expansion of wireless
communications devices such as
iPhone™, Android™ platforms,
Windows Mobile™, and the rapid
grow of 24/7 online services such as
banking, bill payment, and
information services, users are
becoming heavily dependent of
digital infrastructure.
The Digital era is here to stay, the
IoT (Internet ofThings) is taking its
first steps and it will certainly change
our lives in the future.
All organisations want to be part of
the day-to-day lives of their target
audience and to take advantage of
that presence to conduct business.
That´s why organisations all over the
world are investing heavily in digital
transformation with the support of
governments and public institutions
such as the European Commission.
As a matter of fact, the European
Commission has recently announced
its plans to help industry, SMEs,
researchers and European public
authorities to take full advantage of
new technologies.The plans include,
among other things, an investment
of over 50,000 million dollars to help
digitize the industry.
Impact on Society
Personal communications is only the tip of the iceberg — other critical infrastructures (operational
infrastructures) are also dependent upon digital infrastructure.
• Electric power, natural gas, oil production, and transmission systemsEnergy and Utilities
• Telecommunications, broadcasting systems, software, hardware, and networks,
including the Internet
Communications and Information
Technology
• Banking, investment, securities, payment processingFinance
• Hospitals and other health care facilities, blood supply, laboratories, pharmaceuticalsHealthcare
• Production, processing, distribution and safetyFood
• Drinking water and wastewater treatment / managementWater
• Aviation, rail, marine, road, mass transitTransport
• Law enforcement, fire, search and rescue, emergency servicesSafety
• Social services, regulationGovernment
• Defence, industrial base, chemical industryManufacturing
Impact on Society
•OperationalTechnology (OT) rely entirely in digital
infrastructures and consist of platforms used in running the
operation of physical assets of enterprises, especially those
that involve taking specific actions.
•(e.g. controlling electricity or energy flow, valves, lighting,
ambient environment, machine tools or robots).
Also Internet ofThings (IoT) rely entirely on digital
infrastructures, and consists of a network of dedicated
physical objects (things), that contain embedded
technology to sense or interact with its internal state or the
external environment.
The IoT is an ecosystem that includes things,
communication, applications and data analysis
Impact on Society
•It is easy to see the dependence of sectors like Finance (where virtually all transactions are automated), Public
Safety (Emergency and Security) ecommerce (Amazon, Google, Facebook) on digital infrastructure.
But most people don´t realize that water and sewage pumping stations are monitored and controlled remotely
using wireless communication links, as are railway and underground trains and even our electric power grid
including nuclear facilities.These essential services can be compromised by unavailability of the digital
infrastructure on which they depend.
Modern manufacturing is dependent upon automated supply chains and production control applications, which
in turn rely on digital infrastructure.A failure in that digital infrastructure can shut down a production line, with
attendant losses in the millions of dollars per day. It can also adversely affect worker safety.
This is the present, the future is much more ambitious.
ENTERPRISE
Impact on Society
Internet ofThings
CONSUMER
 Back-end IT systems
 Predictive maintenance
analytics
 M2M connectivity
(Machine to Machine communication services)
 Processor for monitoring and
control of things
 Jet engine
 Robot
 ATM
 Mobile apps
 Elderly person monitoring
service
 Home Broadband
 Standard mobile data
