Promoting Network Security (A Service Provider Perspective)



Similar documents
Enterprise K12 Network Security Policy

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Detailed Description about course module wise:

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Network Security and the Small Business

Countermeasures against Bots

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Cyber Security: Beginners Guide to Firewalls

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Cyber Security and Critical Information Infrastructure

Firewall and UTM Solutions Guide

Defending Against Data Beaches: Internal Controls for Cybersecurity

Top tips for improved network security

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Current Threat Scenario and Recent Attack Trends

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Emerging Security Technological Threats

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Malware & Botnets. Botnets

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

High Speed Internet - User Guide. Welcome to. your world.

Interactive welcome kit Charter-Business.com CB.016.fibCD.0210

Internet tools and techniques at this level will be defined as advanced because:

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Preparing Your Personal Computer to Connect to the VPN

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

Acceptable Usage Policy

Integra Telecom 4690 Colorado St. SE Prior Lake, Mn DSL INSTALLATION GUIDE

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

The Information Security Problem

Innovative Defense Strategies for Securing SCADA & Control Systems

Cablelynx Acceptable Use Policy

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

10 Smart Ideas for. Keeping Data Safe. From Hackers

CUTTING THROUGH THE HYPE: WHAT IS TRUE NEXT GENERATION SECURITY?

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Network Incident Report

Saheel KHOYRATTY. Partner Technology Advisor

FORBIDDEN - Ethical Hacking Workshop Duration

Certified Secure Computer User

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out!

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

National Cyber Security Month 2015: Daily Security Awareness Tips

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN , Volume-III, Issue-IV, July-Aug 2013

Content Teaching Academy at James Madison University

An Introduction on How to Better Protect Your Computer and Sensitive Data

6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?

Mobile Device Management

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

PEER-TO-PEER NETWORK

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

COB 302 Management Information System (Lesson 8)

Cyber Essentials Scheme

Small Business Network Security 101

STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES


FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

Stopping zombies, botnets and other - and web-borne threats

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Computer Security Maintenance Information and Self-Check Activities

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

SPEAR PHISHING UNDERSTANDING THE THREAT

How to stay safe online

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Vulnerability Assessment & Compliance

Transcription:

Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL hsgupta@bsnl.co.in DNW, BSNL 1

Agenda Importance of Network Security for a Service Provider Challenges in enhancing security in Service Provider environment Various security threats Role of Service Provider in enhancing security Role of customer in enhancing security Ways to minimize Security Threats Conclusions DNW, BSNL 2

Importance of Network Security for a Service Provider Service availability is maintained SLAs are maintained and Service degradations are avoided Reduction in manpower and other support costs Customer satisfaction and confidence is increased Public image is maintained Revenues are maintained Possibilities of getting involved in litigation are reduced DNW, BSNL 3

Challenges in Enhancing Security in Service Provider Environment Multiple Services Internet [Narrowband, Broadband (DSL, Broadband Loop Carrier), Wireless (Wi-Fi), Leased] PSTN Mobile VPN, Dial VPN Hosting and Colocation & others Vast Coverage in terms of Network Elements Increase in use of IT for OSS & BSS (Need to maintain Main and DR sites) A number of systems from different vendors need to get integrated (Best of breed scenario) DNW, BSNL 4

Challenges in Enhancing Security in Service Provider Environment Managing multiple vendors (More so in PSU scenario) A number of maintenance contracts with different vendors for maintenance of hardware and software Systems and Processes need to keep pace with technology Rapid Technological Evolution DNW, BSNL 5

Challenges in Enhancing Security in Service Provider Environment Number of attacks and vulnerabilities continue to grow Applications and products continue to be shipped with insecure defaults Striking a right balance between Over Protected to Under Protected New services and applications are adding to the complexity DNW, BSNL 6

Various Security Threats Any use of the Internet, be it via broadband or dial-up technology, poses certain security and privacy risks. Broadband poses a higher risk than dialup technology because of Always On nature and high bandwidth. DNW, BSNL 7

