Dr. Emmanuel Hooper, PhD, PhD, PhD Presentation title SUB TITLE HERE National Broadband Plan Public Safety and Homeland Security Workshop



Similar documents
A Model-based Methodology for Developing Secure VoIP Systems

Security Issues with Integrated Smart Buildings

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response

Security in Wireless Local Area Network

THREATS AND VULNERABILITIES FOR C 4 I IN COMMERCIAL TELECOMMUNICATIONS: A PARADIGM FOR MITIGATION

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Section 2: Overview of Wireless Broadband Networks

NIST Cyber Security Activities

COMMUNITY COMMUNICATIONS COMPANY (CCC CABLE) BROADBAND INTERNET SERVICE DISCLOSURES

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Security Advisory. Some IPS systems can be easily fingerprinted using simple techniques.

GAO INFORMATION SECURITY. Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk

The Protection Mission a constant endeavor

FRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES

SHIDLER TELEPHONE INTERNET BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 20, 2011

On-Premises DDoS Mitigation for the Enterprise

Fail-Safe IPS Integration with Bypass Technology

NETWORK SECURITY (W/LAB) Course Syllabus

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

The Hidden Dangers of Public WiFi

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Voice over Internet Protocol. Kristie Prinz. The Prinz Law Office

First Line of Defense to Protect Critical Infrastructure

Designing, Securing and Monitoring a/b/g/n Wireless Networks

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

Deploying Probes and Analyzers in an Enterprise Environment

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Enterprise Computing Solutions

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Conquering PCI DSS Compliance

ORDER National Policy. Effective Date 09/21/09. Voice Over Internet Protocol (VoIP) Security Policy SUBJ:

POTTAWATOMIE TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 19, 2011

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

Considerations for Hybrid Communications Network Technology for Pipeline Monitoring

Enterprise A Closer Look at Wireless Intrusion Detection:

Cyber Security and Privacy - Program 183

TIME TO RETHINK NETWORK SECURITY

SCADA/Business Network Separation: Securing an Integrated SCADA System

Radware s Behavioral Server Cracking Protection

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Wireless Networks. Welcome to Wireless

Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions

FCC HOMELAND SECURITY LIAISON ACTIVITIES

Security and Risk Analysis of VoIP Networks

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Understanding SCADA System Security Vulnerabilities

Motorola Wireless Broadband. Video Surveillance Solutions

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Datawire Secure Transport Value Proposition

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

Taxonomy of Intrusion Detection System

NEW HOPE TELEPHONE COOPERATIVE

Introduction to Computer Networking: Trends and Issues

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Network Security - ISA 656 Review

chap18.wireless Network Security

Wireless Security and Healthcare Going Beyond IEEE i to Truly Ensure HIPAA Compliance

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

Problems of Security in Ad Hoc Sensor Network

Industrial Communication. Securing Industrial Wireless

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

HANDBOOK 8 NETWORK SECURITY Version 1.0

BlackRidge Technology Transport Access Control: Overview

High End Information Security Services

Best Practices in Deploying a Secure Wireless Network

Wireless Security Strategies for ac and the Internet of Things

Intelligent Routing Platform White Paper

How To Write A Book On Risk Management

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

Human Factors in Information Security

Cybersecurity for the C-Level

Transcription:

Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Harvard University, Leadership for Networked World Global Information Intelligence: http://globalinfointel.com SUB TITLE ehooper@fas.harvard.edu HERE or ehooper@aya.yale.edu Presentation title PANEL 2 National Broadband Plan Public Safety and Homeland Security Workshop August 25, 2009 FCC, Washington, DC

Intelligent 21st Century Broadband and Cyber Security Strategies for FCC broadband plans Intelligent 21st Century Broadband and Cyber Security Strategies for FCC broadband plans Major considerations specific to planning for broadband to address large scale emergency preparedness and response The Challenges Facing Broadband and Cyber Networks Acceleration of high speed broadband networks via wireless, Wi-Fi, and emerging WiMAX to cyber infrastructures Challenges of high speed data transmission at high frequencies and speeds in the Gigabits range that transfer eventually terabytes of data across multiple interfaces to wireless and fiber networks that interconnect to the global Internet. Broadband distribution, access controls, security, monitoring, intrusion detection and prevention, response and forensic evidence for traceability, sustainability of effective use and management.

