Remotely crashing HLR MSC STP
|
|
|
- Martina Oliver
- 10 years ago
- Views:
Transcription
1 Remotely crashing HLR MSC STP MME Why it took telecom industry 20 years to recognize the problems with SS7 Philippe Langlois, P1 Security
2 Intro Philippe Langlois Founder of Qualys, Worldnet, TSTF, WaveSecurity, Non-Linear Group, Immunap, P1 Security Entrepreneur, Security, Networking Since 1987 in security Since 1993 starting companies Niche products, Blue ocean strategy
3
4 HLR Crash?
5 HLR Crashes impact O2 (UK) Network Downtime for 1 day, instability for 2 days Orange (FR) Network Downtime for nearly 1 day this summer (2012) And these were not even due to attacks Most often New equipment or feature deployed in network Protocol incompatibilities causes software instability
6 HLR Crash Symptoms When receiving traffic, all cluster nodes started to become unresponsive, one after another, eventually knocking off all 12 cluster nodes Solaris Cluster nodes 128 Gb RAM High end SUN server SAN connected Running full load balanced, distributed HLR software
7
8 Explicit Lyrics^W Logs
9 HLR crash Investigated a few HLR crashes for Operators When there was dispute with vendor Vendor always try to keep it private with Operators Some Vendors billed Operators when HLR was not under maintenance contract anymore Over 500,000 USD Typical in Telecom industry We decided to investigate further into existing HLR software and crashes
10 Malformed SCCP traffic
11 Simple SCCP append fuzz
12 Vendor claims Bug has been fixed Right Simple SS7 equivalent (over SCCP) of cat /dev/random nc target.signaling.operator.com 80 Result: 2 crashes Evolved fuzzer Supports SS7 TCAP protocol: 7 more crashes S upports SS7 MAP protocol: 19 more crashes Vendor discussion
13 One particular vendor discussion Feels like talking to a big OS vendor in the 1990s 1. Who are you? 2. Do you have a license for our product? 3. What is fuzzing? 4. Who authorized you to perform such fuzz testing? 5. Send me the content of your harddrive, sources and s 6. We have already fuzzed our product using XYZ commercial fuzzer, you must be mistaken in your result 7. We cannot reproduce. Silently fixes, push upgrades only to the reporting customer All this cost them nothing
14 Production ^ Debug HLR Crash Mutually exclusive Run production Be able to debug problems and crashes Origin of the crash Debug possible, Core dump enabled HLR process crashes Nearly 100 Gb of process to dump to disk Average time = 2mn Attack rate = cluster size * 60 / crash time = 12*60/2 = 360 packets/hour = 6 packets/minutes
15 exposure
16 HLR Attack surface Legacy protocols (SCCP, TCAP, MAP) Diameter Billing interfaces Provisioning OAM Reporting interfaces Business, Datawarehousing, Marketing, Analytics Legal, Regulatory and Law Enforcement
17 Impact of the legacy sandwich Legacy TDM IP-centric / SIGTRAN 80% of networks LTE 15% of networks MTP1 Gigabit Ethernet Gigabit Ethernet MTP2 ARP ARP MTP3 IP IP SCCP MPLS MPLS TCAP BGP BGP MAP IP IP SCTP SCTP M3UA Diameter SCCP MAP TCAP MAP
18 Reachability IP reachability Extremely limited Local to VLAN only Segmented Signaling plane SCCP reachability Worldwide LDC operators are routinely compromised Average time to intrusion in pentest: 2 weeks
