ETSI & Lawful Interception of IP Traffic
|
|
|
- Charlene Casey
- 9 years ago
- Views:
Transcription
1 ETSI & Lawful Interception of IP Traffic Jaya Baloo RIPE 48 May 3 Netherlands Amsterdam, The
2 Contents Introduction Introduction to Lawful Interception Interception Interception of Internet services Origins Origins in The European Community The The European Interception Legislation in Brief ETSI ETSI Standards , , Interception Interception Suppliers & Discussion of Techniques Future Future Developments & Issues
3 Introduction to Lawful Interception ETSI definition of (lawful) interception: interception: action (based on the law), performed by an network operator/access provider/service provider (NWO/AP/SvP SvP), of making available certain information and providing that information to a law enforcement monitoring facility. Network Operator, Access Provider or Service Provider LI order Deliver requested information Law Enforcement Agency (LEA) Law Enforcement Monitoring Facility
4 Why intercept? LI s Raison D etre Terrorism Pedophilia rings Cyber stalking Data theft Industrial espionage Drug dealers on the internet Why not? Privacy Security
5 Legal Issues in LI Judge: "Am I not to hear the truth?" Objecting Counsel: "No, Your Lordship is to hear the evidence." Some characteristics of evidence- relevance to LI Admissible can evidence be considered in court *differs per country Authentic explicitly link data to individuals Accurate reliability of surveillance process over content of intercept Complete tells a complete story of a particular circumstance Convincing to juries probative value, and subjective practical test of presentation
6 Admissibility of Surveillance Evidence Virtual Locus Delecti Hard to actually find criminals in delicto flagrante How to handle expert evidence? Juries are not composed of network specialists. Legal not scientific decision making. Case for treating Intercepted evidence as secondary and not primary evidence Primary is the best possible evidence e.g. in the case of a document its original. Secondary is clearly not the primary source e.g. in the case of a document a copy.
7 Interception of Internet services
8 Interception of Internet services What are defined as Internet services? access to the Internet the services that go over the Internet, such as: surfing the World Wide Web (e.g. html), , chat and icq, VoIP, FoIP ftp, telnet
9 What about encrypted traffic? Secure e (e.g. PGP, S/MIME) Secure surfing with HTTPS (e.g. SSL, TLS) VPNs (e.g. IPSec) Encrypted IP Telephony (e.g. pgp -phone and Nautilus) etc. If applied by NWO/AP/SvP then encryption should be stripped before sending to LEMF or key(s) should be made available to LEA else a challenge for the LEA
10 Logical Overview
11 Technical Challenges Req. Maintain Transparency & Standard of Communication Identify Target - Monitoring Radius misses disconnect Capture Intercept information Effective Filtering Switch Packet Reassembly Software complexity increases bugginess Peering with LEMF monitoring multiple XDSL ccts.
12 Origins in The European Community
13 What is LI based on in the EU? Legal Basis EU directive Convention on Cybercrime Council of Europe- Article 20- Real time collection of traffic data Article 21- Interception of content data National laws & regulations Technically Not Carnivore Not Calea Standards, Best Practices based approach IETF s standpoint (RFC 2804 IETF Policy on Wiretapping )
14 The European Interception Legislation in Brief
15 Solution Requirements
16 European Interception Legislation France Commission Nationale de Contrôle des Interceptions de Sécurité -- La loi Loi sur la Securite Quotidienne November 2001 Germany G Gesetz zur Beschränkung des Brief-,, Post- und Fernmeldegeheimnisses The Counter terrorism Act January 2002
17 UK Interception Legislation UK Regulation of Investigatory Powers Act 2000 Anti-terrorism, terrorism, Crime and Security Act 2001 The tragic events in the United States on 11 September 2001 underline the importance of the Service s s work on national security and, in particular, counter-terrorism. terrorism. Those terrible events significantly raised the stakes in what was a prime area of the Service s s work. It is of the utmost importance that our Security Service is able to maintain its capability against this very real threat, both in terms of staff s and in terms of other resources. Part of that falls to legislation and since this website was last updated we have seen the advent of the Regulation of Investigatory Powers Act 2000, Terrorism Act 2000 and the Anti- Terrorism Crime and Security Act Taken together these Acts provide the Security Service, amongst others, with preventative and investigative capabilities, relevant to the technology of today and matched to the threat from those who would seek to harm or undermine our society. The UK Home Secretary s s Foreword on
18 The Case in Holland At the forefront of LI : both legally & technically The Dutch Telecommunications Act 1998 Operator Responsibilities The Dutch Code of Criminal Proceedings Initiation and handling of interception request The Special Investigation Powers Act -streamlines criminal investigation methods WETVOORSTEL backdoor decree to start fishing expeditions for NAW info Provider to supply info not normally available TIIT STANDARD predecessor to current ETSI standards LIO National Interception Office in operation since end of 2002