Intelligent 21st Century Broadband and Cyber Security Strategies for FCC broadband plans NBP addressing means to protect and advance cyber security Proposed Broadband plan for Congress should include Strategic on-going research on the wider impact of broadband distribution and cyber security as follows: Ensure responsible broadband use, distribution and management is monitoring astute interceptions of high-speed traffic at various segments of the broadband infrastructures that interface with US cyber and global networks that transmit high-speed data in real time. Identify legitimate traffic, understand the levels of appropriate thresholds for traffic on broadband networks, and ensuring effective cryptographic key management, ciphers and algorithms are adaptable to handle astute interceptions, evasions and insertions.

Intelligent 21st Century Broadband and Cyber Security Strategies for FCC Broadband plan Proposed Broadband plan for Congress should include Strategic on-going research on the wider impact of broadband distribution and cyber security as follows: FCC coordination with other federal agencies and state and local governments Coordinated research and intelligence on broadband and cyber security for the FCC, Cyber Coordination Executive, National Cyber Study Group (NCSG), Director of National Intelligence (DNI),FCC regulations, DHS, DNI, DOD,DARPA, IARPA, DHSARPA, etc. Interoperability between state and local public safety entities and federal government agencies involved in these large-scale event Development of Effective Management Standards Research, Development of Distributed Broadband Networks Strategic Intelligent Hybrid Data Mining for Broadband Network Security

Intelligent 21st Century Broadband and Cyber Security Strategies for FCC broadband plans Specific broadband technologies for pandemic or bioterrorism event should be integrated and deployed into the network for emergency response New 21st Century Approach for Broadband and Cyber Security Intelligent and strategically new approaches are required to meet the rapidly emerging challenges and threats for broadband technology, traffic, networks and cyber security in the 21st century Detect and Respond to "man-in-the-middle" interceptions at interfaces of broadband traffic across wireless, Wi-Fi, WiMAX, and autonomous backbones of cyber networks and critical infrastructures Real-time detection and response to astute attacks using effective of adaptable hybrid algorithms Secure management of multifunctional features in emerging software and hardware designed for broadband users, but used by astute hackers to spy, evade detection, engineer stealth attacks and even prevent traceability in real-time

Intelligent 21st Century Broadband and Cyber Security Strategies for FCC broadband plans Reliability and redundancy of broadband communications infrastructure to protect against large-scale events capable of causing extensive physical damage or destruction Intelligent Algorithms and Hybrid Data Mining Techniques Secure management of congested networks and packets in backbones of cyber networks due to the rapid increase in the number of users, types of services, multi-functional applications, and meta data aggregation servers in regional and global data centers Strategic detection and interception of parse, load and transform meta data on government, corporate, public and private broadband networks between laptops, PDUs and Data Centers, etc. Interception high packet rates that evade detection and appropriate response in real-time

Intelligent 21st Century Broadband and Cyber Security Strategies for FCC broadband plans Strategic Research and Policy Development Reliability and redundancy of broadband communications infrastructure to protect against large-scale events capable of causing extensive physical damage or destruction Hybrid Algorithms for effective and efficient broadband traffic management and security Security of Broadband software and hardware vulnerabilities due to the lack of strategic design for adaptable performance for threat mitigation and ineffective anti-hacking code security standards Security standards for multi-functional features in applications Intelligent data mining to detect and respond to astute hackers who operate in stealth mode using broadband networks to penetrate Virtual Private Networks (VPNs), dedicated global backbones and cyber infrastructures Meta or Master Data Management (MDM) at regional, national and global centers. Sensitive data transmitted at high speeds into centralized storage. Address problems posed by stealth attacks, since broadband traffic travels at high speeds, real-time the detection and response to attacks versus false positives, or normal traffic versus abnormal traffic can evade detection

Conclusion: Intelligent 21st Century Broadband and Cyber Security Strategies for FCC broadband plans Strategic Research and Policy Development Regulatory perspective the FCC/USG should Engage researchers on current data mining on broadband traffic management and security Provide regulations on broadband distribution and security Provide regulatory recommendations to congress based on broadband and security research Recommend cost-effective and adaptable security for broadband traffic management Sponsor research on Effective Hybrid adaptable algorithms for Efficient and effective broadband traffic management 21st century response to embedded stealth software and malware, and crafted by rogue interceptions of broadband signals crossing global backbones of cyber traffic evading broadband providers and ISPs

Intelligent 21st Century Security for Broadband and High Speed Cyber Infrastructures Research on Cyber Security and Broadband References: See Current Research Paper: Hooper, Emmanuel. Intelligent Strategies for 21st Century Broadband and Cyber Infrastructure Security and other IEEE Papers Harvard University Leadership for Networked World Senior Scholar and Researcher Cyber, Broadband and Intelligent and Strategic Security Founder, Global Information Intelligence Global Information Intelligence: http://globalinfointel.com Email: ehooper@fas.harvard.edu or ehooper@aya.yale.edu