Traditional 911 capabilities will be augmented by NG911, opening them up to accept more media formats. These traditional 911 systems operate over telephone lines and closed, internal networks. This limits the types of information that PSAPs can accept and process.
NG911 infrastructure, on the other hand, operate on an Internet Protocol platform which enables interconnectivity across a range of public and private networks. This allows PSAPs to receive mixed media including text, photos, voice, and video.
“As described by the National Emergency Association (NENA), next-generation 911 infrastructure is a three-tiered IP-based system made up of hardware, data, software and operational policies and procedures that enable public safety answering points (PSAPs) to be interoperable and more efficient.”
The National Emergency Number Association, or NENA, has a project working towards replacing traditional 911 systems to a next generation, IP-based infrastructure. Some of the capabilities they are aiming to accomplish are:
Let’s dive into some of the technical advantages of a next-generation IP-based emergency services infrastructure.
Faster, resilient, connected and more expansive, an internet protocol based infrastructure enables a better experience and likely outcome for call-takers and citizens alike.
A mix of internal and external databases support its services.
Each building block adds specific features and functions to the i3 architecture. This architecture, if adopted by all, provides interoperability. With this, PSAPs can serve as backups to one another. So if one PSAP experiences an emergency outing (although diverse routing should be in place), another PSAP would be able to step in and serve emergency callers. Barriers to adopting this system appear to be from lack of funding, however, grant money has been allocated across the nation to help institute these systems.
“…electronic information and communication systems, and the information contained in these systems…Information and communications systems are composed of hardware and software that process, store, and communicate data of all types. Processing includes the creation, access, modification, and destruction of information. Storage includes paper, magnetic, electronic and all other media types. Communications include sharing and distribution of information.”
More specifically:
Since both IT and communications systems have converged, it is important to look at them holistically in order to better combat risks.
“Critical infrastructure refers to the diverse components that enable the essential services which are the backbone for American society. The United States economic security, public health, and safety is underpinned by critical infrastructure, both physical and cyber, including distributed networks and NG911.”
The interconnectivity of NG911 is enhancing emergency response capabilities. However, this new interconnectivity also expands worries of cyber risks and opens NG911 systems to new potential attack vectors. While the rewards far outweigh the risks, it's critical that PSAPs understand and proactively manage risks to ensure full functionality of our emergency response systems.
A cybersecurity risk occurs when a threat exploits a vulnerability that results in a negative event and negative consequences for the network. To do begin assessing your risks, it's handy to use the following formula:
Let A = the asset you're protecting. Assets could be people, property (both tangible and intangible), or information.
Let T = the threat you're defending against. A threat is anything that can exploit a vulnerability, weather malicious or accidental.
Let V = the vulnerability in your system. A vulnerability is any weakness or hole that can be exploited by a threat.
Let R = your risk. Your risk is the sum of your assets, threats, and vulnerabilities.
You may have a threat against your assets but if you have minimal vulnerabilities then your risk will be low. Similarly, you may have vulnerabilities in your system but if there are no threats that exploit your vulnerabilities then your risk will be low. However, if your defending a high-value asset then your risk will be higher by default, all other variables being the same.
“The National Institute of Standards and Technology (NIST) use the C-I-A Triad as a benchmark to evaluate information systems security. The triad is comprised of the three attributes that are most crucial for a secure system. The attributes of the C-I-A triad are:
Confidentiality - Ensure data can only be accessed by authorized users.
Integrity - Data must be trustworthy and not altered during transmission, storage, and retrieval.
Availability - Your network components and network as a whole must be operational and effective for its intended purposes. ”
The emergency response realm, in particular, is severely impacted by the loss of confidentiality, integrity, or availability. Imagine the loss of confidentiality in an NG911 environment. Identity thieves would have a field day with the information at their disposal. Ongoing police investigations would be disrupted. Losing integrity would see 9-1-1 calls and responses disrupted. Loss of availability would see urgent requests failing to reach PSAPs.
Devices & Equipment |
|
Network Infrastructure & Connections |
|
Data, Apps, & Services |
|
The risks listed above hold severe potential impacts that range from work disruptions for affected network users, to financial losses from unauthorized use of data and the cost of resolution, to the loss of life or property from inadequate or unavailable emergency response operations.