19 One image is stronger than 10,000 pwns IP Reachability? No way!
20
21
22 Other systems
23 Ericsson STP Ericsson STP / SGW equipment Denial of Service (DoS) when it receives M3UA traffic with out of bound Signaling Point Code Simple integer overflow MTP3 -> 14 bits M3UA -> 32 bits Same code: block C7DR2 (20 year old) and TPLAT Downtime :(
24 Fun with forensics ALOGFIND Crash? C:\>alogfind -a b e g t alp PrcUnhandledExceptionFilter : UNHANDLED EXCEPTION!!! (In alogfind)
25 Ericsson MSC R14 Old interface and new interface
26 Industry status
27 Root causes of technical crashes Crashes Logic errors Decoding errors Format strings Injections 20% Buffer overflows 21% 16% 6% 37%
28 Occurrence in the wild We see many NMS traces of crashes During pentest Always a core on Unix-based Network Elements Always log traces of crashes Even specific directories filled with crashes traces, core files, HD dumps of crashed machines etc Some information leaks sometime about network element crashes It hit the news only when it s network wide crash
29 Occurrence in the news Rarely explained Only if it is witnessed by all the subscribers Very cautious about admitting it in public Consequences Loss of image Governmental enquiries
30
31
32 Denial The crash that you ve shown is not a vulnerability because the network-wide crashes we suffered in our GSM and 3G network were caused by malformed traffic from a misconfigured equipment, not from an attacker Spot the logic mistake here? If the crash was not caused by attackers, then it s not a vulnerability Ouch! That implies that vulnerabilities exist only if exploited? Vulnerability Risk Threat
33 Fake security feeling Crashes only No tracing of origin No proof of hacking When proof, cover up When exposed, say it s an internal problem only
34 Bias in analysis of equipment vulnerability Accessibility of crashes based on OS High availability mated pairs and clusters Shield identification of crashes Silent crash and restart No reporting in NMS No accessible crash files Vendor-only notifications Equipment types Monolithic Commercial OS Open source OS
35 Fuzzing coverage and illusions We have already fuzzed our product using XYZ commercial fuzzer, you must be mistaken in your result Fuzzer coverage Need to reach higher protocols for more complex code path Commercial and generic fuzzers don t go that far
36 About telecom software & equipment vulnerabilities Good Built for redudant, high availability Bad In a nice-people only network Without thinking about attackers Thinking only about fraud, not denial of service Fuzzing with IP fuzzer Not fuzzing higher-level protocols
37 Threat environment
38 An example of Real vs. Fake in Telecom products
39 HLR signalling compromise Operat or South East Asia MNO Date 2011 HLR compromised and eavesdropped, active customers record were stolen. HLR database, Ki, Event information leaked. Appeared on underground forums to be sold by chunk of 1,000 and 10,000.
40 Why the resistance?
41 Feeling like the 1980s Slow vendor response Customer (Operators) don t get the vulnerability information Security through obscurity even still publicly acknowledged Patching boxes make them unsupported Lack of SDLC Only less than 10 actors (vendor and operator combined) are up to date in term of security
42 Filtering on SS7 Also known as filtering Filtering on SSN nearly inexistant Less than 5 operators are accurate in term of filtering No filtering on addresses Impossible by protocol specification Indian Mobile Network Operator CTO Screening?
43 Why is it not fixed? Was a lack of tools to show the problems Resistance in Operators Resistance in Vendors Resistance in Industry Association Lack of access to researchers (Network, equipment) Difficult trust in smaller vendor (big 5 only) Lack of support of government, national security projects
44 Resistance of Operators Loss of image vs. SMS trust factor Public acceptance Inquiry of regulators India example Running Nessus on Telecom network is not Telecom Security Lack of knowledge due to Vendors
45 Resistance of Vendors Our turf only IPR is their job security Outsourcing & TIO Even getting documentation is difficult for customers Know they are not doing SDLC right Know many existing tools are legacy-level
46 Resistance of Industry Associations Tech focus or Legal focus Look at the leader of some security groups Protect the image Barrier to entry for new tech Protection of the main vendors Inbreeding feeling Ownership of the security groups by vendors
47 It is changing
48 How to improve? - Strategic National, government-led telecom monitoring TSIRT Operator TSOCs Telecom Vulnerability information feed (VKB) Telecom Specific Equipment certification (TCERT TCNE1) Adhere to TCERT (Operator, Gov, Researcher) Periodic perimeter scanning
49 How to improve? External pentesting (SS7, IMS, LTE) Recognize the perimeter Open up industry association Use specific fuzzer Arrival of Open Source Pressure of Internet-based traffic Specific initiatives (TCERT)
50 Conclusion Improvement in progress Research, TCERT, Scans, Awareness Vendors lagging Even preventing security Few operators are current on security Most react to crashes only
