SlideShare a Scribd company logo
1 of 18
Download to read offline
Next Generation 9-1-1:
Examination of Information Security
  Management In Public Safety
    Communications Centers
             By Natalie J. Yardley

     A Thesis Presented in Partial Fulfillment
       of the Requirements for the Degree
                Master of Science

       University of Advancing Technology
                   March 2012
The Defense Presentation:
   Purpose
   Rationale and Background
   Research Questions
   Methodology
   Sample
   Study Findings
   Discussion of findings
   Recommendations
   What I learned
Purpose
   This study explores the current level of
    progress towards achieving compliance
    of NG-SEC or noncompliance.
Rationale and Background
   9-1-1 is a vital societal system.

   U.S. 9-1-1 systems are transforming
    from closed analog systems to open
    Internet-Protocol systems, known as
    Next Generation 9-1-1 (NG9-1-1).

   NG9-1-1 need exists.
Research Questions
 What are the Next Generation 9-1-1 security
  standards and policies?
 What percentage of agencies have Next
  Generation 9-1-1 status?
   What percentage of agencies are compliant
    or noncompliant?
   What are the obstacles and/or challenges for
    public safety answering points (PSAPs) that are
    not compliant with public safety communication
    information security standards
Methodology
   Mixed Method study:
    ◦ Literature Review (secondary data)
    ◦ Survey (primary data – to receive field
               perspective)
• Descriptive (no tests were performed)

• Exploratory

• Evaluation
Sample
•   225 agencies were sent surveys.

•   Agencies were stratified into three segments
    based on the population of their jurisdiction:
    ◦ Small (1-99,999)
    ◦ Medium (100,000-499,999)
    ◦ Large (500,00 or greater)

• 56 agencies responded to the survey.
Study Findings #1
   NENA has provided the national
    security standards and best practices
    for public safety answering points with
    the National Emergency Number
    Association (NENA) Security for Next-
    Generation 9-1-1 Standards(NG-
    SEC).
Study Findings #2
Study Findings #3
 None of the agencies reported Next
  Generation 9-1-1 status (all reported
  Wireless Phase II status) and
  therefore are not required to be
  compliant to NG-SEC.
 Regardless of no NG9-1-1 status, 7 of
  56 agencies were compliant with NG-
  SEC standards (1 large, 4 medium, 2
  small).
Study Findings #4
   Non-compliant obstacles/or
    challenges:
    ◦ Cost
    ◦ Time
    ◦ Staff Constraints
Discussion of Findings
   What are the NG9-1-1 information
    security management standards?
    ◦ National Emergency Number Association
      (NENA) Security for Next-Generation 9-1-1
      Standards (NG-SEC).
Discussion (continued)
   What amount of agencies have NG9-
    1-1?
    ◦ The 56 agencies that responded to the
      research study were not NG9-1-1 status.
Discussion (continued)
   What percent of agencies are
    compliant or noncompliant?
    ◦ 7 of 56 agencies were compliant with NG-
      SEC standards (1 large, 4 medium, 2
      small).
    ◦ None of the 56 responding agencies were
      NG9-1-1.
Discussion (continued)
   What are the obstacles and/or
    challenges for not being compliant
    with NG-SEC?
    ◦ Again, none are required to be compliant
      (none NG9-1-1), but agencies responded.
    ◦ Time, cost, and staff constraints were the
      most responses for agencies.
Recommendations
   A study that surveyed the entire public
    agency population and allowed a better
    comparison of large, medium, and small
    agencies would be beneficial.

   Examining more specific areas of
    compliance within the NENA Security for
    Next-Generation 9-1-1 standards, such
    as examining national or regional
    physical security, acceptable usage, or
    incident response policies.
Recommendations
(continued)
   Studies comparing compliance
    between agency size segments, rural
    verses metropolitan entities, or
    regional sections within the United
    States.

   Examine survey styles that work best
    with government and/or public safety
    entities to allow a higher response
    rate.
What I learned

   Technology is fast. Government is
    slow.

   This is only the beginning.

More Related Content

What's hot

iwatchjr | Next Generation Wearable for Young Generation
iwatchjr | Next Generation Wearable for Young Generationiwatchjr | Next Generation Wearable for Young Generation
iwatchjr | Next Generation Wearable for Young Generationiwatchjr
 
Some musings on evaluating the impacts of integrated systems research
Some musings on evaluating the impacts of integrated systems researchSome musings on evaluating the impacts of integrated systems research
Some musings on evaluating the impacts of integrated systems researchWater, Land and Ecosystems (WLE)
 
A Systematic Review of Model-Driven Security
A Systematic Review of Model-Driven SecurityA Systematic Review of Model-Driven Security
A Systematic Review of Model-Driven SecurityPhu H. Nguyen
 
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...Chamila Wijayarathna
 
Improved Security Detection & Response via Optimized Alert Output: A Usabilit...
Improved Security Detection & Response via Optimized Alert Output: A Usabilit...Improved Security Detection & Response via Optimized Alert Output: A Usabilit...
Improved Security Detection & Response via Optimized Alert Output: A Usabilit...Russ McRee
 
Use of Qualitative Approaches for Impact Assessments of Integrated Systems Re...
Use of Qualitative Approaches for Impact Assessments of Integrated Systems Re...Use of Qualitative Approaches for Impact Assessments of Integrated Systems Re...
Use of Qualitative Approaches for Impact Assessments of Integrated Systems Re...Water, Land and Ecosystems (WLE)
 
11 problem solving with sara
11 problem solving with sara11 problem solving with sara
11 problem solving with saraJim Gilmer
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring SecurityChris Mullins
 
Forecasting
ForecastingForecasting
Forecastingsumit235
 
Approaches to Preservation Storage Technologies
Approaches to Preservation Storage Technologies Approaches to Preservation Storage Technologies
Approaches to Preservation Storage Technologies Micah Altman
 
Kopcha Sullivan 2008 Reaction
Kopcha Sullivan 2008 ReactionKopcha Sullivan 2008 Reaction
Kopcha Sullivan 2008 Reactionnicolalritter
 

What's hot (13)

iwatchjr | Next Generation Wearable for Young Generation
iwatchjr | Next Generation Wearable for Young Generationiwatchjr | Next Generation Wearable for Young Generation
iwatchjr | Next Generation Wearable for Young Generation
 
Some musings on evaluating the impacts of integrated systems research
Some musings on evaluating the impacts of integrated systems researchSome musings on evaluating the impacts of integrated systems research
Some musings on evaluating the impacts of integrated systems research
 
A Systematic Review of Model-Driven Security
A Systematic Review of Model-Driven SecurityA Systematic Review of Model-Driven Security
A Systematic Review of Model-Driven Security
 
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
 
Impact evaluation an overview
Impact evaluation  an overviewImpact evaluation  an overview
Impact evaluation an overview
 
Improved Security Detection & Response via Optimized Alert Output: A Usabilit...
Improved Security Detection & Response via Optimized Alert Output: A Usabilit...Improved Security Detection & Response via Optimized Alert Output: A Usabilit...
Improved Security Detection & Response via Optimized Alert Output: A Usabilit...
 
Use of Qualitative Approaches for Impact Assessments of Integrated Systems Re...
Use of Qualitative Approaches for Impact Assessments of Integrated Systems Re...Use of Qualitative Approaches for Impact Assessments of Integrated Systems Re...
Use of Qualitative Approaches for Impact Assessments of Integrated Systems Re...
 
11 problem solving with sara
11 problem solving with sara11 problem solving with sara
11 problem solving with sara
 
AAIC_2016_Cognition_Kit_-_Online_v2
AAIC_2016_Cognition_Kit_-_Online_v2AAIC_2016_Cognition_Kit_-_Online_v2
AAIC_2016_Cognition_Kit_-_Online_v2
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring Security
 
Forecasting
ForecastingForecasting
Forecasting
 
Approaches to Preservation Storage Technologies
Approaches to Preservation Storage Technologies Approaches to Preservation Storage Technologies
Approaches to Preservation Storage Technologies
 
Kopcha Sullivan 2008 Reaction
Kopcha Sullivan 2008 ReactionKopcha Sullivan 2008 Reaction
Kopcha Sullivan 2008 Reaction
 

Viewers also liked

Thesis writing using apa format
Thesis writing using apa formatThesis writing using apa format
Thesis writing using apa formatBed Dhakal
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpointneha47
 
Thesis Power Point Presentation
Thesis Power Point PresentationThesis Power Point Presentation
Thesis Power Point Presentationriddhikapandya1985
 
MASTER'S THESIS DEFENSE PRESENTATION (Sept 16)
MASTER'S THESIS DEFENSE PRESENTATION (Sept 16)MASTER'S THESIS DEFENSE PRESENTATION (Sept 16)
MASTER'S THESIS DEFENSE PRESENTATION (Sept 16)Stacy Holton
 
Guestlecture Online & social media data, for masterstudents Business Administ...
Guestlecture Online & social media data, for masterstudents Business Administ...Guestlecture Online & social media data, for masterstudents Business Administ...
Guestlecture Online & social media data, for masterstudents Business Administ...Danny Oosterveer
 
Writing proposals
Writing proposalsWriting proposals
Writing proposalsVenu J S
 
Thesis Defence for Doctor of Information Science
Thesis Defence for Doctor of Information ScienceThesis Defence for Doctor of Information Science
Thesis Defence for Doctor of Information ScienceYuma Inoue
 
Online clinic reservation
Online clinic reservationOnline clinic reservation
Online clinic reservationMay Ann Mas
 
Developing A Blended Learning Strategy: Instructional Media & Pedagogical Con...
Developing A Blended Learning Strategy: Instructional Media & Pedagogical Con...Developing A Blended Learning Strategy: Instructional Media & Pedagogical Con...
Developing A Blended Learning Strategy: Instructional Media & Pedagogical Con...Jolly Holden
 
My Thesis Defense Presentation
My Thesis Defense PresentationMy Thesis Defense Presentation
My Thesis Defense PresentationOnur Taylan
 
Blended Learning PowerPoint
Blended Learning PowerPointBlended Learning PowerPoint
Blended Learning PowerPointdnoland
 
Thesis Defense Presentation
Thesis Defense PresentationThesis Defense Presentation
Thesis Defense Presentationosideloc
 
Dissertation oral defense presentation
Dissertation   oral defense presentationDissertation   oral defense presentation
Dissertation oral defense presentationDr. Naomi Mangatu
 
Powerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis DefencePowerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis DefenceCatie Chase
 
Masters Defense presentation
Masters Defense presentationMasters Defense presentation
Masters Defense presentationProyag Datta
 
Masters Thesis Defense Presentation
Masters Thesis Defense PresentationMasters Thesis Defense Presentation
Masters Thesis Defense Presentationprajon
 

Viewers also liked (18)

Thesis writing using apa format
Thesis writing using apa formatThesis writing using apa format
Thesis writing using apa format
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpoint
 
Thesis Power Point Presentation
Thesis Power Point PresentationThesis Power Point Presentation
Thesis Power Point Presentation
 
MASTER'S THESIS DEFENSE PRESENTATION (Sept 16)
MASTER'S THESIS DEFENSE PRESENTATION (Sept 16)MASTER'S THESIS DEFENSE PRESENTATION (Sept 16)
MASTER'S THESIS DEFENSE PRESENTATION (Sept 16)
 
Guestlecture Online & social media data, for masterstudents Business Administ...
Guestlecture Online & social media data, for masterstudents Business Administ...Guestlecture Online & social media data, for masterstudents Business Administ...
Guestlecture Online & social media data, for masterstudents Business Administ...
 
How to prepare_for_your_viva
How to prepare_for_your_vivaHow to prepare_for_your_viva
How to prepare_for_your_viva
 
Writing proposals
Writing proposalsWriting proposals
Writing proposals
 
Master thesis presentation
Master thesis presentationMaster thesis presentation
Master thesis presentation
 
Thesis Defence for Doctor of Information Science
Thesis Defence for Doctor of Information ScienceThesis Defence for Doctor of Information Science
Thesis Defence for Doctor of Information Science
 
Online clinic reservation
Online clinic reservationOnline clinic reservation
Online clinic reservation
 
Developing A Blended Learning Strategy: Instructional Media & Pedagogical Con...
Developing A Blended Learning Strategy: Instructional Media & Pedagogical Con...Developing A Blended Learning Strategy: Instructional Media & Pedagogical Con...
Developing A Blended Learning Strategy: Instructional Media & Pedagogical Con...
 
My Thesis Defense Presentation
My Thesis Defense PresentationMy Thesis Defense Presentation
My Thesis Defense Presentation
 
Blended Learning PowerPoint
Blended Learning PowerPointBlended Learning PowerPoint
Blended Learning PowerPoint
 
Thesis Defense Presentation
Thesis Defense PresentationThesis Defense Presentation
Thesis Defense Presentation
 
Dissertation oral defense presentation
Dissertation   oral defense presentationDissertation   oral defense presentation
Dissertation oral defense presentation
 
Powerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis DefencePowerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis Defence
 
Masters Defense presentation
Masters Defense presentationMasters Defense presentation
Masters Defense presentation
 
Masters Thesis Defense Presentation
Masters Thesis Defense PresentationMasters Thesis Defense Presentation
Masters Thesis Defense Presentation
 

Similar to Next Generation 9-1-1 Security Study

2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity SurveyAdobe
 
Applying a Systematic Review on Adaptive Security for DSPL
 Applying a Systematic Review on Adaptive Security for DSPL Applying a Systematic Review on Adaptive Security for DSPL
Applying a Systematic Review on Adaptive Security for DSPLcsandit
 
The intelligence community has not always learned the lessons of i.docx
The intelligence community has not always learned the lessons of i.docxThe intelligence community has not always learned the lessons of i.docx
The intelligence community has not always learned the lessons of i.docxcherry686017
 
Arj97 tolentino
Arj97 tolentinoArj97 tolentino
Arj97 tolentinoGBMV
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Emily Brady
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
Please read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxPlease read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxLeilaniPoolsy
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveyEdgar Alejandro Villegas
 
How To Optimize Your EDC Solution For Risk Based Monitoring
How To Optimize Your EDC Solution For Risk Based MonitoringHow To Optimize Your EDC Solution For Risk Based Monitoring
How To Optimize Your EDC Solution For Risk Based Monitoringwww.datatrak.com
 
Here are 4 discussion posts by class mates from the 495 class that.docx
Here are 4 discussion posts by class mates from the 495 class that.docxHere are 4 discussion posts by class mates from the 495 class that.docx
Here are 4 discussion posts by class mates from the 495 class that.docxpooleavelina
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Marcello Marchesini
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)PwC France
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-StudyTam Nguyen
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalSelectedPresentations
 
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESSTATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESIJCSES Journal
 
Census results
Census resultsCensus results
Census resultsJisc
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015Capgemini
 

Similar to Next Generation 9-1-1 Security Study (20)

2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey
 
Applying a Systematic Review on Adaptive Security for DSPL
 Applying a Systematic Review on Adaptive Security for DSPL Applying a Systematic Review on Adaptive Security for DSPL
Applying a Systematic Review on Adaptive Security for DSPL
 
The intelligence community has not always learned the lessons of i.docx
The intelligence community has not always learned the lessons of i.docxThe intelligence community has not always learned the lessons of i.docx
The intelligence community has not always learned the lessons of i.docx
 
Arj97 tolentino
Arj97 tolentinoArj97 tolentino
Arj97 tolentino
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
Please read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxPlease read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docx
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 
How To Optimize Your EDC Solution For Risk Based Monitoring
How To Optimize Your EDC Solution For Risk Based MonitoringHow To Optimize Your EDC Solution For Risk Based Monitoring
How To Optimize Your EDC Solution For Risk Based Monitoring
 
Here are 4 discussion posts by class mates from the 495 class that.docx
Here are 4 discussion posts by class mates from the 495 class that.docxHere are 4 discussion posts by class mates from the 495 class that.docx
Here are 4 discussion posts by class mates from the 495 class that.docx
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
 
when minutes counts
when minutes countswhen minutes counts
when minutes counts
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
 
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESSTATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
 
Census results
Census resultsCensus results
Census results
 
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, EthiopiaPresentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 

Recently uploaded

Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHelp Desk Migration
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAScathy664059
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024Chandresh Chudasama
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverseSiemens
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressorselgieurope
 
Features of a Call Recorder Spy App for Android.pdf
Features of a Call Recorder Spy App for Android.pdfFeatures of a Call Recorder Spy App for Android.pdf
Features of a Call Recorder Spy App for Android.pdfOne Monitar
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
How do I Check My Health Issues in Astrology.pdf
How do I Check My Health Issues in Astrology.pdfHow do I Check My Health Issues in Astrology.pdf
How do I Check My Health Issues in Astrology.pdfshubhamaapkikismat
 

Recently uploaded (20)

Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your Business
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAS
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024
 
