SECURING THE MOBILE NETWORK

Size: px
Start display at page:

Download "SECURING THE MOBILE NETWORK"

Transcription

1 AVIAT NETWORKS SECURING THE MOBILE NETWORK BY LOUIS SCIALABBA, AVIAT NETWORKS SOLUTIONS MARKETING

2 TABLE OF CONTENTS Introduction... 3 Impact of an Unsecure Mobile Network... 3 Benefits of Secure Mobile Networks... 4 Importance of Securing the Microwave Network... 4 Definition of Security Enforcement... 5 ITU-T X.800 Threats Model... 5 Physical Site and Equipment Security... 6 Secure Management... 6 Centralized user management... 6 Payload Encryption G and 3G Network Security G Mobile Network Security... 7 Solutions for LTE Microwave Backhaul Segments... 8 Customer Use Case... 9 MTN Ghana use of RADIUS... 9 Summary...10 Page 2

3 INTRODUCTION In an era of ubiquitous broadband communication at work and home, the issue of security in mobile backhaul is more important than ever. The new generation of LTE wireless technology is an enabler for applications such as mobile commerce, voice over IP (VoIP), and high-definition video delivery to smartphones, but it has also opened some sinkholes in the foundation that pre-lte architectures and applications have established. This white paper discusses the burgeoning need for Security in Mobile Backhaul in terms of benefits to MNOs and society. IMPACT OF AN UNSECURE MOBILE NETWORK Security incidents can have severe consequences for mobile operators. Short-term public relations hiccups can be dealt with, but over the long-term, carriers are subject to subscriber churn, which can significantly influence profitability. Softpedia.com cited a study performed by Opinion Matters, whereby it was determined that 75 percent of smartphone users in the UK would likely change mobile providers if a security breach occurred on their current network. Aside from technology drivers, the public concern over personal privacy and governmental preoccupation with national security are both mandating Mobile Network Operators (MNOs) to protect information confidentiality, integrity, and availability. In addition to subscriber churn, MNOs can face litigation and legal problems, especially when a security breach affects enterprise service. The economic impact can be several hundred of thousands or even millions of dollars. In a report presented by McAfee at the World Economic Forum, it was found that over half of 600 IT executives surveyed have suffered large-scale incidents that have associated downtime costs of over $6.5 Million per day. The type of data-at-risk includes commercial information, such as patents, software code, and designs, as well as employee records. In such cases, MNOs must defend against both the enterprise and individuals who have been victimized. A heist of Intellectual Property (IP) could have a costly effect on a corporation, especially if the subject matter is innovative but easily replicated in the marketplace. Governments are getting involved, mandating that carriers abide by security legislation specially intended for telecommunication service providers. In the European Union, EU directive 2009/140/EC, article 13a, requires operators to take steps to provide uninterrupted and secure transmission of voice and data over EU telecommunications infrastructure. Operators are also required to report security incidents so the effectiveness of their controls can be measured. At the national level, security over mobile networks or, in fact, any Internet access can have massive impacts on international relations. One example was the 2009 attack on Silicon Valley companies. In an article on csoononline.com, the alleged perpetrators of the breach were described as Chinese hackers, who exploited a weakness to gain access to Google's internal network, while Google admitted that some of its intellectual property had been stolen and that it would soon cease operations in China. Page 3