51 Questions?
52 Thanks (We re HIRING! :)
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
Security researcher at P1 Security. Hacking Telco equipment: The HLR/HSS Laurent Ghigonis P1 Security
Hacking Telco equipment The HLR/HSS Laurent Ghigonis Security researcher at P1 Security What are we talking about? A mobile network operator Core Network Network passive capture showing Global Titles Mobile
Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers
Protecting Mobile Networks from SS7 Attacks Telesoft White Papers Christian Feest 23rd June 2015 SS7 Networks The Challenge The problem with the current SS7 system is that messages can be altered, injected
Immersed Network Discovery and Attacks. Philippe Langlois Telecom Security Task Force [email protected] http://www.tstf.
Immersed Network Discovery and Attacks Specifics of Telecom Core Network (CN) insider attacks Philippe Langlois Telecom Security Task Force [email protected] http://www.tstf.net 1 Speaker Introduction
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Virtual Patching: a Proven Cost Savings Strategy
Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes
Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT
Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure
SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network
SDN AND SECURITY: Why Take Over the s When You Can Take Over the Network SESSION ID: TECH0R03 Robert M. Hinden Check Point Fellow Check Point Software What are the SDN Security Challenges? Vulnerability
NASCIO 2015 State IT Recognition Awards
NASCIO 2015 State IT Recognition Awards Title: State of Georgia Private Security Cloud Implementation Category: Cybersecurity Contact: Mr. Calvin Rhodes CIO, State of Georgia Executive Director, GTA [email protected]
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8
Release Notes for Epilog for Windows v1.7/v1.8 InterSect Alliance International Pty Ltd Page 1 of 22 About this document This document provides release notes for Snare Enterprise Epilog for Windows release
An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks
An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With
Who is Watching You? Video Conferencing Security
Who is Watching You? Video Conferencing Security Navid Jam Member of Technical Staff March 1, 2007 SAND# 2007-1115C Computer and Network Security Security Systems and Technology Video Conference and Collaborative
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
Telecom Signaling attacks on 3G and LTE networks
Telecom Signaling attacks on 3G and LTE networks from SS7 to all-ip, all open [email protected] P1 Security Inc. v1.1 Telecom security intro! SIP, PBX,...! Periphery, customer side.! Long gone
Peach Fuzzer Platform
Fuzzing is a software testing technique that introduces invalid, malformed, or random data to parts of a computer system, such as files, network packets, environment variables, or memory. How the tested
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options
White paper What a Vulnerability Assessment Scanner Can t Tell You Leveraging Network Context to Prioritize Remediation Efforts and Identify Options november 2011 WHITE PAPER RedSeal Networks, Inc. 3965
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Virtual Patching: a Compelling Cost Savings Strategy
Virtual Patching: a Compelling Cost Savings Strategy An Ogren Group Special Report November 2010 Executive Summary IT patch processes are at a critical crossroads. Exploits appear in the wild only a day
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Philippe Langlois, P1 Security Inc. [email protected]
Telecommunications Infrastructure Security Getting in the SS7 kingdom: hard technology and disturbingly easy hacks to get entry points in the walled garden. Philippe Langlois, P1 Security Inc. [email protected]
Security Information Management (SIM)
1. A few general security slides 2. What is a SIM and why is it needed 3. What are the features and functions of a SIM 4. SIM evaluation criteria 5. First Q&A 6. SIM Case Studies 7. Final Q&A Brian T.
Securing the Interconnect Signaling Network Security
Securing the Interconnect Signaling Network Security Travis Russell Director, Cyber Security, Service Provider Networks Oracle Communications August, 2015 Current security landscape Much attention has
The Hacker Strategy. Dave Aitel [email protected]. Security Research
1 The Hacker Strategy Dave Aitel [email protected] Security Research Who am I? CTO, Immunity Inc. History: NSA->@stake -> Immunity Responsible for new product development Vulnerability Sharing Club
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
Pentests: Exposing real world attacks
HERVÉ SCHAUER CONSULTANTS Cabinet de Consultants en Sécurité Informatique depuis 1989 Spécialisé sur Unix, Windows, TCP/IP et Internet Security Day 2011 Pentests: Exposing real world attacks Renaud Dubourguais
MX Platform Architecture Overview
MX Platform Architecture Overview Table of Contents MPATHIX MX PLATFORM: OVERVIEW...1 Open Architecture...1 Transitioning to VoIP?...1 MX PLATFORM MULTI-TIERED ARCHITECTURE...1 Key Architectural Interfaces...2
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
VOIP Attacks On The Rise
VOIP Attacks On The Rise Voice over IP (VoIP) infrastructure has become more susceptible to cyber-attack due to the proliferation of both its use and the tools that can be used for malicious purposes.
