1 / 24

SECURITY OF CRITICAL INFRASTRUCTURE PRESENTATION BY DR.P.S.PASRICHA, FORMER DGP, MAHARASHTRA

SECURITY OF CRITICAL INFRASTRUCTURE PRESENTATION BY DR.P.S.PASRICHA, FORMER DGP, MAHARASHTRA. SECURITY OF CRITICAL INFRASTRUCTURE. Anti national forces making determined bid to hurt our economy and impede our progress Consequently, our economic infrastructure and

aricin
Télécharger la présentation

SECURITY OF CRITICAL INFRASTRUCTURE PRESENTATION BY DR.P.S.PASRICHA, FORMER DGP, MAHARASHTRA

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SECURITY OF CRITICAL INFRASTRUCTURE PRESENTATION BY DR.P.S.PASRICHA, FORMER DGP, MAHARASHTRA

  2. SECURITY OF CRITICAL INFRASTRUCTURE • Anti national forces making determined bid to hurt our economy and impede our progress • Consequently, our economic infrastructure and key assets are highly vulnerable • Need to secure our country’s critical infrastructure

  3. DEFINITION OF CRITICAL INFRASTRUCUTRE • Covers those systems and assets so vital to the nation that their destruction, fully or partially, would affect the security, economy and safety of a large section of society • The criticality lies because its incapacity or destruction may have a debilitating impact on regional or national economy/security

  4. CRITICAL INFRASTRUCUTRE • Includes • Nuclear/Space installations • Oil and Gas installations • Power Plants and Main Power Grids • Major Dams • Major Airports, Ports, Chemical Plants • Mass Transit Systems • Telecommunication Systems & I.T • Defence installations and Research organizations

  5. KEYASSETS • These are individual targets whose destruction may not endanger vital systems but could create local disorder or damage nation’s pride Example: Important monuments like Taj Mahal, certain temples/mosques, Parliament House, State Legislature, etc.

  6. CURRENT THREATS • Atomic/Nuclear Installations • Vulnerability increases in view of the Indo-US • agreement on “Civil Nuclear Energy Co-operation”  • During last two years, more than 50 Pak espionage • rings busted • LeT and JeM backed by ISI/Al Qaeda are in the forefront

  7. Defence Installations • Ordnance factories, especially those located close to the naxal affected areas, merit special vigilance In any case, Ordnance factories are also prone to blasts/fire incidents

  8. Communicationssector • Since communication network is very important for the law enforcing agencies, insurgent/extremist groups as well as crime mafia would always want to disrupt the system to facilitate their own movements

  9. Dams/Power Sector • Some of the project sites stock explosives and hence their vulnerability • Many Power Plants located on dams are also tourist attractions, which renders access control rather difficult

  10. I.T.Sector • With increasing inter-dependency on IT, failure of one area of the IT can lead to failure of other parts with the synergistic effect on information industry • Cyber attacks cannot be ruled out in the near future

  11. Airports and Seaports • They continue to be the prime targets  • Carriage of war materials along with iron scrap, etc. through the ports is a cause of serious concern

  12. Mass Transit System • The 7/11 serial bomb blast on the Mumbai suburban railways and bomb explosions on various upcountry trains in different parts of the country are pointer to the vulnerability of the mass transit systems • Delhi Metro and any other such transportation network would need special surveillance

  13. SOMECONCERNS….. • No built-in security component in the design of most of our Critical Infrastructure facilities • Inadequate manpower • Near-absence of technical support • Inadequate sensitization and training of the staff Contd. . . .

  14. Poor co-ordination mechanism • Intelligence cells inadequate • Lack of threat appreciation by the Management • Inadequate access control • Absence of information sharing mechanism • Lack of disaster management schemes in place Contd. . . .

  15. With the globalization of Indian economy, many C.I. facilities now being owned by private sector • Therefore, important to sensitise and train the private sector management on access control and use of latest technology

  16. CURRENT SYSTEM OF PROTECTION OF CI • The security of most CIs covered by State Police or by Departmental/Private Security • The Central Para Military Forces associated with hyper and super sensitive installations • Security audits conducted by I.B.

  17. CI PROTECTION IN OTHER COUNTRIES • At most places, national security agencies closely associated • In some countries, Critical Infrastructure Warning Information Network in place • In USA, Information Sharing and Analysis Centre (ISAC) allows information sharing with private sector as well

  18. MEASURES SUGGESTED • Identification of CIs and Prioritization of the security requirements • Need for intelligence cells at each CI and to evolve information sharing mechanism with all agencies • Use of technical gadgets for enhancing security • CISF could be nominated to act as the nodal agency to advise the State Police Forces on technical surveillance and other security measures Contd. . . .

  19. Close coordination with privately owned CIs • While designing security plans, inter- dependency • of various CIs must be borne in mind • Creation of State Security Force • Designating a Nodal Officer in every State • Co-ordination and Review Committees under DGP

  20. EVOLVING A NATIONAL STRATEGY • Urgent need to evolve a national strategy and to set up a National Agency to perform the following tasks: • Conduct vulnerability analysis • Issue warnings against threats • Suggest remedial plans • Response in case of attack on CIs • Restoration of services after attack Contd. . . .

  21. Education and awareness within public and private sectors • Research and development • International co-operation • The agency must have: Trusted Information Sharing Network & Its Sub-centres in each State for co-ordination

  22. SETTING UP A REGULATORY AUTHORITY • It may be examined later whether we need a Regulatory Authority at the national level with the task of laying down various norms and standards of security and ensuring their implementation?

  23. TO SUM UP………… • The threat to CIs and Key Assets are real. CI protection must, therefore, be accorded overwhelming priority • Needless to say, without adequate security no development can take place.

  24. Thank You

More Related