Page 242 - Trust in ICT 2017
P. 242

4                                                    Trust in ICT



                                                      Appendix II


                         Use case of creating trusted environment for rescue systems
                            (This appendix does not form an integral part of this Recommendation.)


            This Appendix describes an example of forming trusted environment in the domain of ensuring the safety of
            people in emergency situations.

            Nowadays  it  is  not  easy  for  a  person  to  navigate  in  technological  environment.  This  problem  becomes
            extremely actual in the case of an emergency, when the wrong action or procrastination leads to human
            victims.  The  use  of  modern  ICT  to  create  a  different  kind  of  warning  and  safety  systems  to  assist  the
            evacuation process can improve the safety of people in the case of an emergency.

            Moreover,  services  of  safety  systems  (e.g.  notification,  evacuation  management)  should  be  provided  in
            trusted environment. This is related to a direct threat to human life or his activity that occurs in the case of
            an unwanted effect from the interaction or security breach in the environment.

            The basic properties of trusted environment can be implemented in safety systems as follows:


            Predictability: it is required to inform users about the possible operation scenarios of the system, the types
            of information provided by this system (audio, video, text or tactile messages) and its mission. It is required
            to pre-define the alarm messages and introduce to the users the verity of possible alarm messages. In the
            process of evacuation the system is required to use only familiar to users evacuation plans to minimize the
            perception time of information and avoid any delay that could lead to human victims.


            Information security: It is required for the integrity and availability of warning signals, information about the
            evacuation process and other vital information in an emergency to be guaranteed for all users of the system.

            Interoperability:  all  users  of  the  system  is  required  to  be  able  to  receive  alarm  messages  and  other
            information  via  any  of  the  established  public  communication  channels  (cellular,  radio  and  television
            broadcasting, Internet, etc.) and with any of available devices (mobile phone, smart phone, TV, etc.). It is
            required  for  the  alarm  messages  and  other  emergency  information  to  be  provided  for  both  residents
            (employees) and non-residents (visitors) in the appropriate language.

            Availability of administration services: continuous customer support is required to be provided for all users
            of the system (residents, workers, visitors, etc.) in terms of assistance in safety related issues. All actions and
            instructions of the system is required to be recorded in a special vault (black box) in order to allow further
            establish their eligibility.


            The basic principles of safety systems in trusted environment can be described as follows:

            The  principle of  non-discrimination  –  in  security  systems  based  on  ICT electronic  alerts  and  evacuation
            instructions in case of emergency is required to have the same legal force and the same level of responsibility
            as the direct commands of rescue services.

            The  principle  of  technological  neutrality  –  the  information  from  the  security  system  is  required  to  be
            provided using all available for users technologies (see Interoperability).

            The principle of functional equivalence – in security systems based on ICT electronic alerts and evacuation
            instructions in case of emergency is required to be equivalent to the direct commands of rescue services.

            The principle of unification – the substantial part of the information from security system is required to be
            independent on transmission technology used in the communication channel.




            234
   237   238   239   240   241   242   243   244   245   246   247