 Smartphone gateway
 Wireless router
 Baby monitor
 Health and fitness monitor
Applications
and Analytics
Connectivity
Gateway /
Controller
Things
Operational Technology
Source: Gartner
Relationship between OT and IoT at Enterprise and consumer level.
WHAT IS CIE?
IMPACT ON SOCIETY
RISKS
CONCLUSIONS
Risks
• Risks to society associated with our dependence on Digital Infrastructure
• The Major risks are:
Unavailability
• no food, water, police / fire / ambulance service, medicine, access to
information, financial services, transportation, etc.
Compromise
• contaminated food or water, monetary fraud or theft, identity theft, trains
/ planes / vessels colliding or crashing, etc.
• Threats to digital infrastructure can be either unintentional (hardware and/or software failures, lack of
redundancy or fault tolerance, consequences of other exogenous events such as fires, floods, earthquakes,
power blackouts, wars, etc.) or intentional (hacking, phishing, denial of service attacks, identity theft, fraud,
espionage, etc. directed towards the network itself.)
• While our digital infrastructure is far from immune to unintentional threats, concern is growing about the
threats of deliberate criminal activity perpetrated for financial gain.
Risks
What is happening to the digital infrastructure today?
• Every day one can read news items related to cyber abuse:
• The theft of customer data from Sony’s online gaming service, forcing shutdown of the service
• Foreign spies penetrating government systems, forcing the governments to disconnect from the Internet
• Industrial/commercial espionage conducted to give the perpetrators unfair competitive advantage
• Denial-of-service attacks against popular websites; and so on.
• At a personal level, most of us have received scam email designed to defraud us or to trick us into disclosing
account numbers and passwords (known in the cyber security industry as phishing). And many of us have
experienced the infection of our personal computers with spyware designed to capture and report our online
activities to others, or some form of malware, such as a worm or a virus designed to render the computer
inoperable and/or its data unusable.
• These abuses are all predicated on the unrestricted connectivity provided by the internet.
WHAT IS CIE?
IMPACT ON SOCIETY
RISKS
CONCLUSIONS
Conclusions
• Engineers have always been at the forefront of innovation and exploitation of technology, so it is no surprise
that many of them have turned their skills to the challenge of building and maintaining trusted network
facilities.
• Thus far, most have acquired the special technical skills necessary to do this work on the job. Only recently
have accredited engineering programmes started to emerge that focus on this area of professional practice.
• “CIE” needs to mature in order to be recognized as an engineering discipline. Improving CIE practice
standards within industry and government, collaborating with other stakeholders, and shaping future
legislation and regulations will help to contribute to solving the world’s cyber-security crisis.
• This is an area that needs development, and needs to be fully regulated.
Conclusions
Recently the European Commission proposed concrete measures to accelerate the setting of standards within
the Digital Single Market strategy:
 Focus on 5 priority areas, by requesting the industry and standardisation bodies to develop standards in the
following areas:
 5G
 Cloud computing
 Internet of things
 Data technologies
 Cybersecurity
 Co-financing testing and experimentation technologies to accelerate the establishment of standards,
including public-private partnerships; thus, the timely development of standards will be guaranteed to drive
innovation and growth of enterprises.
References:
http://www.gartner.com
http://www.peo.on.ca/
https://www.ic.gc.ca
http://ec.europa.eu/priorities/digital-single-market_en

Contenu connexe

Tendances

GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
Chp 7 lect 7 - social context of computing (shared)
Chp 7   lect 7 - social context of computing (shared)Chp 7   lect 7 - social context of computing (shared)
Chp 7 lect 7 - social context of computing (shared)YUSRA FERNANDO
 
Introduction to Technology
Introduction to TechnologyIntroduction to Technology
Introduction to TechnologyCarolyn Brockman
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkETDAofficialRegist
 
Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxAmandaWeaver21
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Digital inclusion and exclusion
Digital inclusion and exclusionDigital inclusion and exclusion
Digital inclusion and exclusionpumascomm
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issuesRownel Cerezo Gagani
 
ITU Committed to connecting the world
ITU Committed to connecting the worldITU Committed to connecting the world
ITU Committed to connecting the worldDr Lendy Spires
 
ICT4D - How ICTs can positively harnessed for social and economic development
ICT4D - How ICTs can positively harnessed for social and economic developmentICT4D - How ICTs can positively harnessed for social and economic development
ICT4D - How ICTs can positively harnessed for social and economic developmentViviana Brun
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemFaHaD .H. NooR
 

Tendances (20)

GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
Chp 7 lect 7 - social context of computing (shared)
Chp 7   lect 7 - social context of computing (shared)Chp 7   lect 7 - social context of computing (shared)
Chp 7 lect 7 - social context of computing (shared)
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
 
Introduction to Technology
Introduction to TechnologyIntroduction to Technology
Introduction to Technology
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptx
 
Review questions
Review questionsReview questions
Review questions
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15
 
Digital inclusion and exclusion
Digital inclusion and exclusionDigital inclusion and exclusion
Digital inclusion and exclusion
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
ITU Committed to connecting the world
ITU Committed to connecting the worldITU Committed to connecting the world
ITU Committed to connecting the world
 
ICT4D - How ICTs can positively harnessed for social and economic development
ICT4D - How ICTs can positively harnessed for social and economic developmentICT4D - How ICTs can positively harnessed for social and economic development
ICT4D - How ICTs can positively harnessed for social and economic development
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 

En vedette

Working in Digital Environments
Working in Digital EnvironmentsWorking in Digital Environments
Working in Digital EnvironmentsPasi Maenpaa
 
Winning in Networks (May 2010 Version)
Winning in Networks (May 2010 Version)Winning in Networks (May 2010 Version)
Winning in Networks (May 2010 Version)Venkat Venkatraman
 
Response to DCMS Digital Communications Infrastructure Strategy consultation
Response to DCMS Digital Communications Infrastructure Strategy consultationResponse to DCMS Digital Communications Infrastructure Strategy consultation
Response to DCMS Digital Communications Infrastructure Strategy consultationMartin Geddes
 
Digital Security
Digital SecurityDigital Security
Digital SecurityKoshy Tk
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldAndris Soroka
 
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's Approach
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's ApproachMobile Network Infrastructure Sharing - Industry Overview & Coleago's Approach
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's ApproachColeago Consulting
 
10 Best Productivity Hacks for Customer Service
10 Best Productivity Hacks for Customer Service10 Best Productivity Hacks for Customer Service
10 Best Productivity Hacks for Customer ServiceAdam Toporek
 

En vedette (7)

Working in Digital Environments
Working in Digital EnvironmentsWorking in Digital Environments
Working in Digital Environments
 
Winning in Networks (May 2010 Version)
Winning in Networks (May 2010 Version)Winning in Networks (May 2010 Version)
Winning in Networks (May 2010 Version)
 
Response to DCMS Digital Communications Infrastructure Strategy consultation
Response to DCMS Digital Communications Infrastructure Strategy consultationResponse to DCMS Digital Communications Infrastructure Strategy consultation
Response to DCMS Digital Communications Infrastructure Strategy consultation
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital world
 
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's Approach
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's ApproachMobile Network Infrastructure Sharing - Industry Overview & Coleago's Approach
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's Approach
 
10 Best Productivity Hacks for Customer Service
10 Best Productivity Hacks for Customer Service10 Best Productivity Hacks for Customer Service
10 Best Productivity Hacks for Customer Service
 

Similaire à The importance of CIE in the digital era

IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET Journal
 
Module_1_IT_ERA.pptx
Module_1_IT_ERA.pptxModule_1_IT_ERA.pptx
Module_1_IT_ERA.pptxJenloDiamse
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringPotato
 
Telecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesTelecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesMartyn Taylor
 
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...Power System Operation
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_AdamsJulius Adams
 
25 sumit 2
25 sumit 225 sumit 2
25 sumit 2SRJIS
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...TI Safe
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world editedAhmed Banafa
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxSharifulShishir
 
Case study.pptx
Case study.pptxCase study.pptx
Case study.pptxictctti
 
oneM2M webinar (2014)
oneM2M webinar (2014)oneM2M webinar (2014)
oneM2M webinar (2014)Marc Jadoul
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Bernard Kufluk
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosFrancesca Valente
 

Similaire à The importance of CIE in the digital era (20)

IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
Module_1_IT_ERA.pptx
Module_1_IT_ERA.pptxModule_1_IT_ERA.pptx
Module_1_IT_ERA.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
Telecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesTelecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issues
 
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
25 sumit 2
25 sumit 225 sumit 2
25 sumit 2
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Securing Smart Cities
Securing Smart CitiesSecuring Smart Cities
Securing Smart Cities
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
Case study.pptx
Case study.pptxCase study.pptx
Case study.pptx
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
oneM2M webinar (2014)
oneM2M webinar (2014)oneM2M webinar (2014)
oneM2M webinar (2014)
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
 

Dernier

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Dernier (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

The importance of CIE in the digital era

  • 1. The importance of CIE in the digital era AWARENESS DECK BY: RICARDO MANUEL BAIAO JORGE DE ALMEIDA
  • 2. WHAT IS CIE? IMPACT ON SOCIETY RISKS CONCLUSIONS
  • 3. What is CIE? The principal scopes of practice for CIE are: • Planning and design of trusted communication networks • Operational oversight of trusted communication networks • Risk analysis of, and contingency planning for, network infrastructure Communications Infrastructure Engineering (CIE) is related to the design and operation of the electronic networks that support all types of data communications. CIE looks after the data in transit and is primarily focused on the reliability, availability, security, and privacy of networks, calledTrusted Network, rather than on their physical aspects (such as cabling, Wi-Fi, 3G, 4G, 5G, transmission and receiving devices, etc.) The essential activity of CIE is the system-level design and management of secure or trusted communications networks.
  • 4. WHAT IS CIE? IMPACT ON SOCIETY RISKS CONCLUSIONS
  • 5. Impact on Society With the massive growth of Digital Infrastructure to cover the rapid expansion of wireless communications devices such as iPhone™, Android™ platforms, Windows Mobile™, and the rapid grow of 24/7 online services such as banking, bill payment, and information services, users are becoming heavily dependent of digital infrastructure. The Digital era is here to stay, the IoT (Internet ofThings) is taking its first steps and it will certainly change our lives in the future. All organisations want to be part of the day-to-day lives of their target audience and to take advantage of that presence to conduct business. That´s why organisations all over the world are investing heavily in digital transformation with the support of governments and public institutions such as the European Commission. As a matter of fact, the European Commission has recently announced its plans to help industry, SMEs, researchers and European public authorities to take full advantage of new technologies.The plans include, among other things, an investment of over 50,000 million dollars to help digitize the industry.
  • 6. Impact on Society Personal communications is only the tip of the iceberg — other critical infrastructures (operational infrastructures) are also dependent upon digital infrastructure. • Electric power, natural gas, oil production, and transmission systemsEnergy and Utilities • Telecommunications, broadcasting systems, software, hardware, and networks, including the Internet Communications and Information Technology • Banking, investment, securities, payment processingFinance • Hospitals and other health care facilities, blood supply, laboratories, pharmaceuticalsHealthcare • Production, processing, distribution and safetyFood • Drinking water and wastewater treatment / managementWater • Aviation, rail, marine, road, mass transitTransport • Law enforcement, fire, search and rescue, emergency servicesSafety • Social services, regulationGovernment • Defence, industrial base, chemical industryManufacturing
  • 7. Impact on Society •OperationalTechnology (OT) rely entirely in digital infrastructures and consist of platforms used in running the operation of physical assets of enterprises, especially those that involve taking specific actions. •(e.g. controlling electricity or energy flow, valves, lighting, ambient environment, machine tools or robots). Also Internet ofThings (IoT) rely entirely on digital infrastructures, and consists of a network of dedicated physical objects (things), that contain embedded technology to sense or interact with its internal state or the external environment. The IoT is an ecosystem that includes things, communication, applications and data analysis