19 European Telecommunications Standards Institute
20 ETSI TR Responsibility- Lawful Interception requirements must be addressed separately to Access Provider and Service Provider. 5 layer model - Network Level & Service Level division Implementation Architecture Telephone cct.. (PSTN/ISDN) Digital Subscriber Line (xdsl( xdsl) Local Area Network (LAN) Permanent IP Address Security Aspects HI3 Delivery
21 The ETSI model NOW / AP / SvP s domain LEA domain Network Internal Functions intercept related information (IRI) content of communication (CC) NWO/AP/SvP s administration function IRI mediation function HI1 HI2 IIF CC mediation function HI3 INI LEMF LI handover interface HI IIF: internal interception function INI: internal network interface HI1: administrative information HI2: intercept related information HI3: content of communication
22 Sample Architecture for HI2 and HI3 S1 interception S1 interception S1 interception S2 gathering & transport S3 management HI2 & HI3 box Mediation Function Internet Law Enforcement Monitoring Facility (LEMF) T1 T1 T1 T2 (LEA1) T2 (LEA2) ISP LI Warrant Admin Desk LI order HI1 Law Enforcement Agency (LEA)
23 ETSI IP Delivery Specifies: modular approach used for specifying IP based handover interfaces header(s) to be added to IRI & CC sent over HI2 & HI3 (R4 LIID) (R5 & R7 Communication Identifier) (R37 & R38 Timestamp) (R15 & R19 Sequence Number) (R10 Direction) (R9 Payload Type) (R8 Interception Type) protocols for the transfer of IRI & CC protocol profiles for the handover interface
24 ETSI Protocol Stack LAYER NAME Handover OSI Layer 6 & 7 Clause 6.2 Responsibilities Create & maintain one or more delivery functions. Error Reporting. Aggregate PDUs; Associate header info; Create padding PDUs; Assign PDUs to delivery functions Session Create & maintain a single transport connection and monitor its status. Run keepalive mech.; Encode/ decode PDU elements; integrity mech, Buffer data Transport Network Create & maintain a network cct. Network Protocol
25 ETSI Stage 1 description 1 of interception info. in process of sending & receiving Stage 2 2 description of when IRI & CC shall be sent and what info it shall contain Send Event Recieve Event download event distinction client Content intercept or complete session Webmail
26 ETSI Internet Access Services Stage 1 1 description of the interception information in relation to the process of binding a target identity to an IP address when providing IAS Stage 2 2 description of when IRI & CC shall be sent and what info. it shall contain LI Requirements -administrative as well as capturing of traffic Preventing over and under collection of intercept data Reference Topologies & Scenarios Further Radius & DHCP IP IRI intercepts & TCP,UDP IRI intercepts
27 ETSI Internet Access Services contd. 2 Target Identity- Username or Network Access Identifier IP address (Ipv4 or Ipv6) Ethernet address Dial-in in Number calling line identity Cable Modem Identifier Other unique identifier agreed beteween AP & LEA Result of interception- provided when Attempt to access the access network When access to access network permitted /not On change of status/ location
28 ETSI Internet Access Services contd. 3 IRI contains- Identities used by or associated with the target identity ( dial in calling line number and called line number, access server identity, ethernet addresses, access device identifier Details of services used and their associated parameters Info. relating to status Timestamps CC shall be provided for every IP datagram that: Has the target's IP address as the IP source address Has the target's IP address as the IP destination address
29 Interception Suppliers & Discussion of Techniques
30 LI Implementations Verint formerly known as Comverse Infosys ADC formerly known as SS8 Accuris Pine Nice Aqsacom Digivox Telco/ ISP hardware vendors Siemens Alcatel Cisco Nortel
31 Implementation techniques Active- direct local interception i.e. Bcc: Semi-Active Active- interaction with Radius to capture and filter traffic per IP address Passive- no interaction with ISP required only interception point for LEA device Most of the following are active or a combination of active and semi-active implementations
32 Verint = Comverse - Infosys Based in Israel Re : Phrack Used by Dutch LEMF Used extensively internationally supports CALEA & ETSI Use of Top Layer switch Response
33 NICE Used in BE as t1 Proprietary implemented for ETSI Feat., topic extraction, Keyword Spotting, Remote Send of CC Auto Lang. detection and translation Runs on Windows NT &2000 Svr. Stand alone internet/ telephony solution
34 ADC = SS8 Use of proprietary hardware Used for large bandwidth ccts. Known to be used in Satellite Traffic centers Supports CALEA ETSI Use of Top Layer switch
35 Accuris Max. of 50 concurrent taps Solution not dependant on switch type Can use single s2 as concentrator Offer Gigabit Solution but depends on selected switch capability and integration with filter setting Supports Calea & ETSI