Various Security Threats Email Open Proxies Viruses, worms & Trojans Open Mail Relay Distributed Denial of Service Attacks (Weapons of Mass Disruption) Botnets Intrusion Malicious traffic Malicious Code Managing Multi Vendor scenario Managing multiple hardware & software DNW, BSNL 8

Various Security Threats Managing multiple services Spyware Identity Theft and Phishing Increase in the use of Internet for criminal & terrorist activities Application and OS Vulnerabilities Former employees Insider threats (current employees, vendors) Hackers Employee Error Social Engineering, Spoofing, Appl embedded attacks, blended attacks DNW, BSNL 9

Threats Due to E-mailE Spam Phishing Cyber Crime cases (including abusive attacks) Forged E-mails DNW, BSNL 10

Impact of Spam on Service Provider Increase in hardware sizing Increase in bandwidth requirement Customer quality of service gets impacted Cost at Customer side More data to download More time to download Loss of productivity Back DNW, BSNL 11

Consequences of Open Proxy Servers Open Proxies allow a third party to exploit the system to send unsolicited emails or carry out illegal activities that get traced to exploited system Malicious users cover their tracks by chaining through multiple proxies either manually or using products such as Proxy Chains The IP of the organization being blacklisted by various bodies The loss of image of the organization and legal ramifications, if misused for illegal activities Loss of bandwidth Back DNW, BSNL 12

Hacking of Websites Defacement Malicious content Stealing of information Hosting of Phishing Sites Customers even doesn t know that this has been hosted Comes to know when Service Provider tells them Incidents are increasing at an alarming rate Reduces confidence for Online Activities Back DNW, BSNL 13

Live Case Studies Phishing sites of a number of Banks List of Open Proxy Servers Nigerian 419 scam Lots of defacement of Websites Increase in network traffic due to worms like Blaster, Sobig, Nachi Increase in CPU utilization due to malicious traffic More outbound traffic than inbound Connecting insecure PC in the LAN DNW, BSNL 14

Different Security Tools Policies & Procedures Access Control Host Intrusion Detection System Network Intrusion Detection System Firewall Intrusion Prevention System Anti-Virus Anti Spam Vulnerability Assessment Public Key Infrastructure DNW, BSNL 15

Different Security Tools Network Baselining Out of band Management Time Synchronization (NTP) Access Control Lists Documentation Physical Security Bio Metric devices Water Leakage Detection Rodent Repellant System DNW, BSNL 16

Role of Service Provider in Enhancing Security Protect own infrastructure from customers, employees and outside world Help protect other peers Make the Customers aware about Internet Security as attacks targeted to a particular customer CAN and DO affect the Service provider infrastructure Protect customers from outside world as also from each other DNW, BSNL 17

Role of customer in Enhancing Security Awareness about Internet Security, viruses, Fraud developments etc. Use of Virus Protection software Use of Personal Firewall Filter E-mail for Spam Most Spam mails contain scam of some sort Delete spam mails from webmail Not responding to phishing Emails Not sharing the Internet account with anyone. DNW, BSNL 18

Role of customer in Enhancing Security Restricting access to the Internet leased line or Broadband connection. Visiting trusted websites Turning off computer when not in use Disable non-essential services such as file and printer sharing Download and install the patches as needed DNW, BSNL 19

Ways to Minimize Security Threats Deployment of proper technology Increasing customer awareness Increasing employee awareness Updated Systems & Procedures Keeping updated about latest trends in Security DNW, BSNL 20

Security Not just a Technology Problem 80% of the security risks can be avoided by taking basic precautions DNW, BSNL 21

Security Dilemma Moore s law in reverse direction- networks are becoming less secure while the cost to defend them is increasing. PREVENTION IS THE FOUNDATION DNW, BSNL 22

Conclusions Security is not to be treated as a mere hardware and software issue Static and Passive approach to security is inadequate Customer & employee awareness is important Point solutions are no good. Holistic approach needs to be taken DNW, BSNL 23

Conclusions Security needs to kept in mind while designing the network Systems and Procedures must be in place to deal with multi-service, multi-vendor, multi-hardware & software network Concentrating on Preventive aspects will be cheaper and effective DNW, BSNL 24

Thank You DNW, BSNL 25