SlideShare une entreprise Scribd logo
1  sur  52
Securing Hastily Formed Networks
              For Disaster Relief and Emergency
              Response
              BRKSEC-1000




BRKSEC-1000         © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   2
VIDEO
“We don’t just get involved in something and then
 leave…we get involved in ways nobody else
 does.”

 John Chambers
 President & CEO – Cisco Systems
Agenda
Securing Hastily Formed Networks

 A bit about Cisco Tactical Operations
 The intersection of human needs and
  networks
 Introducing the “Hastily Formed Network” (HFN)
 Security considerations of HFNs
 Q&A
 Wrap-up




BRKSEC-1000       © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   5
Cisco Tactical Operations
humanitarian networks
Cisco TacOps Provides Crisis Support

 Cisco Tactical Operations (TacOps) is a dedicated crisis response team
  that establishes emergency networks after a disaster.
 TacOps personnel skills include technical, operational, first responder,
  military and logistics
 Promotes innovative technology solutions for disaster response and other
  hardship situations.
 Emergency response funded
  by Cisco Corporate Philanthropy.




BRKSEC-1000       © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   7
Cisco Learned Lessons from Hurricane Katrina
 Initially: TacOps supported “extreme risk” incidents

 Expanded mission: To have a scalable, coordinated,
  response to disasters (2005) … because:

 Hurricane Katrina - what Cisco did:
     ‒ Cisco sent hundreds of volunteers and tons
       of equipment to Gulf region.
     ‒ We were successful, but…


 Hurricane Katrina - lessons learned:
     ‒ There were many willing engineers but few
       trained for the environment.
     ‒ Less effective due to the Cisco-wide uncoordinated
       response.
     ‒ No standardized Cisco mobile platform for disaster
       response.
BRKSEC-1000              © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   8
Today: All-hazards Response, Anywhere

 Famine, Horn of Africa                                  Plane Crash, Palo Alto CA
 Tornadoes, AL, NC, MO                                   Earthquake, Port-Au-Prince
 Earthquake/Tsunami, Japan                                Haiti
 Earthquakes, Christchurch                               Fiber-Optic Cut, SF Bay Area
  New Zealand                                              CA
 Flooding, Brazil                                        Flooding, Cedar Rapids IA
 Flooding, Queensland                                    Evans Road Fire, NC
  Australia                                               Harris Fire, San Diego CA
 Fourmile Canyon Fire, Boulder                           Hurricanes Katrina, Gustav,
  CO                                                       Ike
 Gas Pipeline Explosion, San
  Bruno CA




BRKSEC-1000         © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   9
US Relationships




                                             Office of Emergency Services




BRKSEC-1000   © 2012 Cisco and/or its affiliates. All rights reserved.      Cisco Public   10
International Relationships




BRKSEC-1000   © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   11
The Intersection of Human Needs and
Networks
All Crisis Responders Share the Same Problem

        NGOs/VOADs/
        International Orgs                                                                  Public Safety



              Transportation                    How to deliver the right                            National, State &
                                                                                                    Local Government
                                                information in the right
                                                format to the right person
                                                at the right time?
          Critical Infrastructure
                                                                                            Healthcare

                                                                 Defense                                      13




BRKSEC-1000               © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public                       13
The Need for Technology in Disaster is Increasing
                                                                                              Goal: Mission workflow
                                                                                              and productivity
                                                                                              benefits to save lives
   Radio, phone                           Radio + Integrated Data                            and speed recovery.
   Single device                          Any Device (BYOD)
   Voice only                             Voice, Video, Data
   Closed teams                           Open collaboration
   Command centric                        In the field, social media, everyone
   Fixed locations                        Deployable anywhere




          BRKSEC-1000   © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public                        14
Introducing Hastily Formed Networks
Typical ICT Challenges in Disaster
Information and Computing Technologies (ICT) are Needed but Overwhelmed

 Lack of power
 Degraded telephony infrastructure
 Degraded Push-to-Talk Radio,
  Lack of interoperability
 Oversubscribed services
 Limited Internet access
 Few IT resources
 Lack of trained staff




BRKSEC-1000        © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   16
Solution: Hastily Formed Networks (HFN)
Instant Emergency Networks

 HFNs are portable, IP-based networks
  that are deployed in emergencies
  when normal communications
  has been disabled or destroyed.


 Enable on-scene and remote responders
  to share situational awareness, coordinate
  operations, establish command and control.


 Communicate within the affected
  area as well as to the outside world.