36 It s s all about the M$ney Solutions can cost anywhere from 100,000 Euro to 700,000 Euro for the ISP UK Govt. expected to spend 46 billion over the next 5 years- subsequently reduced to 27 billion Division of costs Cap Ex = ISP Op Ex = Govt. Penalties for non-compliance Fines up to 250,000 euros Civil Charges House Arrest of CEO of ISP Cooperation between ISPs to choose single LI tool
37 Conclusions for Law Enforcement If you re going to do it do it right Disclosure of tools and methods Adherence to warrant submission requirements Completeness of logs and supporting info. Proof of non- contamination of target data Maintaining relationship with the private sector Law Enforcement personnel Training Defining role of police investigators Defining role of civilian technicians Handling Multi Focal investigations
38 Future Developments & Issues EU Expansion Europol stipulations Data Retention Decisions ENFOPOL organization Borderless LI ISP Role EU wide agreements on Intercept Initiation Quantum Cryptography WLAN challenges The Future of Privacy Legislation?
39 Web Sites opentap.org quintessenz.at/.at/cgi- bin/index?funktion funktion=doquments phrack.com cryptome.org statewatch.org iwar.org..org.uk cipherwar.com rights.org/interception
40 Q&A / Discussion Does LI deliver added value to Law Enforcement s s ability to protect the public? What about open source Interception tools? Will there be a return of the Clipper Chip? Should there be mandated Key Escrow of ISP s s encryption keys? What types of oversight need to be built into the system to prevent abuse?
41 Thank You. Jaya Baloo baloos.org
Lawful Interception of IP Traffic: The European Context
Lawful Interception of IP Traffic: The European Context Jaya Baloo Draft 1 Contents Introduction to Lawful Interception Interception of Internet services Origins in The European Community The European
Simple Law Enforcement Monitoring
Simple Law Enforcement Monitoring Fred Baker draft-baker-slem-architecture-01.txt ftp://ftpeng.cisco.com/fred/ietf/slem.ppt ftp://ftpeng.cisco.com/fred/ietf/slem.pdf The message I wish had been found in
WHITE PAPER. Gaining Total Visibility for Lawful Interception
WHITE PAPER Gaining Total Visibility for Lawful Interception www.ixiacom.com 915-6910-01 Rev. A, July 2014 2 Table of Contents The Purposes of Lawful Interception... 4 Wiretapping in the Digital Age...
STAR-GATE TM. Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards.
STAR-GATE TM Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards. In this document USA Tel: +1-703-818-2130 Fax: +1-703-818-2131 E-mail: [email protected]
Introducing STAR-GATE Enhancements for Packet Cable Networks
STAR-GATE TM Annex: Intercepting PacketCable Compliance with CALEA and ETSI Delivery and Administration Standards. In this document USA Tel: +1-703-818-2130 Fax: +1-703-818-2131 E-mail: [email protected]
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
IP-based Delivery Network via OpenVPN Provider Handbook
Federal Department of Justice and Police FDJP IT Service Centre ISC-FDJP Post and Telecommunications Surveillance Service IP-based Delivery Network via OpenVPN Provider Handbook Date: 04 July 2012 Version
Today s challenges in Lawful Interception. C. Rogialli, October 11, 2005 RIPE MEETING 51 - Amsterdam
Today s challenges in Lawful Interception C. Rogialli, October 11, 2005 RIPE MEETING 51 - Amsterdam 1 Lawful Interception a Definition Action (based on the law) performed by a network operator / access
Brocade Telemetry Solutions
WHITE PAPER www.brocade.com Service provider Brocade Telemetry Solutions telemetry applications such as Monitoring and Lawful Intercept are important to Service Providers and impose unique requirements
EAGLE EYE IP TAP. 1. Introduction
1. Introduction The Eagle Eye - IP tap is a passive IP network application platform for lawful interception and network monitoring. Designed to be used in distributed surveillance environments, the Eagle
Lawful Interception in German VoIP Networks
Lawful Interception in German VoIP Networks 22C3, Berlin Hendrik Scholz [email protected] http://www.wormulon.net/ Agenda What is Lawful Interception (LI)? Terms, Laws Lawful Interception in PSTN networks
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
EAGLE EYE Wi-Fi. 1. Introduction
1. Introduction Internet access has become very popular by the emergence of broadband services, and busy yet unregulated Internet traffic causes challenges to administration and management. When it comes
Remote Forensic Software. Dr. Michael Thomas DigiTask GmbH, Germany
Dr. Michael Thomas DigiTask GmbH, Germany DigiTask Who we are and what we do Special Telecommunication Systems for Law Enforcement Agencies (LEA) Development of special solutions for the needs of LI Located
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Multi-Homing Security Gateway
Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000
Lawful Interception in practise in the Netherlands
SvSnet Stichting Nationale Beheersorganisatie Internet Providers Lawful Interception in practise in the Netherlands Cyprus 30 June 2010 Pim van Stam SvSnet 1 SvSnet Stichting Nationale Beheersorganisatie
How To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
we secure YOUR network we secure network security English network security
we secure YOUR network English network security network security CryptoGuard VPN family The CryptoGuard VPN 5000 family is a flexible (cost-)effective security system, completely developed by Compumatica.