4 The impact of that event has had far-reaching consequences in the technology industry and political relations between the United States and China. Dating back to March 2005 is arguably the most infamous and criminal mobile network breach of all time, the scandal dubbed The Athens Affair by writers Vassilis Prevelakis and Diomidis Spinellis. In that security breach on the Vodafone Greece mobile network, equipment was illegally accessed and software was implanted in switching centers and later downloaded directly to cellphones, allowing for unlawful tapping of potentially incriminating phone conversations among targeted Vodafone subscribers, including sitting ministers of the government. It was a highly sophisticated hacking of the network that most carriers could not prevent; however one reason Vodafone received scathing publicity was because it purportedly mishandled informative system log files a function that could have been prevented by more robust security mechanism. Two years after the incident, Vodafone was fined $76 million. BENEFITS OF SECURE MOBILE NETWORKS The old adage that prevention is the best medicine certainly applies to security. The rewards certainly outweigh the risks. Every year MNOs are judged by companies such as J.D. Power and Consumer Reports on the level of satisfaction by their customers. Consistently high rankings help MNOs establish a trusted brand for their service offering. Strength in branding is one element of customer retention and lower overall subscriber churn. Strong brand value supports higher Average Revenue Per User (ARPU). It is one thing for a customer to shrug off an unusually high wait time for a technical support call; it is another for a customer to feel violated that his voice and data transactions on the network were compromised because the operator failed to take preventative measures. Security breaches lead to negative PR, which leads to degradation of customer trust, which ultimately leads to a tainted brand, higher churn and lower profits. All the effort a corporation endures to build strong brand value can easily be offset by just one security breach IMPORTANCE OF SECURING THE MICROWAVE NETWORK The use of microwave for mobile backhaul has long been the technology of choice around the world due to its low overall Total Cost of Ownership (TCO), flexibility and high reliability. Microwave backhaul for macro cell sites has accounted for over half of all backhaul technologies combined, including fiber and copper-based solutions. The abundant presence of microwave puts security concerns in the forefront for those who manage the network and customers on it. In 2013, Infonetics Research published the results of a Global Survey on Microwave Strategies and Vendor Leadership. In it, operators were asked to rank the importance of different microwave product features in terms of influence on purchasing decisions. Like the prior year, Management Interface Security ranked very high No. 4 overall, ahead of popular items like 1024 QAM, QoS, and MIMO. This priority is suggesting an awareness of security issues in microwave connections, according to the report s findings. Page 4

5 Microwave is usually part of a larger network of connected elements in a backhaul design. As such, it is important that security concerns do not make it a weak link in the chain. Specific security threats to microwave equipment can include misconfiguration and/or tampering of provisioning information, whether by malicious intruders or disgruntled employees. In fact, studies have shown that percent of all hacking activities are perpetrated by "insiders" or people with physical access to the equipment. Additionally, operators may carry critical traffic for government and financial institutions and other critical traffic across their microwave equipment. Such traffic has strict security requirements traversing all points in the network. Lastly, the migration from TDM to IP as part of the evolution from 2G to 3G and 4G has opened the microwave segment of the backhaul to security concerns stemming from the distributed nature of IP networks. DEFINITION OF SECURITY ENFORCEMENT The Next Generation Mobile Network (NGMN) organization has defined five classes of threats for the mobile network, as depicted in the illustration below. The threats include Destruction, Corruption, Removal, Disclosure and Interruption of information. Critical management and data traffic over unsecured networks means some form of encryption may be needed, beyond just physical equipment and site security. This applies to both microwave and fiber networks. ITU-T X.800 THREATS MODEL Page 5

6 MNOs can fend off these threats by implementing different types of security mechanisms. These mechanisms include: PHYSICAL SITE AND EQUIPMENT SECURITY Whether it is a macro base station tower or an emerging small cell on a busy urban street lamp, devices such as radios, switches and routers can be tampered with if some level of equipment protection is not provided. Many devices include telemetry features that will alert or alarm the network operator if a port card, control unit, backup battery or fan is removed, and typically specialized card pullers and screws are used to keep the network element protected. Additionally, tamper-evident labels can be used to detect intrusions. SECURE MANAGEMENT Secure Management is about securing access and control of the microwave radio. Messages sent from the Network Operations Center (NOC) to the radio are protected and not subject to compromise or malicious spoofing by unauthorized users. Secure Management also protects against accidental or unintentional misconfiguration of the network. Secure Management adds several layers of security and should be implemented in a manner that is FIPS Level 2 compliant. FIPS validation is required whenever encryption is specified in any US Federal procurement RFP. CENTRALIZED USER MANAGEMENT Radius is one mechanism that can be used to create centralized user management of a network. Radius includes Authentication, Authorization and Accounting of remote user accounts. It greatly simplifies and expedites changes to user account characteristics. Radius also allows for password enforcement and complexity rules to be tailored to individual organizations according to company policy. PAYLOAD ENCRYPTION There are various forms of payload encryption, one being IPSec (Internet Protocol Security). IPSec requires agent authentication and the sharing of cryptography keys for each packet exchanged during a security session. IPSec has its challenges in mobile networks, namely cost and complexity of implementation and a tight coupling with IPV6. In the microwave radio domain, payload encryption can be achieved using AES encryption on both management and data traffic. This prevents eavesdropping on wireless communications, as any snooping along the transmission path between links or in the transmitter s vicinity will only receive a garbled transmission. At a minimum, radios should support AES encryption and 128- or 256-bit symmetric keys, via a randomly generated encryption combination. These combinations are created and negotiated between links using industrystandard key agreement methods, which supports modulo of at least 2048 bits. Payload Encryption should be implemented in compliance with FIPS- 197, which provides the definition for AES encryption. AES is commonly regarded as one of the leading worldwide encryption schemes accepted by the most demanding entities such as US Government and US Military. Page 6