Authentically Social - presented by Corey Perlman
Authentically Social - presented by Corey PerlmanAuthentically Social - presented by Corey Perlman
Authentically Social - presented by Corey Perlman
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverse
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressors
 
Features of a Call Recorder Spy App for Android.pdf
Features of a Call Recorder Spy App for Android.pdfFeatures of a Call Recorder Spy App for Android.pdf
Features of a Call Recorder Spy App for Android.pdf
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
How do I Check My Health Issues in Astrology.pdf
How do I Check My Health Issues in Astrology.pdfHow do I Check My Health Issues in Astrology.pdf
How do I Check My Health Issues in Astrology.pdf
 

Next Generation 9-1-1 Security Study

  • 1. Next Generation 9-1-1: Examination of Information Security Management In Public Safety Communications Centers By Natalie J. Yardley A Thesis Presented in Partial Fulfillment of the Requirements for the Degree Master of Science University of Advancing Technology March 2012
  • 2. The Defense Presentation:  Purpose  Rationale and Background  Research Questions  Methodology  Sample  Study Findings  Discussion of findings  Recommendations  What I learned
  • 3. Purpose  This study explores the current level of progress towards achieving compliance of NG-SEC or noncompliance.
  • 4. Rationale and Background  9-1-1 is a vital societal system.  U.S. 9-1-1 systems are transforming from closed analog systems to open Internet-Protocol systems, known as Next Generation 9-1-1 (NG9-1-1).  NG9-1-1 need exists.
  • 5. Research Questions  What are the Next Generation 9-1-1 security standards and policies?  What percentage of agencies have Next Generation 9-1-1 status?  What percentage of agencies are compliant or noncompliant?  What are the obstacles and/or challenges for public safety answering points (PSAPs) that are not compliant with public safety communication information security standards
  • 6. Methodology  Mixed Method study: ◦ Literature Review (secondary data) ◦ Survey (primary data – to receive field perspective) • Descriptive (no tests were performed) • Exploratory • Evaluation
  • 7. Sample • 225 agencies were sent surveys. • Agencies were stratified into three segments based on the population of their jurisdiction: ◦ Small (1-99,999) ◦ Medium (100,000-499,999) ◦ Large (500,00 or greater) • 56 agencies responded to the survey.
  • 8. Study Findings #1  NENA has provided the national security standards and best practices for public safety answering points with the National Emergency Number Association (NENA) Security for Next- Generation 9-1-1 Standards(NG- SEC).
  • 10. Study Findings #3  None of the agencies reported Next Generation 9-1-1 status (all reported Wireless Phase II status) and therefore are not required to be compliant to NG-SEC.  Regardless of no NG9-1-1 status, 7 of 56 agencies were compliant with NG- SEC standards (1 large, 4 medium, 2 small).
  • 11. Study Findings #4  Non-compliant obstacles/or challenges: ◦ Cost ◦ Time ◦ Staff Constraints
  • 12. Discussion of Findings  What are the NG9-1-1 information security management standards? ◦ National Emergency Number Association (NENA) Security for Next-Generation 9-1-1 Standards (NG-SEC).
  • 13. Discussion (continued)  What amount of agencies have NG9- 1-1? ◦ The 56 agencies that responded to the research study were not NG9-1-1 status.
  • 14. Discussion (continued)  What percent of agencies are compliant or noncompliant? ◦ 7 of 56 agencies were compliant with NG- SEC standards (1 large, 4 medium, 2 small). ◦ None of the 56 responding agencies were NG9-1-1.
  • 15. Discussion (continued)  What are the obstacles and/or challenges for not being compliant with NG-SEC? ◦ Again, none are required to be compliant (none NG9-1-1), but agencies responded. ◦ Time, cost, and staff constraints were the most responses for agencies.
  • 16. Recommendations  A study that surveyed the entire public agency population and allowed a better comparison of large, medium, and small agencies would be beneficial.  Examining more specific areas of compliance within the NENA Security for Next-Generation 9-1-1 standards, such as examining national or regional physical security, acceptable usage, or incident response policies.
  • 17. Recommendations (continued)  Studies comparing compliance between agency size segments, rural verses metropolitan entities, or regional sections within the United States.  Examine survey styles that work best with government and/or public safety entities to allow a higher response rate.
  • 18. What I learned  Technology is fast. Government is slow.  This is only the beginning.