BRKSEC-1000       © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   17
NPS/Cisco HFN Layered Model
                                              HUMAN / COGNITIVE
    Social/Cultural             Organizational                                             Political                           Economic


                           TEXT                          VOICE                                  VIDEO/IMAGERY               SPECIALIZED
                     - email                      - Push-to-talk                                - VTC                     - Collaboration
APPLICATION          - chat                       - Cellular                                    - GIS                     - Sit Awareness
                     - SMS                        - VoIP                                        - Layered Maps            - Cmd/Control
                                                  - Sat Phone/PSTN                                                        - Fusion
                          WIRED                         WIRELESS                                    WIRELESS                    SAT
                     - DSL                               LOCAL                                     LONG HAUL                BROADBAND
NETWORK              - Cable                         - WiFi                                      - WiMAX                   - VSAT
                     - Other ISP WAN                 - PAN                                       - Microwave               - BGAN
                                                     - MAN                                       - IP over HF
                         POWER                       HUMAN NEEDS                                    PHYSICAL             NET OP CENTER
                     - Fossil Fuel                   - Shelter                                      SECURITY             - Network Sec
PHYSICAL             - Renewable                     - Water                                    - Force Protection       -Cmd/Control
                                                     - Fuel                                     - Access                 - Leadership
                                                     - Food                                     Authorization


       BRKSEC-1000                   © 2012 Cisco and/or its affiliates. All rights reserved.                   Cisco Public                18
That Layer Model Assumes Something Important




 Security underlies every element of an HFN.




    BRKSEC-1000      © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   19
HFNs: What They Are

 Portable: mobile, rolling kit, easily moved
  with few personnel


 Rapidly deployable: pre-configured, set up
  with minimal training


 Interim: Once pre-event communications
  is restored typically decommissioned.


 Based on: WiFi/VSAT/WiMAX/etc.


BRKSEC-1000       © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   20
HFNs: What They Are Not

 A replacement for pre-emergency infrastructure.


 Designed for large numbers of users


 High bandwidth (if on VSAT). High latency, etc. needs to be considered.




              Typical NOC                                                    HFN NOC (Haiti)
BRKSEC-1000       © 2012 Cisco and/or its affiliates. All rights reserved.          Cisco Public   21
The First Deployed HFN: Hurricane Katrina




BRKSEC-1000   © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   22
The First Deployed HFN: Hurricane Katrina




BRKSEC-1000   © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   23
More Recently: 2010 Haiti Quake




                                                                                                              Airport
                     USNS COMFORT




NPS HFN TEAM HAITI NETWORK
VSAT/BGAN Satellite
WiMAX Point-to-Point
WiFi Mesh
WiFi Access Point
              BRKSEC-1000           © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public             24
Mobile and Kit HFN Solutions
Example Units for Our Security Discussions

 Network Emergency Response Vehicle
  (NERV)
     ‒ ISR G2 based platform/VSAT/Mesh
     ‒ Video surveillance, streaming, TelePresence
 Mobile Communicator Vehicle (MC2)
     ‒ ISR based platform. VSAT, Mesh
 Emergency Communications Kit (ECK)
     ‒ Rapidly deployable communications capability
     ‒ ISR 2811 / 3825 based




BRKSEC-1000             © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   25
Securing Hastily Formed Networks
Security: What are We Really Trying to Do?

 Keep bad things out.
 Protect the mission
 Keep critical services running
 Know what’s happening
  on the network and devices                                                  Inside              Outside

 Balance security and access



 Get it right every time.


BRKSEC-1000        © 2012 Cisco and/or its affiliates. All rights reserved.        Cisco Public             27
Myth Busting: Information Security in a
Disaster
 Assumption: “In a crisis network, I need to get deployed
  quickly. I don’t have time
  or the resources to secure
  the network!”


 Reality: All HFN networks
  should be pre-planned – plan
  and build your security into
  your infrastructure!




BRKSEC-1000       © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   28
HFN Security Starts With the Physical

 You’re going into a disaster zone!

 “Force Protection”

 Physical security of equipment

 Logistics

 Intelligence

 Health and Safety

BRKSEC-1000       © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   29
Basic Information Security Concepts via HFN

 Confidentiality: secure voice, video. Patient data. Security sensitive info.


 Integrity: command and control channels


 Availability: Denial of Service, appropriate use of the network, VSAT


 Authenticity: User/admin verification, trusted endpoints.




BRKSEC-1000        © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   30
IP Traffic Planes (a Reminder)

 Data plane traffic: end-station, user generated traffic.


 Control plane traffic: network device generated or received traffic used to
  operate create the network itself. (ARP, EIGRP, OSPF, etc.)


 Management plane traffic: traffic designed to manage the network or
  devices on the network. (SSH, FTP, SNMP, NTP, etc.)


 Addressing can help keep things organized: All kits/vehicles have
  /16, and each vlan is a /24 with a specified role. We can identify
  traffic flows easily.
BRKSEC-1000        © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   31
HFNs Use the Same Basic Infosec
Assumptions
 Least-privilege access: Users, devices, systems are given minimal
  access given the crisis environment (advanced AAA solutions, etc. may
  not be available!)
 Threats may come from anywhere in the network.
 Simplicity: Once initially configured, the security architecture should
  establish itself without requiring any additional work from personnel who
  already have too much to do.
 Defense-in-Depth: No single security feature or technology can mitigate
  the range of possible threats.