7 2G AND 3G NETWORK SECURITY GSM networks provided a step-functional increase in security capabilities versus early AMPS and TACS analog cellular technology. Because GSM is a digital technology, it is able to use a speech-coding algorithm as well as authentication and encryption mechanisms. David Margrave, in his paper GSM Security and Encryption explains that included in the design of the GSM authentication and encryption schemes is that sensitive information is never transmitted over the radio channel. This is because a challengeresponse technique is built into the GSM authentication function. Conversations are encrypted with a temporary, randomly generated ciphering key which is issued by the network and may be changed periodically (i.e. during hand-offs) for additional security. A5/1 is the name of the stream cipher that was used to provide early GSM communication privacy, but it ultimately proved to be vulnerable over time and had several documented attacks on a global scale. A5/3, or KASUMI, was used in 3G systems, designed specifically for 3GPP for the UMTS standard, but it also was broken by cipher attacks over the last decade. Nevertheless, the native encryption in 3G networks helped the security cause in the path starting from the handset to the base station to the Radio Network Controller (RNC). The flatter network architecture of 4G, in a sense, is a step backwards in security. 4G MOBILE NETWORK SECURITY In LTE, RNC functionality is in the enodeb, meaning that native encryption terminates at the base station (see LTE reference diagram below). As a result, and according to NGMN, some functions previously in the controller (BSC and RNC respectively) move directly into the enodeb, exposing the service and the underlying packet backhaul network to potential security threats. The X2 interface has the potential to increase the propagation and scale of security attacks. Especially of concern is the use case of shared backhaul or converged network infrastructure, for example, as in a Fixed- Mobile Converged (FMC) network. The panacea from 3GPP for the security gap in LTE was intended to be IPsec. IPSec would require secure tunnels from the enodeb to the Evolved Packet Core, with termination of those tunnels in a Security Gateway (S- GW). However, operators globally have pause when it comes to rampant IPSec deployment. Patrick Donegan, Heavy Reading analyst, in a public report conducted on behalf of Radisys, agrees and explains that, many operators are initially limiting their IPsec deployment to specific cases, such as where backhaul is leased or in the case of physically vulnerable small cells. Also, Donegan points out that operators are still waiting for ecosystem vendors to widely support the IPv6 protocol, and MNOs would prefer to wait for IPv6 before spending time and money on IPSec, the implementation of which is intimately coupled with IPv4 and/or IPv6. A case can be made for implementing payload encryption on backhaul links, especially in microwave radio backhaul links that are in wide use around the world. Payload encryption could give operators a few years to work out the business case for IPSec, particularly if their microwave backhaul gear already has encryption capability built in and all is needed is a software license. Page 7

