SECURITY OF CRITICAL INFRASTRUCTURE - PowerPoint PPT Presentation

1 / 24
About This Presentation
Title:

SECURITY OF CRITICAL INFRASTRUCTURE

Description:

SECURITY OF CRITICAL INFRASTRUCTURE PRESENTATION BY DR.P.S.PASRICHA, FORMER DGP, MAHARASHTRA * Security SECURITY OF CRITICAL INFRASTRUCTURE Anti national forces ... – PowerPoint PPT presentation

Number of Views:130
Avg rating:3.0/5.0
Slides: 25
Provided by: Kir970
Category:

less

Transcript and Presenter's Notes

Title: SECURITY OF CRITICAL INFRASTRUCTURE


1

SECURITY OF CRITICAL INFRASTRUCTURE PRESENTATION
BY DR.P.S.PASRICHA, FORMER DGP, MAHARASHTRA
2
SECURITY OF CRITICAL INFRASTRUCTURE
  • Anti national forces making determined bid to
    hurt
  • our economy and impede our progress
  • Consequently, our economic infrastructure and
  • key assets are highly vulnerable
  • Need to secure our countrys critical
    infrastructure

3
DEFINITION OF CRITICAL INFRASTRUCUTRE
  • Covers those systems and assets so vital to the
  • nation that their destruction, fully or
    partially, would
  • affect the security, economy and safety of a
    large
  • section of society
  • The criticality lies because its incapacity or
  • destruction may have a debilitating impact
    on
  • regional or national economy/security

4
CRITICAL INFRASTRUCUTRE
  • Includes
  • Nuclear/Space installations
  • Oil and Gas installations
  • Power Plants and Main Power Grids
  • Major Dams
  • Major Airports, Ports, Chemical Plants
  • Mass Transit Systems
  • Telecommunication Systems I.T
  • Defence installations and Research organizations

5
KEY ASSETS
  • These are individual targets whose destruction
    may
  • not endanger vital systems but could create
    local
  • disorder or damage nations pride
  • Example Important monuments like Taj
    Mahal,
  • certain temples/mosques, Parliament House,
    State
  • Legislature, etc.

6
CURRENT THREATS
  • Atomic/Nuclear Installations
  • Vulnerability increases in view of the Indo-US
  • agreement on Civil Nuclear Energy
    Co-operation 
  • During last two years, more than 50 Pak
    espionage
  • rings busted
  •  
  • LeT and JeM backed by ISI/Al Qaeda are in the
  • forefront
  •  

7
Defence Installations
  • Ordnance factories, especially those
  • located close to the naxal affected areas,
  • merit special vigilance
  • In any case, Ordnance factories are also
  • prone to blasts/fire incidents

8
Communications sector
  • Since communication network is very
  • important for the law enforcing agencies,
  • insurgent/extremist groups as well as
  • crime mafia would always want to
  • disrupt the system to facilitate their own
  • movements

9
Dams/Power Sector
  • Some of the project sites stock
  • explosives and hence their vulnerability
  • Many Power Plants located on dams are
  • also tourist attractions, which renders
  • access control rather difficult

10
I.T.Sector
  • With increasing inter-dependency on IT,
  • failure of one area of the IT can lead to
  • failure of other parts with the synergistic
  • effect on information industry
  • Cyber attacks cannot be ruled out in the
  • near future

11
Airports and Seaports
  • They continue to be the prime targets 
  • Carriage of war materials along with iron
  • scrap, etc. through the ports is a cause
  • of serious concern

12
Mass Transit System
  • The 7/11 serial bomb blast on the Mumbai
    suburban
  • railways and bomb explosions on various
  • upcountry trains in different parts of the
    country
  • are pointer to the vulnerability of the mass
    transit
  • systems
  • Delhi Metro and any other such transportation
  • network would need special surveillance

13
SOME CONCERNS..
  • No built-in security component in the design of
  • most of our Critical Infrastructure
    facilities
  • Inadequate manpower
  • Near-absence of technical support
  • Inadequate sensitization and training of the
    staff

Contd. . . .
14
  • Poor co-ordination mechanism
  • Intelligence cells inadequate
  • Lack of threat appreciation by the Management
  • Inadequate access control
  • Absence of information sharing mechanism
  • Lack of disaster management schemes in place

Contd. . . .
15
  • With the globalization of Indian economy, many
  • C.I. facilities now being owned by private
    sector
  • Therefore, important to sensitise and
  • train the private sector management on access
  • control and use of latest technology

16
CURRENT SYSTEM OF PROTECTION OF CI
  • The security of most CIs covered by State
    Police or
  • by Departmental/Private Security
  • The Central Para Military Forces associated with
  • hyper and super sensitive installations
  • Security audits conducted by I.B.

17
CI PROTECTION IN OTHER COUNTRIES
  • At most places, national security agencies
    closely
  • associated
  • In some countries, Critical Infrastructure
    Warning
  • Information Network in place
  • In USA, Information Sharing and Analysis Centre
  • (ISAC) allows information sharing with private
  • sector as well

18
MEASURES SUGGESTED
  • Identification of CIs and Prioritization of the
  • security requirements
  • Need for intelligence cells at each CI and to
    evolve
  • information sharing mechanism with all
    agencies
  •  Use of technical gadgets for enhancing security
  •  CISF could be nominated to act as the nodal
  • agency to advise the State Police Forces on
  • technical surveillance and other security
    measures

Contd. . . .
19
  • Close coordination with privately owned CIs
  • While designing security plans, inter-
    dependency
  • of various CIs must be borne in mind
  • Creation of State Security Force
  • Designating a Nodal Officer in every State
  • Co-ordination and Review Committees under DGP

20
EVOLVING A NATIONAL STRATEGY
  • Urgent need to evolve a national strategy and
    to
  • set up a National Agency to perform the
    following
  • tasks
  • Conduct vulnerability analysis
  • Issue warnings against threats
  • Suggest remedial plans
  • Response in case of attack on CIs
  • Restoration of services after attack

Contd. . . .
21
  • Education and awareness within public and
  • private sectors
  • Research and development
  • International co-operation
  • The agency must have
  • Trusted Information Sharing Network  
  • Its Sub-centres in each State for
  • co-ordination

22
SETTING UP A REGULATORY AUTHORITY
  • It may be examined later whether we need a
  • Regulatory Authority at the national level
    with the
  • task of laying down various norms and
    standards
  • of security and ensuring their implementation?

23
TO SUM UP
  • The threat to CIs and Key Assets are real.
  • CI protection must, therefore, be accorded
  • overwhelming priority
  •  
  • Needless to say, without adequate security
  • no development can take place.

24
Thank You
Write a Comment
User Comments (0)
About PowerShow.com