SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
Critical
Infrastructure
Protection
David Alexander
University College London
“Those facilities, systems, sites and
networks necessary for the functioning
of society and the delivery of essential
services upon which daily life depends.”
What is critical infrastructure?
"Those infrastructure assets (physical
or electronic) that are vital to the
continued delivery and integrity of the
essential services upon which society
relies, the loss or compromise of which
would lead to severe economic or social
consequences or to loss of life."
What is critical infrastructure?
The sectors of critical infrastructure
• water
• energy
• food
• health
• transport
• communications
• finance
• government
• emergency
services
Elements of critical infrastructure
Water: dams, treatment plants, pipelines, sewers
Energy: power stations, transmission lines
Food: distribution networks, warehouses and sales points
Health: hospitals, emergency systems, pharmaceuticals
Transport: road, rail, air, water
airports, sea ports, roads, railways, bridges
Communications: telephone, radio, cyber
Finance: banks, money supply, financial services
Government: national, regional, local
Emergency services: fire, police, ambulance, specialist.
• national - of importance to the
functioning of national life and affairs
• local - of importance to the
functioning of local life and affairs.
The divisions of critical infrastructure
• natural events (floods, storms, etc.)
• technological failures and human error
• terrorism and sabotage.
Hazards to critical infrastructure
Water
treatment works Railway station
Fire station
Electricity sub-station
Broadband antenna
Hospital
Supermarket
Power station
Waste water
treatment works
FLOOD SITUATION
Generation
output
restricted
Generator
out of service
Generator
out of service
Generator
out of service
Generation
output
increased
Additional
generator
on stand-by
Example of regional flood impact on electricity grid
Previously affected
Near misses
At risk
(1 in 100)
Low risk
Risk exposure level
Low
Medium
High
Threat
Historic
Predicted
Low
Criticality scale
Impact
on life
Economic
impact
Impact on
essential
services
Impactcategories
5
4
3
2
1
Critical threshold
Critical national
infrastructure
Other national
infrastructure
Virtually
certain
HIGH
Probable
SIGNI-
FICANT
Possible
Improbable
INTER-
MEDIATE
Highly
unlikely
LOW
Trivial Low Moderate Extensive Catastrophic
Failureprobability
Effects and degree of damage
Infrastructure criticality matrix
HAZARD
VULNERABILITY
EXPOSURE
A simple
risk assessment
matrix
Different definitions of exposure:
• under threat for a
given period of time
• at risk to a given extent
of possible loss.
A person who spends five minutes
twice a day crossing a bridge that
is at risk of collapse is exposed
to that risk for 10/(60x24x7)=
0.00098 of a week
Command
& control
Delegation
to agency
Delegation
to agency &
negotiation
Enforced
self-
regulation
Voluntary
self-
regulation
More
interventionist
Less
interventionist
The regulatory continuum
Government
ownership
Market
forces
The ALARP concept
Negligible risk
Unacceptable risk
Broadly acceptable
region (no need for
detailed work to
demonstrate ALARP)
Unacceptable region
ALARP or tolerability
region: risk assumed
only if benefit warrants it
Cost of risk reduction
Risk Inefficient
measures
Disproportionate
measures
Insufficient
measures
Optimal
measures
Critical infrastructure
Safeguarding critical infrastructures
• redundant systems
• adequate levels of operating supplies
• fault-tolerant design
• "fail-safe" design
• adequate and reserve manpower
• scenarios for failures and disasters
• contingency and emergency plans
- kept current
• involvement of top management
• measuring weaknesses
• creating resilience and redundancy
• restoring essential services.
Critical infrastructure protection:
a programme, a plan or an activity
SMART criteria:
S - specific
M - measurable
A - attractive,
acceptable
R - realistic,
realisable
T - timing.
The risk management process
Establish
the context
Identify hazards
and threats
Analyse risks
Evaluate risks
Manage risks
Accept
risks
Communicateandconsult
Monitorandreview
Yes
No
1
2
3
Fully
opera-
tional
Opera-
tional
Life safe
Near
collapse
Frequent
Occa-
sional
Rare
Very
rare
Performance level
Design standards versus performance levels
Designlevel
Unacceptable
performance
for new
construction
• measure interdependency
• adopt design standards
• create resilience.
Protection strategies
Policy
adoption
Risk assessment
• hazard
• vulnerability
• exposure
Policy assessment
• costs
• benefits
• consequences
Disaster
Expected
losses
Risk Policy
Assessment
Cyber
Human
Physical
Set goals and objectives
Identify assets, systems and networks
Assess risks: vulnerabilities,
threats, consequences
Prioritise
Implement programmes
Measure effectiveness
Continuous
improvement
to enhance
protection
of
critical
infrastructure
and key
resources
Feedback loop
interim.cabinetoffice.gov.uk/media/349103/strategic-framework.pdf
http://www.bmi.bund.de/SharedDocs/Downloads/EN/Broschueren/
Basisschutzkonzept_kritische_Infrastrukturen_en.html?nn=441658