8 3G &LTE Network Architectures SOLUTIONS FOR LTE MICROWAVE BACKHAUL SEGMENTS Secure Management offers secure management access to Aviat Eclipse Packet Node radios over unsecured networks. Secure Management features dictate who can access the network, the privileges of those users, and visibility they are allowed, all while encrypting all traffic and offering layered protection against multiple types of attacks. In the case of a breach of any layer, Secure Management also provides rich forensic capabilities for post incident analysis. Additionally, the Security Event Logger feature records all management activity for increased accountability and improved troubleshooting and root cause analysis. Payload Encryption secures wireless data and in-band and out-of-band management traffic. With Secure Management and Payload encryption working together as a depth strategy, even data that might ride on overhead channels (e.g. site management devices) is secure. The Strong Security suite from Aviat Networks offers solutions for wireless communications protection with options for Secure Management, Payload Encryption and integrated RADIUS capability. Integrated RADIUS capability enables authentication, authorization and accounting of remote user accounts. Hacker-deterrent features include Mechanized Attack Prevention, password complexity and minimization and encrypting of information kept in the radio. Page 8

9 Access control protection helps ensure proper privileges for employees, especially new hires, contractors, and lower skilled employees. For Local Access this includes: Identity-based authentication Identity-based privileges Security warning banners Access control lists Automatic Session timeout Disabling unused ports and unsecured protocols and backdoors Encryption and caching of user accounts For Remote Access this includes: Secure tunneling (TLS) Disabling of unsecure protocols (e.g., Telnet) Secure software download (HTTPS) Closure of all engineering backdoors Finally, in the Network Operations Center (NOC), SNMPv3, NMS Access control lists, encrypted remote backup and secured system log are provided to better enforce security mechanisms from a centralized point of control. CUSTOMER USE CASE MTN Ghana is the largest mobile communications provider in Ghana. With a constant flow of new service subscribers, network security is vital. Long-time users of Aviat Networks radios, MTN Ghana has used Aviat Eclipse since 2007 for its network backbone and 3.5G access management, benefitting from reliability and easy migration from TDM to Ethernet. However, with growth comes occasional traffic and equipment disturbances in the network, and MTN Ghana looked to Aviat to make sure disturbances were not a result of security incidents. Traditionally, US federal government and military agencies and their contractors are the primary users of high-level security solutions. Their networks must be compliant per Federal Information Process Standards FIPS for management and FIPS-197 for data payload encryption. Because of the extensive validation and testing regimen that vendors must go through for their products, mobile and enterprise operators are embracing these standards. MTN GHANA USE OF RADIUS Eclipse radios use both AAA and RADIUS. MTN Ghana has several thousand microwave sites and has decided to prioritize deployment of AAA and RADIUS in key sites along the backbone. Secure Management using AAA/RADIUS with Element Management System ProVision has improved the availability and visibility of the wireless network. In particular, network visibility into Ghana s capital city, Accra, has increased tremendously, allowing a reduction in staff hours of workers who previously needed to visit remote sites in the field. Troubleshooting has become simple and fast, as the nodes are visible from one central location. MTN Ghana adds Aviat Networks implemented their Secure Management AAA system with RADIUS to control physical access to the equipment. Through RADIUS, rigorous Password Authentication is implemented to Page 9

10 mitigate unauthorized access to the equipment on site. This has assisted MTN Ghana to ensure those who access the equipment are both authorized to do so, and qualified to do the work permitted by the specific set of rights assigned to them within the Secure framework. Securing the Backbone in MTN Ghana: the backbone network of thousands of microwave radio links connects a nation. SUMMARY Security is a necessary function for both users and providers of mobile networks. Mobile network security involves several aspects, from physical site security to data encryption to secure management interfaces. The evolution of mobile networks to a flatter LTE architecture has uncovered some challenges in the security domain. Secure management is perhaps the most effective and simple method to employ, especially in microwave backhaul segments. Aviat Networks provides a full suite of security mechanisms for its microwave product portfolio a key enabler of reliable backhaul functionality around the world. Although many mobile operators may not appreciate the need for network security today, it will likely be required throughout all portions of the network over time, with microwave transport being a critical segment. Aviat Networks, Inc All Rights Reserved. Subject to change without notice. wp_securing_mobntwk_univ_17sep13 Page 10