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
Real-time Network Monitoring and Security Platform for Securing Next-Generation Network. Assoc. Prof. Dr. Sureswaran Ramadass
Real-time Network Monitoring and Security Platform for Securing Next-Generation Network Assoc. Prof. Dr. Sureswaran Ramadass The platform Definition A description of a software framework that makes services
Goals. Understanding security testing
Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3
Fifty Critical Alerts for Monitoring Windows Servers Best practices
Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Securing Web Applications...at the Network Layer
Securing Web Applications......at the Network Layer OWASP Spain Chapter Meeting 16 th June, 2006 Barcelona (ES) Carlos Fragoso Mariscal Chief Technical Director [email protected] Securing Web Applications
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention
Whitepaper The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention May 2007 Copyright Sentrigo Ltd. 2007, All Rights Reserved The Challenge: Securing the Database Much of the effort
TECHNICAL NOTE 08/04 IINTRODUCTION TO VULNERABILITY ASSESSMENT TOOLS
TECHNICAL NOTE 08/04 IINTRODUCTION TO VULNERABILITY ASSESSMENT TOOLS 1 OCTOBER 2004 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor
PCI Security Scan Procedures. Version 1.0 December 2004
PCI Security Scan Procedures Version 1.0 December 2004 Disclaimer The Payment Card Industry (PCI) is to be used as a guideline for all entities that store, process, or transmit Visa cardholder data conducting
Network Cyber Security. Presented by: Motty Anavi RFL Electronics
Network Cyber Security Presented by: Motty Anavi RFL Electronics Agenda Cyber Security Threats Defense Strategy & Consequences Next Generation Networking ICS Vulnerabilities Liabilities Next Gen Networking
A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications
Polycom Recommended Best Security Practices for Unified Communications March 2012 Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective,
Penetration Testing //Vulnerability Assessment //Remedy
A Division Penetration Testing //Vulnerability Assessment //Remedy In Penetration Testing, part of a security assessment practice attempts to simulate the techniques adopted by an attacker in compromising
For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at www.visa.
Global Partner Management Notice Subject: Visa Data Security Alert Malicious Software and Internet Protocol Addresses Dated: April 10, 2009 Announcement: The protection of account information is a responsibility
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Incident Response 101: You ve been hacked, now what?
Incident Response 101: You ve been hacked, now what? Gary Perkins, MBA, CISSP Chief Information Security Officer (CISO) Information Security Branch Government of British Columbia Agenda: threat landscape
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Securing OS Legacy Systems Alexander Rau
Securing OS Legacy Systems Alexander Rau National Information Security Strategist Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Top Ten Web Attacks. Saumil Shah Net-Square. BlackHat Asia 2002, Singapore
Top Ten Web Attacks Saumil Shah Net-Square BlackHat Asia 2002, Singapore TodayÕs battleground Ð the Web Web sites and web applications rapidly growing. Complex business applications are now delivered over
The Security Development Lifecycle
The Security Development Lifecycle Steven B. Lipner Director of Security Engineering Strategy Security Business and Technology Unit Microsoft Corporation Context and History 1960s penetrate and patch 1970s
Denial of Service (DoS) Technical Primer
Denial of Service (DoS) Technical Primer Chris McNab Principal Consultant, Matta Security Limited [email protected] Topics Covered What is Denial of Service? Categories and types of Denial of
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Preventing Data Leaks At The Firewall A Simple, Cost-Effective Way To Stop Social Security and Credit Card Numbers From Leaving Your Network
Preventing Data Leaks At The Firewall A Simple, Cost-Effective Way To Stop Social Security and Credit Card Numbers From Leaving Your Network December 2008 Palo Alto Networks 232 E. Java Dr. Sunnyvale,
VoIP Security Methodology and Results. NGS Software Ltd
VoIP Security Methodology and Results NGS Software Ltd Barrie Dempster Senior Security Consultant [email protected] Agenda VoIP Security Issues Assessment Methodology Case Study: Asterisk VoIP Security
SS7: Locate. Track. Manipulate.