  • 8. Impact on Society •It is easy to see the dependence of sectors like Finance (where virtually all transactions are automated), Public Safety (Emergency and Security) ecommerce (Amazon, Google, Facebook) on digital infrastructure. But most people don´t realize that water and sewage pumping stations are monitored and controlled remotely using wireless communication links, as are railway and underground trains and even our electric power grid including nuclear facilities.These essential services can be compromised by unavailability of the digital infrastructure on which they depend. Modern manufacturing is dependent upon automated supply chains and production control applications, which in turn rely on digital infrastructure.A failure in that digital infrastructure can shut down a production line, with attendant losses in the millions of dollars per day. It can also adversely affect worker safety. This is the present, the future is much more ambitious.
  • 9. ENTERPRISE Impact on Society Internet ofThings CONSUMER  Back-end IT systems  Predictive maintenance analytics  M2M connectivity (Machine to Machine communication services)  Processor for monitoring and control of things  Jet engine  Robot  ATM  Mobile apps  Elderly person monitoring service  Home Broadband  Standard mobile data  Smartphone gateway  Wireless router  Baby monitor  Health and fitness monitor Applications and Analytics Connectivity Gateway / Controller Things Operational Technology Source: Gartner Relationship between OT and IoT at Enterprise and consumer level.
  • 10. WHAT IS CIE? IMPACT ON SOCIETY RISKS CONCLUSIONS
  • 11. Risks • Risks to society associated with our dependence on Digital Infrastructure • The Major risks are: Unavailability • no food, water, police / fire / ambulance service, medicine, access to information, financial services, transportation, etc. Compromise • contaminated food or water, monetary fraud or theft, identity theft, trains / planes / vessels colliding or crashing, etc. • Threats to digital infrastructure can be either unintentional (hardware and/or software failures, lack of redundancy or fault tolerance, consequences of other exogenous events such as fires, floods, earthquakes, power blackouts, wars, etc.) or intentional (hacking, phishing, denial of service attacks, identity theft, fraud, espionage, etc. directed towards the network itself.) • While our digital infrastructure is far from immune to unintentional threats, concern is growing about the threats of deliberate criminal activity perpetrated for financial gain.
  • 12. Risks What is happening to the digital infrastructure today? • Every day one can read news items related to cyber abuse: • The theft of customer data from Sony’s online gaming service, forcing shutdown of the service • Foreign spies penetrating government systems, forcing the governments to disconnect from the Internet • Industrial/commercial espionage conducted to give the perpetrators unfair competitive advantage • Denial-of-service attacks against popular websites; and so on. • At a personal level, most of us have received scam email designed to defraud us or to trick us into disclosing account numbers and passwords (known in the cyber security industry as phishing). And many of us have experienced the infection of our personal computers with spyware designed to capture and report our online activities to others, or some form of malware, such as a worm or a virus designed to render the computer inoperable and/or its data unusable. • These abuses are all predicated on the unrestricted connectivity provided by the internet.
  • 13. WHAT IS CIE? IMPACT ON SOCIETY RISKS CONCLUSIONS
  • 14. Conclusions • Engineers have always been at the forefront of innovation and exploitation of technology, so it is no surprise that many of them have turned their skills to the challenge of building and maintaining trusted network facilities. • Thus far, most have acquired the special technical skills necessary to do this work on the job. Only recently have accredited engineering programmes started to emerge that focus on this area of professional practice. • “CIE” needs to mature in order to be recognized as an engineering discipline. Improving CIE practice standards within industry and government, collaborating with other stakeholders, and shaping future legislation and regulations will help to contribute to solving the world’s cyber-security crisis. • This is an area that needs development, and needs to be fully regulated.
  • 15. Conclusions Recently the European Commission proposed concrete measures to accelerate the setting of standards within the Digital Single Market strategy:  Focus on 5 priority areas, by requesting the industry and standardisation bodies to develop standards in the following areas:  5G  Cloud computing  Internet of things  Data technologies  Cybersecurity  Co-financing testing and experimentation technologies to accelerate the establishment of standards, including public-private partnerships; thus, the timely development of standards will be guaranteed to drive innovation and growth of enterprises.