WHITE PAPER CYBER SECURITY AND ELECTRIC UTILITY COMMUNICATIONS WHAT NERC/CIP MEANS FOR YOUR MICROWAVE

WHITE PAPER CYBER SECURITY AND ELECTRIC UTILITY COMMUNICATIONS WHAT NERC/CIP MEANS FOR YOUR MICROWAVE CYBER SECURITY AND ELECTRIC UTILITY COMMUNICATIONS WHAT NERC/CIP MEANS FOR YOUR MICROWAVE MAY 2011 TABLE OF CONTENTS 1.0 INTRODUCTION... 3 2.0 MODERN ELECTRIC UTILITY COMMUNICATIONS... 4 2.1 DOMAINS AND

More information

Security Executive Summary. Securing LTE Radio Access Networks Effectively

Security Executive Summary. Securing LTE Radio Access Networks Effectively Security Executive Summary Securing LTE Radio Access Networks Effectively LTE networks require a dedicated security solution As an all-ip technology, LTE brings new capabilities to improve the customer

More information

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that

More information

Securing Next Generation Mobile Networks

Securing Next Generation Mobile Networks White Paper October 2010 Securing Next Generation Mobile Networks Overview As IP based telecom networks are deployed, new security threats facing operators are inevitable. This paper reviews the new mobile

More information

HIPAA Privacy & Security White Paper

HIPAA Privacy & Security White Paper HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements

More information

Securing an IP SAN. Application Brief

Securing an IP SAN. Application Brief Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks 1 Nokia Siemens Networks New evolved Networks - new security needs Walled Garden Transport & Protocols

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

Use of MPLS in Mobile Backhaul Networks

Use of MPLS in Mobile Backhaul Networks Use of MPLS in Mobile Backhaul Networks Introduction Backhaul plays a vital role in mobile networks by acting as the link between Radio Access Network (RAN) equipment (Eg: radio basestation) and the mobile

More information

Mobile Wireless Overview

Mobile Wireless Overview Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

WHITEPAPER. Smart Grid Security Myths vs. Reality

WHITEPAPER. Smart Grid Security Myths vs. Reality Smart Grid Security Myths vs. Reality WHITEPAPER Understanding Threats and How to Combat Them Building the smart grid requires a unified network platform to interconnect all the devices within the electric

More information

UMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003

UMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols k-p.perttula@hut.fi 15.4.2003 UMTS security Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003 Contents UMTS Security objectives Problems with GSM security UMTS security mechanisms

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With

More information

LTE BACKHAUL REQUIREMENTS: A REALITY CHECK

LTE BACKHAUL REQUIREMENTS: A REALITY CHECK By: Peter Croy, Sr. Network Architect, Aviat Networks INTRODUCTION LTE mobile broadband technology is now being launched across the world with more than 140 service providers committed to implement it

More information

Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications

Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications Applicable Products: EX-5r GigE, EX-5r-c GigE Introduction The accelerated growth of fixed and mobile wireless broadband services

More information

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order

More information

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue. Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

Applications that Benefit from IPv6

Applications that Benefit from IPv6 Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Mobile network evolution A tutorial presentation

Mobile network evolution A tutorial presentation Mobile network evolution A tutorial presentation Andy Sutton Principal Design Consultant - Transport Networks Avren Events, Time and Sync in Telecoms, Dublin, Ireland Tuesday 2 nd November 2010 hello About

More information

IT Security Standard: Network Device Configuration and Management

IT Security Standard: Network Device Configuration and Management IT Security Standard: Network Device Configuration and Management Introduction This standard defines the steps needed to implement Bellevue College policy # 5250: Information Technology (IT) Security regarding

More information

ITL BULLETIN FOR JANUARY 2011

ITL BULLETIN FOR JANUARY 2011 ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number

More information

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks Beating Cyber Threats that Target Mesh Networks Trent Nelson, Cyber Security Assessment Lead, Idaho National Laboratory Jeff Becker, Global Wireless Business Director, Honeywell Process Solutions Table

More information

Security MWC 2014. 2013 Nokia Solutions and Networks. All rights reserved.