You have a remote-controlled tracking device in your pocket Tobias Engel @2b_as 2 Signalling System #7 Protocol suite used by most telecommunications network operators throughout the world
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
IBM Managed Security Services Vulnerability Scanning:
IBM Managed Security Services August 2005 IBM Managed Security Services Vulnerability Scanning: Understanding the methodology and risks Jerry Neely Network Security Analyst, IBM Global Services Page 2
12 Security Camera System Best Practices - Cyber Safe
12 Security Camera System Best Practices - Cyber Safe Dean Drako, President and CEO, Eagle Eye Networks Website version of white paper Dean Drako video introduction for cyber security white paper Introduction
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Integrating Tools Into the SDLC
Integrating Tools Into the SDLC FIRST Conference 2007 The problem Too many organizations have either: Failed to try software security tools at all Tried tools, but became overwhelmed Tools relegated to
ensuring security the way how we do it
ensuring security the way how we do it HUSTEF, 2015.11.18 Attila Tóth 1 Nokia Solutions and Networks 2014 Disclaimer The ideas, processes, tools are presented from a practitioner s point of view working
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Internet Security and Acceleration Server 2000 with Service Pack 1 Audit. An analysis by Foundstone, Inc.
Internet Security and Acceleration Server 2000 with Service Pack 1 Audit An analysis by Foundstone, Inc. Internet Security and Acceleration Server 2000 with Service Pack 1 Audit This paper presents an
Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!
Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured! Presented by: Kristen Zarcadoolas, Jim Soenksen, and Ed Sale PART 2: plan, act, repeat (from the look, plan,
Achilles Assurance Platform. Dr. Nate Kube Founder / CTO Wurldtech
Achilles Assurance Platform Dr. Nate Kube Founder / CTO Wurldtech Presentation Outline Statement of the Problem 3 rd Generation Achilles Assurance Platform Questions and Answers Achilles Certification
Barracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
WEB 2.0 AND SECURITY
WEB 2.0 AND SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Geospatial Server Performance Colin Bertram UK User Group Meeting 23-Sep-2014
Geospatial Server Performance Colin Bertram UK User Group Meeting 23-Sep-2014 Topics Auditing a Geospatial Server Solution Web Server Strategies and Configuration Database Server Strategy and Configuration
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
Database Security & Auditing
Database Security & Auditing Jeff Paddock Manager, Enterprise Solutions September 17, 2009 1 Verizon 2009 Data Breach Investigations Report: 285 million records were compromised in 2008 2 Agenda The Threat
Ofir Arkin Insightix. A New Hybrid Approach for Infrastructure Discovery, Monitoring and Control
Ofir Arkin is the CTO and Co-founder of Insightix, which pioneers the next generation of IT infrastructure discovery, monitoring and auditing systems for enterprise networks. Ofir holds 10 years of experience
Adjusting Prevention Policy Options Based on Prevention Events. Version 1.0 July 2006
Adjusting Prevention Policy Options Based on Prevention Events Version 1.0 July 2006 Table of Contents 1. WHO SHOULD READ THIS DOCUMENT... 4 2. WHERE TO GET MORE INFORMATION... 4 3. VERIFYING THE OPERATION
NGN Next Generation Nightmare? What telco 2.0 really means
NGN Next Generation Nightmare? What telco 2.0 really means Nicolas FISCHBACH Senior Manager, Network Engineering Security, COLT Telecom [email protected] - http://www.securite.org/nico/ Internet-wide Security
The Web AppSec How-to: The Defenders Toolbox
The Web AppSec How-to: The Defenders Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to distribute malware