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
ICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Wholesale IP Bitstream on a Cable HFC infrastructure
Wholesale IP Bitstream on a Cable HFC infrastructure In order to understand the issues related to an ISP reselling Cable Based Internet access it is necessary to look at similarities and dissimilarities
Utimaco LIMS Access Points. Realtime Network Monitoring for Lawful Interception and Data Retention
Realtime Network Monitoring for Lawful Interception and Data Retention 2 Realtime Network Monitoring with Passive Probes Realtime monitoring of network connections has been used by telecom operators for
Seamless Roaming in a Remote Access VPN Environment
Always on If we look just a few years into the future, the office warrior who works exclusively onsite will be a scarce phenomenon. Instead, these busy professionals will use PCs, smartphones, and tablets
Lawful Interception of VoIP. Rudolf Winschuh Business Development Transaction Security / Telecommunications
Lawful Interception of VoIP Rudolf Winschuh Business Development Transaction Security / Telecommunications Agenda Company Overview Lawful Interception Definition and Terms Legal Framework Functional Overview
Lawful Interception in P2Pbased
Lawful Interception in P2Pbased VoIP Systems Jan Seedorf (jan.seedorf_at_nw.neclab.eu) NEC Laboratories Europe Heidelberg, Germany July Page 2008 1-1 IPTCOMM 2008 Heidelberg, Germany Outline 1.
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
utimaco a member of the Sophos Group
Utimaco LIMS Lawful Interception of Telecommunication Services Benefits Compliance + Provides surveillance of all common telecommunication services in fixed and mobile networks, incl. telephony, fax, SMS,
Understanding the Cisco VPN Client
Understanding the Cisco VPN Client The Cisco VPN Client for Windows (referred to in this user guide as VPN Client) is a software program that runs on a Microsoft Windows -based PC. The VPN Client on a
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
Real World IPv6 Migration Solutions. Asoka De Saram Sr. Director of Systems Engineering, A10 Networks
Real World IPv6 Migration Solutions Asoka De Saram Sr. Director of Systems Engineering, A10 Networks 1 Agenda Choosing the right solutions Design considerations IPv4 to IPv6 migration road map Consumer
Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer
Joseph Migga Kizza A Guide to Computer Network Security 4) Springer Contents Part I Understanding Computer Network Security 1 Computer Network Fundamentals 1.1 Introduction 1.2 Computer Network Models
Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0
Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Birdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA
White Paper Birdstep Intelligent Mobile IP Client v2.0, Universal Edition Seamless secure mobility across all networks Copyright 2002 Birdstep Technology ASA Haakon VII's gate 5B, N-0161 Oslo, Norway Tel:
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Voice over IP Security
Voice over IP Security Patrick Park Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA vii Contents Introduction xvii Part I VoIP Security Fundamentals 3 Chapter 1 Working with
Gigabit SSL VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the
Authentication, Authorization and Accounting (AAA) Protocols
Authentication, Authorization and Accounting (AAA) Protocols Agententechnologien in der Telekommunikation Sommersemester 2009 Babak Shafieian [email protected] 10.06.2009 Agententechnologien
In this Profile. USA Tel: +1-703-818-2130 Fax: +1-703-818-2131 E-mail: [email protected]
In this Profile USA Tel: +1-703-818-2130 Fax: +1-703-818-2131 E-mail: [email protected] Israel Tel: +972-3-766-4119 Fax: +972-3-766-4747 E-mail: [email protected] About Comverse Infosys
Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document
Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general
For the protocol access paths listed in the following table, the Sentry firmware actively listens on server ports to provide security for the CDU.