Security MWC 2014. 2013 Nokia Solutions and Networks. All rights reserved. Security MWC 2014 2013 Nokia Solutions and Networks. All rights reserved. Security Ecosystem overview Partners Network security demo + End-user security demo + + + + NSN end-to-end security solutions for

More information

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack DHS 4300A Sensitive Systems Handbook Attachment Q5 To Handbook v. 11.0 Voice over Internet Protocol (VoIP) Version 11.0 December 22, 2014 Protecting the Information that Secures the Homeland This page

More information

ALTERNATIVE BACKHAUL AND DATA OFFLOAD SOLUTIONS FOR GSM AND UMTS OPERATORS

ALTERNATIVE BACKHAUL AND DATA OFFLOAD SOLUTIONS FOR GSM AND UMTS OPERATORS QUICK LOOK ALTERNATIVE BACKHAUL AND DATA OFFLOAD SOLUTIONS FOR GSM AND UMTS OPERATORS The Cisco RAN Optimization solution offers alternative radio access network (RAN) backhaul transport and data offload

More information

T.38 fax transmission over Internet Security FAQ

T.38 fax transmission over Internet Security FAQ August 17, 2011 T.38 fax transmission over Internet Security FAQ Give me a rundown on the basics of T.38 Fax over IP security. Real time faxing using T.38 SIP trunks is just as secure as sending faxes

More information

ICANWK406A Install, configure and test network security

ICANWK406A Install, configure and test network security ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with

More information

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks 4 Best Practices for Building PCI DSS Compliant Networks Cardholder data is a lucrative and tempting target for cyber criminals. Recent highly publicized accounts of hackers breaching trusted retailers

More information

GSM Risks and Countermeasures

GSM Risks and Countermeasures GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked

More information

MIGRATING PUBLIC SAFETY NETWORKS TO IP/MPLS

MIGRATING PUBLIC SAFETY NETWORKS TO IP/MPLS AVIAT NETWORKS MIGRATING PUBLIC SAFETY NETWORKS TO IP/MPLS CHOOSING THE RIGHT MICROWAVE PLATFORM converging w i r e l e s s networks This paper explores the migration strategy for Public Safety (PS) networks

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper How Proactive Business Continuity Can Protect and Grow Your Business For most companies, business continuity planning is instantly equated with disaster recovery the reactive ability of a business to continue

More information

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

What IT Auditors Need to Know About Secure Shell. SSH Communications Security What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic

More information

Mobile Backhaul The Next Telecoms Revolution

Mobile Backhaul The Next Telecoms Revolution Mobile Backhaul The Next Telecoms Revolution Foreword Every once in a while the telecommunications industry experiences a technological and commercial revolution. One such revolution took place in the

More information

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc. Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

How to secure an LTE-network: Just applying the 3GPP security standards and that's it? How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

Mobility and cellular networks

Mobility and cellular networks Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission

More information

Packet Synchronization in Cellular Backhaul Networks By Patrick Diamond, PhD, Semtech Corporation

Packet Synchronization in Cellular Backhaul Networks By Patrick Diamond, PhD, Semtech Corporation Packet Synchronization in Cellular Backhaul Networks By Patrick Diamond, PhD, Semtech Corporation (Semtech White Paper October 2008) INTRODUCTION For carriers to leverage cost-effective IP networks to

More information

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate

More information

SpiderCloud E-RAN Security Overview

SpiderCloud E-RAN Security Overview SpiderCloud E-RAN Security Overview Excerpt for SpiderCloud Wireless, Inc. 408 East Plumeria Drive San Jose, CA 95134 USA -hereafter called SpiderCloud- Page 1 of 7 Table of Contents 1 Executive Summary...5

More information

HSPA, LTE and beyond. HSPA going strong. PRESS INFORMATION February 11, 2011

HSPA, LTE and beyond. HSPA going strong. PRESS INFORMATION February 11, 2011 HSPA, LTE and beyond The online multimedia world made possible by mobile broadband has changed people s perceptions of data speeds and network service quality. Regardless of where they are, consumers no

More information

Executive Summary and Purpose

Executive Summary and Purpose ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on

More information

Securing VoIP Networks using graded Protection Levels

Securing VoIP Networks using graded Protection Levels Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract

More information

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005 SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and Management SafeNet Network Encryption and Isolation Solution