Contenu connexe

Tendances

Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
Wajahat Rajab
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
idingolay
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
PECB
 

Tendances (20)

Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilities
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 

En vedette

DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
docomusa
 
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
tmuehleisen
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
Kyle Lai
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Juniper Networks
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Positive Hack Days
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
wardjo
 

En vedette (20)

Symantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection StudySymantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection Study
 
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
 
A Critical Overview of Disaster Theory
A Critical Overview of Disaster TheoryA Critical Overview of Disaster Theory
A Critical Overview of Disaster Theory
 
Crisis communication
Crisis communicationCrisis communication
Crisis communication
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
Hacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00bHacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00b
 
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
 
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Presentation
Presentation Presentation
Presentation
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure Cybersecurity
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
 
Bio Daniel Donatelli
Bio Daniel DonatelliBio Daniel Donatelli
Bio Daniel Donatelli
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 
U.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceU.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity Governance
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
Trauma in Disaster
Trauma in DisasterTrauma in Disaster
Trauma in Disaster
 

Similaire à Critical infrastructure

Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
Adhar kashyap
 
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docxAppendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
justine1simpson78276
 
noaa_csc1231455445156555455656666566.ppt
noaa_csc1231455445156555455656666566.pptnoaa_csc1231455445156555455656666566.ppt
noaa_csc1231455445156555455656666566.ppt
PapuKumarNaik1
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Candice Tang
 
CS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructureCS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructure
John Rooksby
 

Similaire à Critical infrastructure (20)

Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
 
CIP eu 2016 114(-8)
CIP eu 2016 114(-8)CIP eu 2016 114(-8)
CIP eu 2016 114(-8)
 
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docxAppendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
 
Cascading Disasters
Cascading DisastersCascading Disasters
Cascading Disasters
 
noaa_csc1231455445156555455656666566.ppt
noaa_csc1231455445156555455656666566.pptnoaa_csc1231455445156555455656666566.ppt
noaa_csc1231455445156555455656666566.ppt
 
Disaster Resilient Critical Infrastructure
Disaster Resilient Critical InfrastructureDisaster Resilient Critical Infrastructure
Disaster Resilient Critical Infrastructure
 
2015.10.06 emerging risks
2015.10.06 emerging risks2015.10.06 emerging risks
2015.10.06 emerging risks
 
CMD OTC Mitigation
CMD OTC MitigationCMD OTC Mitigation
CMD OTC Mitigation
 
Disaster Management Plan for Metro Railway
Disaster Management Plan for Metro RailwayDisaster Management Plan for Metro Railway
Disaster Management Plan for Metro Railway
 
Infrastructure Interdependencies: Connections that Alter Consequences
Infrastructure Interdependencies: Connections that Alter ConsequencesInfrastructure Interdependencies: Connections that Alter Consequences
Infrastructure Interdependencies: Connections that Alter Consequences
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
 
DISASTER MANAGEMENT
DISASTER MANAGEMENT DISASTER MANAGEMENT
DISASTER MANAGEMENT
 
Vulnerability to Disasters
Vulnerability to DisastersVulnerability to Disasters
Vulnerability to Disasters
 
CS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructureCS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructure
 
Public Health Preparedness for Disaster Management
Public Health Preparedness for Disaster ManagementPublic Health Preparedness for Disaster Management
Public Health Preparedness for Disaster Management
 
Disaster management approaches in chhattishgarh
Disaster management approaches in chhattishgarhDisaster management approaches in chhattishgarh
Disaster management approaches in chhattishgarh
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Bay - The Incident Command System.pptx
Bay -   The Incident Command System.pptxBay -   The Incident Command System.pptx
Bay - The Incident Command System.pptx
 
Blackoutslidesharefinalfinal 150610082252-lva1-app6892
Blackoutslidesharefinalfinal 150610082252-lva1-app6892Blackoutslidesharefinalfinal 150610082252-lva1-app6892
Blackoutslidesharefinalfinal 150610082252-lva1-app6892
 
Blackout of Critical Services: Do you know your exposure?
Blackout of Critical Services: Do you know your exposure?Blackout of Critical Services: Do you know your exposure?
Blackout of Critical Services: Do you know your exposure?
 

Plus de Prof. David E. Alexander (UCL)

Plus de Prof. David E. Alexander (UCL) (20)

For a Reliable Civil Protection System That Keeps Citizens Safe
For a Reliable Civil Protection System That Keeps Citizens SafeFor a Reliable Civil Protection System That Keeps Citizens Safe
For a Reliable Civil Protection System That Keeps Citizens Safe
 
Systemic Risks and Emerging Challenges.pdf
Systemic Risks and Emerging Challenges.pdfSystemic Risks and Emerging Challenges.pdf
Systemic Risks and Emerging Challenges.pdf
 
How to Make Your Article More Acceptable for Publication
How to Make Your Article More Acceptable for PublicationHow to Make Your Article More Acceptable for Publication
How to Make Your Article More Acceptable for Publication
 
Extreme Weather Preparedness
Extreme Weather PreparednessExtreme Weather Preparedness
Extreme Weather Preparedness
 
Managing Today's Complex Crises: Lessons From the Past
Managing Today's Complex Crises: Lessons From the PastManaging Today's Complex Crises: Lessons From the Past
Managing Today's Complex Crises: Lessons From the Past
 
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptx
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptxCivil Protection and Intersectionality 2022-09-26 Science Forum.pptx
Civil Protection and Intersectionality 2022-09-26 Science Forum.pptx
 
Cascading disasters 2022 03-02
Cascading disasters 2022 03-02Cascading disasters 2022 03-02
Cascading disasters 2022 03-02
 
Il Futuro delle Grandi Emergenze
Il Futuro delle Grandi EmergenzeIl Futuro delle Grandi Emergenze
Il Futuro delle Grandi Emergenze
 
Disasters in Italy: Environmental and Cultural Resilience
Disasters in Italy: Environmental and Cultural ResilienceDisasters in Italy: Environmental and Cultural Resilience
Disasters in Italy: Environmental and Cultural Resilience
 
Cultura e disastri
Cultura e disastriCultura e disastri
Cultura e disastri
 
Covid lessons for disaster risk governance
Covid lessons for disaster risk governanceCovid lessons for disaster risk governance
Covid lessons for disaster risk governance
 
Black swans a critique
Black swans   a critiqueBlack swans   a critique
Black swans a critique
 
Planning for Pandemics
Planning for PandemicsPlanning for Pandemics
Planning for Pandemics
 
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-IT
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-ITManaging the Covid Recovery / Gestire la Ripresa da Covid EN-IT
Managing the Covid Recovery / Gestire la Ripresa da Covid EN-IT
 
Civil Defence to Civil Protection (IRDR Taster Lecture)
Civil Defence to Civil Protection (IRDR Taster Lecture)Civil Defence to Civil Protection (IRDR Taster Lecture)
Civil Defence to Civil Protection (IRDR Taster Lecture)
 
Readiness for Post-Covid-19 Challenges
Readiness for Post-Covid-19 ChallengesReadiness for Post-Covid-19 Challenges
Readiness for Post-Covid-19 Challenges
 
Scenario Methodology for Planning Future Activities
Scenario Methodology for Planning Future ActivitiesScenario Methodology for Planning Future Activities
Scenario Methodology for Planning Future Activities
 
Disastri a cascata
Disastri a cascataDisastri a cascata
Disastri a cascata
 
Grenfell Tower - Controlled Anger
Grenfell Tower - Controlled AngerGrenfell Tower - Controlled Anger
Grenfell Tower - Controlled Anger
 
Warning and Evacuation
Warning and EvacuationWarning and Evacuation
Warning and Evacuation
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

Critical infrastructure