CDU Security This provides a quick reference for access paths to Server Technology s Cabinet Distribution Unit (CDU) products, shows if the access path is secure, and if so, provides an overview of how
DrayTek Vigor 2950. High Performance Firewall Router. - VPN - Up to 200 concurrent tunnels. - Load Balancing & Failover between WAN ports
DrayTek Vigor 2950 Â High Performance Firewall Router VPN Up to 200 concurrent tunnels Load Balancing & Failover between WAN ports DoS/DDos Protection & Stateful Packet Inspection QoS (Quality of Service)
Executive Summary and Purpose
ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
inet Enterprise Features Fact Sheet
2007 inet Enterprise Features Fact Sheet inetmon Sdn. Bhd. 1010 & 1011, Tingkat 10 Blok D, Dataran Usahawan Kelana,17, Jalan SS 7/26, Kelana Jaya, 47301 Petaling Jaya, Selangor Darul Ehsan Tel: 603-7880
Networks 2. Gabriela Ochoa. 2014 University of Stirling CSCU9B1 Essential Skills for the Information Age. Content
Networks 2 Gabriela Ochoa Lecture Networks 2/Slide 1 Content How is Internet connected? Internet backbone Internet service providers (ISP) How to connect a home computer to the Internet? How do networks
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Data Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
Chapter 32 Internet Security
Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3
Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work
Cable Modems Definition Cable modems are devices that allow high-speed access to the Internet via a cable television network. While similar in some respects to a traditional analog modem, a cable modem
Deploying Media Probes in Evolving VoIP Networks
Deploying Media Probes in Evolving VoIP Networks Dave Gladwin [email protected] Presentation Template V4.00 Nov-05 Agenda! Convergence of Fixed and Mobile services are driving networks
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
Applications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens
Nick Marly, Dominique Chantrain, Jurgen Hofkens Alcatel Francis Wellesplein 1 B-2018 Antwerp Belgium Key Theme T3 Tel : (+32) 3 240 7767 Fax : (+32) 3 240 8485 E-mail : [email protected] Tel : (+32)
Scenario: IPsec Remote-Access VPN Configuration
CHAPTER 3 Scenario: IPsec Remote-Access VPN Configuration This chapter describes how to use the security appliance to accept remote-access IPsec VPN connections. A remote-access VPN enables you to create
Intrusion Detection, Packet Sniffing
Intrusion Detection, Packet Sniffing By : Eng. Ayman Amaireh Supervisor :Dr.: Lo'ai Tawalbeh New York Institute of Technology (NYIT)- Jordan s s campus-2006 12/2/2006 eng Ayman 1 What is a "packet sniffer"?
Network Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
Advanced Computer Networks IN2097. 1 Dec 2015
Chair for Network Architectures and Services Technische Universität München Advanced Computer Networks IN2097 1 Dec 2015 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and Services Department
Local Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
Network Service, Systems and Data Communications Monitoring Policy
Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring
ETSI TS 102 232-5 V2.1.1 (2007-02)
TS 102 232-5 V2.1.1 (2007-02) Technical Specification Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 5: Service-specific details for IP Multimedia
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Broadband Phone Gateway BPG510 Technical Users Guide
Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
Using MIS 3e Chapter 6A Appendix
Study Questions Using MIS 3e Chapter 6A Appendix How the Internet Works David Kroenke Q1: How does email travel? Q2: What is a communications protocol? Q3: What are the functions of the five TCP/IP-OSI
Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
Configure A VoIP Network
Configure A VoIP Network Prof. Mr. Altaf. I. Darvadiya Electronics & Communication C.U.Shah College of Engg. & Tech. Wadhwan(363030), India e-mail: [email protected] Ms. Zarna M. Gohil Electronics & Communication
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
Regulation of Investigatory Powers Act 2000
Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen
VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service
VoIP Architecture VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service Marcin Godlewski Lead Engineer Scientific Atlanta, a Cisco Company Charles Moreman
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
Introduction. Technology background
White paper: Redundant IP-VPN networks Introduction IP VPN solutions based on the IPsec protocol are already available since a number of years. The main driver for these kinds of solutions is of course
Bandwidth Aggregation, Teaming and Bonding
Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet