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

TDM services over IP networks

TDM services over IP networks Keyur Parikh Junius Kim TDM services over IP networks 1. ABSTRACT Time Division Multiplexing (TDM) circuits have been the backbone of communications over the past several decades. These circuits which

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

The LTE Challenge. for the Small-to- Midsize Mobile Network Operator

The LTE Challenge. for the Small-to- Midsize Mobile Network Operator The LTE Challenge for the Small-to- Midsize Mobile Network Operator The next mobile generation is not just for Tier 1 carriers. How to tap into the business opportunities of LTE in Tier 2 and Tier 3 markets

More information

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009 S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need

More information

Network Security Policy

Network Security Policy Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings

More information

Deploying a Secure Wireless VoIP Solution in Healthcare

Deploying a Secure Wireless VoIP Solution in Healthcare Deploying a Secure Wireless VoIP Solution in Healthcare Situation Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants

More information

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2 Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls

More information

Security Requirements for Wireless Networking

Security Requirements for Wireless Networking Security Requirements for Wireless Networking Developed by Copyright 2007 Rysavy Research TABLE OF CONTENTS INTRODUCTION... 2 SECURITY REQUIREMENTS... 2 WIRELESS OPERATOR SECURITY LIMITATIONS... 3 END

More information

Information Security: A Perspective for Higher Education

Information Security: A Perspective for Higher Education Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

Gold Lock Desktop White Paper

Gold Lock Desktop White Paper Gold Lock Desktop White Paper TM EMAIL AND FILE ENCRYPTION SOFTWARE Effective Data Security in the 21st Century Evaluating the needs of appropriate data security and identifying the risks in the modern

More information

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com [email protected]

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com 10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the

More information

A NIMS Smart Practice

A NIMS Smart Practice NIMS Smart Practice: 02-06 NIMS Integration Center, May 2006 www.fema.gov/emergency/nims 202-646-3850 A NIMS Smart Practice IN ALLEGANY COUNTY, MARYLAND: A MUNICIPAL WIRELESS NETWORK PROVIDING ENHANCED

More information

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract

More information

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer: DSL Access Guide DSL Access Routers ZyXEL is a leading manufacturer and supplier of DSL and Voice over IP routers. ZyXEL offer a complete portfolio of routers suited for Telecoms providers, Internet Service

More information

MERA s competence in security design includes but is not limited to the following areas: Engineering and assessments for security solutions (e.g.

MERA s competence in security design includes but is not limited to the following areas: Engineering and assessments for security solutions (e.g. MERA s competence in security design includes but is not limited to the following areas: Engineering and assessments for security solutions (e.g. how migrating to secured protocols will affect/change capacity,

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

Wireless Network Standard and Guidelines

Wireless Network Standard and Guidelines Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining

More information

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards

More information

A HELPING HAND TO PROTECT YOUR REPUTATION

A HELPING HAND TO PROTECT YOUR REPUTATION OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering Network Security by David G. Messerschmitt Supplementary section for Understanding Networked Applications: A First Course, Morgan Kaufmann, 1999. Copyright notice: Permission is granted to copy and distribute

More information

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service

Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service Solution Overview Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service What You Will Learn With the arrival of the fourth-generation (4G) or Long Term Evolution (LTE) cellular wireless

More information

HIPAA Compliance and Wireless Networks. 2005 Cranite Systems, Inc. All Rights Reserved.

HIPAA Compliance and Wireless Networks. 2005 Cranite Systems, Inc. All Rights Reserved. HIPAA Compliance and Wireless Networks White Paper HIPAA Compliance and Wireless Networks 2005 Cranite Systems, Inc. All Rights Reserved. All materials contained in this document are the copyrighted property

More information

SS7 & LTE Stack Attack

SS7 & LTE Stack Attack SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network

More information

Remote Access Security

Remote Access Security Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to

More information

Network Security: Introduction

Network Security: Introduction Network Security: Introduction 1. Network security models 2. Vulnerabilities, threats and attacks 3. Basic types of attacks 4. Managing network security 1. Network security models Security Security has

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

SSL VPN Technical Primer

SSL VPN Technical Primer 4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: [email protected] www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses

More information