BRKSEC-1000       © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   32
Cisco NERV Architecture
Internet

                                                                                             VHF

                           VSAT                                                              UHF                                                  Wireless
                                   DMVPN/FW                           Core
                                                                                                                             IPICS                IP Phone
                                     Router                          Router
                                                                                              HF                                     Inside Wireless
                                      3925                            3945
                                                                                                                                     AP 1242
            Satellite
            Modem                                                                                    Access
                                                                                                     Switch


                                             Wireless
                                            Controller
           Cisco Systems
            San Jose, CA
                                          Wireless
            Raleigh, NC
                                          Mesh AP                                                                                                       Video
                                           1524-                                                                                                     Surveillance
                                          PS/1522
                                                                                              IP Phone           Video
                                                                                             7970/9971        Conferencing
                                                                                                                 (C40)
                                                                                                                                             Cameras




 BRKSEC-1000                      © 2012 Cisco and/or its affiliates. All rights reserved.                    Cisco Public                                          33
Use Strong Passwords, Restricted Privileges

 For system/network devices, strong passwords are enforced.
        - No dictionary words, mix of special chars, letters, numbers
        - Based on mnemonic/phrase that is easily remembered
          (no guesswork in a disaster)
        - No “cisco/cisco” or similar. Duh!


 Computers and other devices: “user” (non admin accounts), and
  administrative accounts. Use the least-access user needed for a task.




BRKSEC-1000       © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   34
DoS is the Primary Security Concern
with Satellite
 Satellite is often the only way to get
  broadband data in a disaster.
 The “thin sippy straw” – b/w from
  128kbps – 5mbps (typical Ku VSAT system)
 Protect your satellite bandwidth at all costs!
 Malicious traffic
     ‒ Zombie, flooding traffic.
 Inappropriate use …?
     ‒ YouTube
     ‒ BitTorrent
     ‒ FarmVille
BRKSEC-1000             © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   35
A Real World Security Incident…

 Once upon a time… the NERV had a
  flat, open network.


 Evans Road Fire in North Carolina.


 Firefighter’s laptop came onto
  the NERV pre-infected – DDoS
  zombie w/spoofed SRC IP.


 Created DoS condition on the satellite uplink.


BRKSEC-1000       © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   36
…Had Us Reevaluate Access.

 Designed for differentiated access in a
  easy-to-deploy fashion.


 “Untrusted” VLANs: open WiFi,
  certain networks such as those
  external to the NERV or kits                                                              Optical & Copper
  (patch panel) – access to the                                                             patch panel allow
                                                                                            only limited access
  Internet only.


 “Trusted” VLANs have open access to
  servers, vehicle-based resources, etc.
  Requires you to have physical access to vehicle/kit
BRKSEC-1000       © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public                         37
BRKSEC-1000   © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   38
Our HFN Firewall Strategy – One Policy,
Everywhere            Field Units


 Each “unit” is responsible                                                                           ASA Firewall

  for its own firewall
 Each policy is the same
                                                                                                                  San Jose, CA
 Inbound IOS firewall,
  BOGON filters
                                                                                            Internet
 Egress Internet-only from
  “untrusted” networks
 Egress “sanity checking”                                                                             ASA Firewall

  filters for spoofed outbound
  traffic
                                                                                                                  Raleigh, NC


BRKSEC-1000       © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public                                        39
Dynamic Multipoint VPN Increases Resiliency

 3DES / SHA1 IPSEC DMVPN                                                                                   ASA Firewall
  protects all management plane
  control plane VoIP, TelePresence                                          DMVPN Tunnel
   traffic.
                                                                                                                       San Jose, CA
 IPSEC tunnels link both
  backend hubs in San Jose                                                                       Internet             IPSEC
  and RTP
 Each remote unit comes
                                                                                                            ASA Firewall
  up and establishes two tunnels
                                                                             DMVPN Tunnel

 DMVPN is NAT friendly &                                                                                              Raleigh, NC
  increases resiliency.
BRKSEC-1000      © 2012 Cisco and/or its affiliates. All rights reserved.         Cisco Public                                        40
Remote Access VPN Brings in Remote Users
                                                                                 Remote user
                                                                                (Jabber Video)

 Cisco ASAs configured to support both                                                                ASA Firewall
  remote access IPSEC and AnyConnect
  SSL VPN                                                                     AnyConnect

 Remote users are typically                                                                                      San Jose, CA
  trying to join the TelePresence
  environment, or                                                                           Internet
                                                                  CTS C40
  administer the infrastructure.
  Low volume.
                                                                                                       ASA Firewall




                                                                                                                  Raleigh, NC


BRKSEC-1000       © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public                                        41
Intrusion Monitoring for Malicious Traffic

 Monitor network traffic using NM-IPS
 Monitor the VLAN between core router
  and gateway router (e.g. to/from
  Internet or VPN)
 Since our usage patterns change from
  deployment to deployment, we use
  them in IDS mode and rely upon
  on-scene engineers to investigate
  alarms.
 Consider which network segments
  you “care the most about”

BRKSEC-1000       © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   42
Security Features for 802.11 Mesh Networks

 Mesh networks support 802.11i – WPA2
 But do your clients? Old devices
  may not support it.
 Cisco LWAPP considered insecure –
  avoid it (it’s old anyway!)
 Since code 5.2 – CAPWAP [RFC 5415]
  interoperable … but don’t bet on it.
 Encryption + authentication required between AP and controller
  (which means you’ll have to do some pre-config, not plug and play)
 Segment traffic across multiple wireless VLANs


BRKSEC-1000       © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   43
802.16e WiMax Security – Proceed with Caution

 WiMax provides a wireless bridge
  technology (4G)
 Range: dozens of kilometers


 BUT …
 Security features variable
  from each vendor, no standardization
 Do your homework.
     ‒ Quality of security implementation is spotty.
     ‒ 3DES, AES 128, 192, 256 for encryption
     ‒ Don’t use MAC auth. Use vs X.509 EAP-TLS
BRKSEC-1000            © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   44
Host Security…When You Don’t Control
the Host!
 All TacOps server hosts are hardened. PCs have a/v, CSA, etc.


 But what about “untrusted” hosts on scene?


 American Red Cross
     ‒ maintains ghost master system images, keep them patched & up to date.
     ‒ When they’re deploying laptops, they will image the laptops immediately before
       shipping them out.




BRKSEC-1000           © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   45
Network Monitoring – Know Your Network
Health (Don’t Just Assume!)
 You need to know what’s going on
  before your users do.


 SNMP, Cisco NetFlow, ASDM
     ‒ Beware of “chatty” management
       plane protocols that might cause
       trouble over satellite.
     ‒ Consider what network elements
       really need to be monitored.




BRKSEC-1000           © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   46
Q&A
Wrapping it all up

 The need for technology in disasters is increasing.
 Hastily Formed Networks provide IP in austere environments
 SECURE Hastily Formed Networks can help save lives and speed
  recovery to affected communities.


 You can have ease of deployment and security – it takes an
  architectural approach.




BRKSEC-1000       © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   48
Connect with us Online
Web. Email. Social Media.


    On Cisco.com: http://www.cisco.com/go/tacops/

    Email: tacops-info@cisco.com

    Facebook:
     http://www.facebook.com/cisco.tacops

    Twitter:
   @SJ_NERV
   @RTP_NERV


BRKSEC-1000        © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   49
Complete Your Online
Session Evaluation
 Give us your feedback and you
  could win fabulous prizes.
  Winners announced daily.
 Receive 20 Passport points for each
  session evaluation you complete.
 Complete your session evaluation
  online now (open a browser through
  our wireless network to access our                                    Don’t forget to activate your
  portal) or visit one of the Internet                                  Cisco Live Virtual account for access to
  stations throughout the Convention                                    all session material, communities, and
                                                                        on-demand and live activities throughout
  Center.                                                               the year. Activate your account at the
                                                                        Cisco booth in the World of Solutions or visit
                                                                        www.ciscolive.com.

BRKSEC-1000        © 2012 Cisco and/or its affiliates. All rights reserved.               Cisco Public                   50
Final Thoughts

 Get hands-on experience with the Walk-in Labs located in World of
  Solutions, booth 1042
 Come see demos of many key solutions and products in the main Cisco
  booth 2924
 Visit www.ciscoLive365.com after the event for updated PDFs, on-
  demand session videos, networking, and more!
 Follow Cisco Live! using social media:
     ‒ Facebook: https://www.facebook.com/ciscoliveus
     ‒ Twitter: https://twitter.com/#!/CiscoLive
     ‒ LinkedIn Group: http://linkd.in/CiscoLI


BRKSEC-1000             © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   51
BRKSEC-1000   © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public

Contenu connexe

Tendances

Mobile video services, MoMo Helsinki 2006
Mobile video services, MoMo Helsinki 2006Mobile video services, MoMo Helsinki 2006
Mobile video services, MoMo Helsinki 2006Claude Florin
 
FCM Sustainable Communities, Panel February 9 2012
FCM Sustainable Communities, Panel February 9 2012FCM Sustainable Communities, Panel February 9 2012
FCM Sustainable Communities, Panel February 9 2012Rick Huijbregts
 
Hurricane Sandy / Waldo Canyon Fire - Considerations for WiFi Networks
Hurricane Sandy / Waldo Canyon Fire - Considerations for WiFi NetworksHurricane Sandy / Waldo Canyon Fire - Considerations for WiFi Networks
Hurricane Sandy / Waldo Canyon Fire - Considerations for WiFi NetworksRakesh Bharania
 
Peter Ludin - "Spirit of Innovation"
Peter Ludin - "Spirit of Innovation"Peter Ludin - "Spirit of Innovation"
Peter Ludin - "Spirit of Innovation"Draka Communications
 
The Quiet Revolution of Visual Communications in the Western Enterprise. Ric...
The Quiet Revolution of Visual Communications in  the Western Enterprise. Ric...The Quiet Revolution of Visual Communications in  the Western Enterprise. Ric...
The Quiet Revolution of Visual Communications in the Western Enterprise. Ric...TrueConf__
 
Cloud Computing through FCAPS Managed Services in a Virtualized Data Center
Cloud Computing through FCAPS Managed Services in a Virtualized Data CenterCloud Computing through FCAPS Managed Services in a Virtualized Data Center
Cloud Computing through FCAPS Managed Services in a Virtualized Data Centervsarathy
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloudsallysogeti
 
Rural broadbandv3.4lite
Rural broadbandv3.4liteRural broadbandv3.4lite
Rural broadbandv3.4litedCORE
 
GSX physical event to virtual event
GSX physical event to virtual eventGSX physical event to virtual event
GSX physical event to virtual eventKenny Lauer
 
Ieee pimrc 2011 befemto panel - femto-wifi
Ieee pimrc 2011 befemto panel - femto-wifiIeee pimrc 2011 befemto panel - femto-wifi
Ieee pimrc 2011 befemto panel - femto-wifiThierry Lestable
 
Building the Mobile Internet
Building the Mobile InternetBuilding the Mobile Internet
Building the Mobile InternetKlaas Wierenga
 
Oasis cloud-law-ics-unofficial
Oasis cloud-law-ics-unofficialOasis cloud-law-ics-unofficial
Oasis cloud-law-ics-unofficialJamie Clark
 
Монетизания: Достижение прибыльности мобильного Интернета нового поколения.
 Монетизания: Достижение прибыльности мобильного Интернета нового поколения. Монетизания: Достижение прибыльности мобильного Интернета нового поколения.
Монетизания: Достижение прибыльности мобильного Интернета нового поколения.Cisco Russia
 
Permissionless Innovation BIM Trichy 2 Feb 2012
Permissionless Innovation BIM Trichy 2 Feb 2012Permissionless Innovation BIM Trichy 2 Feb 2012
Permissionless Innovation BIM Trichy 2 Feb 2012Olivier MJ Crépin-Leblond
 
Can WiMAX be the Broadband Solution for Underserved Areas?
Can WiMAX be the Broadband Solution for Underserved Areas?Can WiMAX be the Broadband Solution for Underserved Areas?
Can WiMAX be the Broadband Solution for Underserved Areas?Dr. Mazlan Abbas
 
Smart + Connected Real Estate
Smart + Connected Real EstateSmart + Connected Real Estate
Smart + Connected Real EstateCisco Canada
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloudreshmaroberts
 
Saiful Hidayat On Csr Guru Telkom Republika Bagimu Guru Kupersembahkan It...
Saiful Hidayat On Csr Guru Telkom   Republika Bagimu Guru Kupersembahkan   It...Saiful Hidayat On Csr Guru Telkom   Republika Bagimu Guru Kupersembahkan   It...
Saiful Hidayat On Csr Guru Telkom Republika Bagimu Guru Kupersembahkan It...Saiful Hidayat
 
Cloud Computing Summit 2011
Cloud Computing Summit 2011 Cloud Computing Summit 2011
Cloud Computing Summit 2011 ONI_PLC
 

Tendances (20)

Mobile video services, MoMo Helsinki 2006
Mobile video services, MoMo Helsinki 2006Mobile video services, MoMo Helsinki 2006
Mobile video services, MoMo Helsinki 2006
 
FCM Sustainable Communities, Panel February 9 2012
FCM Sustainable Communities, Panel February 9 2012FCM Sustainable Communities, Panel February 9 2012
FCM Sustainable Communities, Panel February 9 2012
 
Hurricane Sandy / Waldo Canyon Fire - Considerations for WiFi Networks
Hurricane Sandy / Waldo Canyon Fire - Considerations for WiFi NetworksHurricane Sandy / Waldo Canyon Fire - Considerations for WiFi Networks
Hurricane Sandy / Waldo Canyon Fire - Considerations for WiFi Networks
 
Peter Ludin - "Spirit of Innovation"
Peter Ludin - "Spirit of Innovation"Peter Ludin - "Spirit of Innovation"
Peter Ludin - "Spirit of Innovation"
 
The Quiet Revolution of Visual Communications in the Western Enterprise. Ric...
The Quiet Revolution of Visual Communications in  the Western Enterprise. Ric...The Quiet Revolution of Visual Communications in  the Western Enterprise. Ric...
The Quiet Revolution of Visual Communications in the Western Enterprise. Ric...
 
Cloud Computing through FCAPS Managed Services in a Virtualized Data Center
Cloud Computing through FCAPS Managed Services in a Virtualized Data CenterCloud Computing through FCAPS Managed Services in a Virtualized Data Center
Cloud Computing through FCAPS Managed Services in a Virtualized Data Center
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloud
 
Rural broadbandv3.4lite
Rural broadbandv3.4liteRural broadbandv3.4lite
Rural broadbandv3.4lite
 
GSX physical event to virtual event
GSX physical event to virtual eventGSX physical event to virtual event
GSX physical event to virtual event
 
Ieee pimrc 2011 befemto panel - femto-wifi
Ieee pimrc 2011 befemto panel - femto-wifiIeee pimrc 2011 befemto panel - femto-wifi
Ieee pimrc 2011 befemto panel - femto-wifi
 
Building the Mobile Internet
Building the Mobile InternetBuilding the Mobile Internet
Building the Mobile Internet
 
Leading the way in Internal Communication
Leading the way in Internal CommunicationLeading the way in Internal Communication
Leading the way in Internal Communication
 
Oasis cloud-law-ics-unofficial
Oasis cloud-law-ics-unofficialOasis cloud-law-ics-unofficial
Oasis cloud-law-ics-unofficial
 
Монетизания: Достижение прибыльности мобильного Интернета нового поколения.
 Монетизания: Достижение прибыльности мобильного Интернета нового поколения. Монетизания: Достижение прибыльности мобильного Интернета нового поколения.
Монетизания: Достижение прибыльности мобильного Интернета нового поколения.
 
Permissionless Innovation BIM Trichy 2 Feb 2012
Permissionless Innovation BIM Trichy 2 Feb 2012Permissionless Innovation BIM Trichy 2 Feb 2012
Permissionless Innovation BIM Trichy 2 Feb 2012
 
Can WiMAX be the Broadband Solution for Underserved Areas?
Can WiMAX be the Broadband Solution for Underserved Areas?Can WiMAX be the Broadband Solution for Underserved Areas?
Can WiMAX be the Broadband Solution for Underserved Areas?
 
Smart + Connected Real Estate
Smart + Connected Real EstateSmart + Connected Real Estate
Smart + Connected Real Estate
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloud
 
Saiful Hidayat On Csr Guru Telkom Republika Bagimu Guru Kupersembahkan It...
Saiful Hidayat On Csr Guru Telkom   Republika Bagimu Guru Kupersembahkan   It...Saiful Hidayat On Csr Guru Telkom   Republika Bagimu Guru Kupersembahkan   It...
Saiful Hidayat On Csr Guru Telkom Republika Bagimu Guru Kupersembahkan It...
 
Cloud Computing Summit 2011
Cloud Computing Summit 2011 Cloud Computing Summit 2011
Cloud Computing Summit 2011
 

Similaire à Securing Hastily Formed Networks For Disaster Relief & Emergency Response

After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment Cisco Crisis Response
 
Hastily Formed Networks at the Waldo Canyon Fire
Hastily Formed Networks at the Waldo Canyon FireHastily Formed Networks at the Waldo Canyon Fire
Hastily Formed Networks at the Waldo Canyon FireCisco Crisis Response
 
Neer Core Services & Cloud Computing V4.5
Neer Core Services & Cloud Computing V4.5Neer Core Services & Cloud Computing V4.5
Neer Core Services & Cloud Computing V4.5GovCloud Network
 
Buckle Up for Safety: Telecom Ready for the Passing Lane
Buckle Up for Safety:  Telecom Ready for the Passing LaneBuckle Up for Safety:  Telecom Ready for the Passing Lane
Buckle Up for Safety: Telecom Ready for the Passing LaneMaRS Discovery District
 
Securing the Hastily Formed Network: Infosec for Disaster Relief and Emergenc...
Securing the Hastily Formed Network: Infosec for Disaster Relief and Emergenc...Securing the Hastily Formed Network: Infosec for Disaster Relief and Emergenc...
Securing the Hastily Formed Network: Infosec for Disaster Relief and Emergenc...Cisco Crisis Response
 
Saiful Hidayat Trend Teknologi Digital Dan Dalam Pendidikan Bagimu Guru Kuper...
Saiful Hidayat Trend Teknologi Digital Dan Dalam Pendidikan Bagimu Guru Kuper...Saiful Hidayat Trend Teknologi Digital Dan Dalam Pendidikan Bagimu Guru Kuper...
Saiful Hidayat Trend Teknologi Digital Dan Dalam Pendidikan Bagimu Guru Kuper...Saiful Hidayat
 
Mid Co Fest 2012 One Page Flyer
Mid Co Fest 2012 One Page FlyerMid Co Fest 2012 One Page Flyer
Mid Co Fest 2012 One Page Flyertjaseckas
 
Cовременное предприятие. Надежные технологии для подключения, совместной рабо...
Cовременное предприятие. Надежные технологии для подключения, совместной рабо...Cовременное предприятие. Надежные технологии для подключения, совместной рабо...
Cовременное предприятие. Надежные технологии для подключения, совместной рабо...Cisco Russia
 
Construction Specifications Canada - Winnipeg
Construction Specifications Canada - WinnipegConstruction Specifications Canada - Winnipeg
Construction Specifications Canada - WinnipegRick Huijbregts
 
The Net Effect: It's Not What We Make, It's What We Make Possible
The Net Effect: It's Not What We Make, It's What We Make PossibleThe Net Effect: It's Not What We Make, It's What We Make Possible
The Net Effect: It's Not What We Make, It's What We Make PossibleCisco Services
 
AARNet services including specific Applications & Services
AARNet services including specific Applications & ServicesAARNet services including specific Applications & Services
AARNet services including specific Applications & ServicesJames Sankar
 
Setting the Foundation for Data Center Virtualization
Setting the Foundation for Data Center Virtualization Setting the Foundation for Data Center Virtualization
Setting the Foundation for Data Center Virtualization Cisco Canada
 
Comcast Enterprise Network Services
Comcast Enterprise Network ServicesComcast Enterprise Network Services
Comcast Enterprise Network Servicesvcardona
 
Cisco switching technical
Cisco switching technicalCisco switching technical
Cisco switching technicalImranD1
 
Mid Co Fest One Pager V11
Mid Co Fest One Pager V11Mid Co Fest One Pager V11
Mid Co Fest One Pager V11jakejanik
 
Mid Co Fest One Pager V11
Mid Co Fest One Pager V11Mid Co Fest One Pager V11
Mid Co Fest One Pager V11mguzan
 

Similaire à Securing Hastily Formed Networks For Disaster Relief & Emergency Response (20)

After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
 
Hastily Formed Networks at the Waldo Canyon Fire
Hastily Formed Networks at the Waldo Canyon FireHastily Formed Networks at the Waldo Canyon Fire
Hastily Formed Networks at the Waldo Canyon Fire
 
The Network Enabled EOC
The Network Enabled EOCThe Network Enabled EOC
The Network Enabled EOC
 
Neer Core Services & Cloud Computing V4.5
Neer Core Services & Cloud Computing V4.5Neer Core Services & Cloud Computing V4.5
Neer Core Services & Cloud Computing V4.5
 
Connecting Syria's Refugees
Connecting Syria's RefugeesConnecting Syria's Refugees
Connecting Syria's Refugees
 
Buckle Up for Safety: Telecom Ready for the Passing Lane
Buckle Up for Safety:  Telecom Ready for the Passing LaneBuckle Up for Safety:  Telecom Ready for the Passing Lane
Buckle Up for Safety: Telecom Ready for the Passing Lane
 
Securing the Hastily Formed Network: Infosec for Disaster Relief and Emergenc...
Securing the Hastily Formed Network: Infosec for Disaster Relief and Emergenc...Securing the Hastily Formed Network: Infosec for Disaster Relief and Emergenc...
Securing the Hastily Formed Network: Infosec for Disaster Relief and Emergenc...
 
Saiful Hidayat Trend Teknologi Digital Dan Dalam Pendidikan Bagimu Guru Kuper...
Saiful Hidayat Trend Teknologi Digital Dan Dalam Pendidikan Bagimu Guru Kuper...Saiful Hidayat Trend Teknologi Digital Dan Dalam Pendidikan Bagimu Guru Kuper...
Saiful Hidayat Trend Teknologi Digital Dan Dalam Pendidikan Bagimu Guru Kuper...
 
Mid Co Fest 2012 One Page Flyer
Mid Co Fest 2012 One Page FlyerMid Co Fest 2012 One Page Flyer
Mid Co Fest 2012 One Page Flyer
 
Mobile Service Edge
Mobile Service EdgeMobile Service Edge
Mobile Service Edge
 
Cовременное предприятие. Надежные технологии для подключения, совместной рабо...
Cовременное предприятие. Надежные технологии для подключения, совместной рабо...Cовременное предприятие. Надежные технологии для подключения, совместной рабо...
Cовременное предприятие. Надежные технологии для подключения, совместной рабо...
 
Construction Specifications Canada - Winnipeg
Construction Specifications Canada - WinnipegConstruction Specifications Canada - Winnipeg
Construction Specifications Canada - Winnipeg
 
Cisco
CiscoCisco
Cisco
 
The Net Effect: It's Not What We Make, It's What We Make Possible
The Net Effect: It's Not What We Make, It's What We Make PossibleThe Net Effect: It's Not What We Make, It's What We Make Possible
The Net Effect: It's Not What We Make, It's What We Make Possible
 
AARNet services including specific Applications & Services
AARNet services including specific Applications & ServicesAARNet services including specific Applications & Services
AARNet services including specific Applications & Services
 
Setting the Foundation for Data Center Virtualization
Setting the Foundation for Data Center Virtualization Setting the Foundation for Data Center Virtualization
Setting the Foundation for Data Center Virtualization
 
Comcast Enterprise Network Services
Comcast Enterprise Network ServicesComcast Enterprise Network Services
Comcast Enterprise Network Services
 
Cisco switching technical
Cisco switching technicalCisco switching technical
Cisco switching technical
 
Mid Co Fest One Pager V11
Mid Co Fest One Pager V11Mid Co Fest One Pager V11
Mid Co Fest One Pager V11
 
Mid Co Fest One Pager V11
Mid Co Fest One Pager V11Mid Co Fest One Pager V11
Mid Co Fest One Pager V11
 

Dernier

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Dernier (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Securing Hastily Formed Networks For Disaster Relief & Emergency Response

  • 1.
  • 2. Securing Hastily Formed Networks For Disaster Relief and Emergency Response BRKSEC-1000 BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
  • 4. “We don’t just get involved in something and then leave…we get involved in ways nobody else does.” John Chambers President & CEO – Cisco Systems
  • 5. Agenda Securing Hastily Formed Networks  A bit about Cisco Tactical Operations  The intersection of human needs and networks  Introducing the “Hastily Formed Network” (HFN)  Security considerations of HFNs  Q&A  Wrap-up BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
  • 7. Cisco TacOps Provides Crisis Support  Cisco Tactical Operations (TacOps) is a dedicated crisis response team that establishes emergency networks after a disaster.  TacOps personnel skills include technical, operational, first responder, military and logistics  Promotes innovative technology solutions for disaster response and other hardship situations.  Emergency response funded by Cisco Corporate Philanthropy. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
  • 8. Cisco Learned Lessons from Hurricane Katrina  Initially: TacOps supported “extreme risk” incidents  Expanded mission: To have a scalable, coordinated, response to disasters (2005) … because:  Hurricane Katrina - what Cisco did: ‒ Cisco sent hundreds of volunteers and tons of equipment to Gulf region. ‒ We were successful, but…  Hurricane Katrina - lessons learned: ‒ There were many willing engineers but few trained for the environment. ‒ Less effective due to the Cisco-wide uncoordinated response. ‒ No standardized Cisco mobile platform for disaster response. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
  • 9. Today: All-hazards Response, Anywhere  Famine, Horn of Africa  Plane Crash, Palo Alto CA  Tornadoes, AL, NC, MO  Earthquake, Port-Au-Prince  Earthquake/Tsunami, Japan Haiti  Earthquakes, Christchurch  Fiber-Optic Cut, SF Bay Area New Zealand CA  Flooding, Brazil  Flooding, Cedar Rapids IA  Flooding, Queensland  Evans Road Fire, NC Australia  Harris Fire, San Diego CA  Fourmile Canyon Fire, Boulder  Hurricanes Katrina, Gustav, CO Ike  Gas Pipeline Explosion, San Bruno CA BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
  • 10. US Relationships Office of Emergency Services BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
  • 11. International Relationships BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
  • 12. The Intersection of Human Needs and Networks
  • 13. All Crisis Responders Share the Same Problem NGOs/VOADs/ International Orgs Public Safety Transportation How to deliver the right National, State & Local Government information in the right format to the right person at the right time? Critical Infrastructure Healthcare Defense 13 BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
  • 14. The Need for Technology in Disaster is Increasing Goal: Mission workflow and productivity benefits to save lives  Radio, phone Radio + Integrated Data and speed recovery.  Single device Any Device (BYOD)  Voice only Voice, Video, Data  Closed teams Open collaboration  Command centric In the field, social media, everyone  Fixed locations Deployable anywhere BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
  • 16. Typical ICT Challenges in Disaster Information and Computing Technologies (ICT) are Needed but Overwhelmed  Lack of power  Degraded telephony infrastructure  Degraded Push-to-Talk Radio, Lack of interoperability  Oversubscribed services  Limited Internet access  Few IT resources  Lack of trained staff BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
  • 17. Solution: Hastily Formed Networks (HFN) Instant Emergency Networks  HFNs are portable, IP-based networks that are deployed in emergencies when normal communications has been disabled or destroyed.  Enable on-scene and remote responders to share situational awareness, coordinate operations, establish command and control.  Communicate within the affected area as well as to the outside world. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
  • 18. NPS/Cisco HFN Layered Model HUMAN / COGNITIVE Social/Cultural Organizational Political Economic TEXT VOICE VIDEO/IMAGERY SPECIALIZED - email - Push-to-talk - VTC - Collaboration APPLICATION - chat - Cellular - GIS - Sit Awareness - SMS - VoIP - Layered Maps - Cmd/Control - Sat Phone/PSTN - Fusion WIRED WIRELESS WIRELESS SAT - DSL LOCAL LONG HAUL BROADBAND NETWORK - Cable - WiFi - WiMAX - VSAT - Other ISP WAN - PAN - Microwave - BGAN - MAN - IP over HF POWER HUMAN NEEDS PHYSICAL NET OP CENTER - Fossil Fuel - Shelter SECURITY - Network Sec PHYSICAL - Renewable - Water - Force Protection -Cmd/Control - Fuel - Access - Leadership - Food Authorization BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
  • 19. That Layer Model Assumes Something Important  Security underlies every element of an HFN. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
  • 20. HFNs: What They Are  Portable: mobile, rolling kit, easily moved with few personnel  Rapidly deployable: pre-configured, set up with minimal training  Interim: Once pre-event communications is restored typically decommissioned.  Based on: WiFi/VSAT/WiMAX/etc. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
  • 21. HFNs: What They Are Not  A replacement for pre-emergency infrastructure.  Designed for large numbers of users  High bandwidth (if on VSAT). High latency, etc. needs to be considered. Typical NOC HFN NOC (Haiti) BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
  • 22. The First Deployed HFN: Hurricane Katrina BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
  • 23. The First Deployed HFN: Hurricane Katrina BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
  • 24. More Recently: 2010 Haiti Quake Airport USNS COMFORT NPS HFN TEAM HAITI NETWORK VSAT/BGAN Satellite WiMAX Point-to-Point WiFi Mesh WiFi Access Point BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
  • 25. Mobile and Kit HFN Solutions Example Units for Our Security Discussions  Network Emergency Response Vehicle (NERV) ‒ ISR G2 based platform/VSAT/Mesh ‒ Video surveillance, streaming, TelePresence  Mobile Communicator Vehicle (MC2) ‒ ISR based platform. VSAT, Mesh  Emergency Communications Kit (ECK) ‒ Rapidly deployable communications capability ‒ ISR 2811 / 3825 based BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
  • 27. Security: What are We Really Trying to Do?  Keep bad things out.  Protect the mission  Keep critical services running  Know what’s happening on the network and devices Inside Outside  Balance security and access  Get it right every time. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
  • 28. Myth Busting: Information Security in a Disaster  Assumption: “In a crisis network, I need to get deployed quickly. I don’t have time or the resources to secure the network!”  Reality: All HFN networks should be pre-planned – plan and build your security into your infrastructure! BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
  • 29. HFN Security Starts With the Physical  You’re going into a disaster zone!  “Force Protection”  Physical security of equipment  Logistics  Intelligence  Health and Safety BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
  • 30. Basic Information Security Concepts via HFN  Confidentiality: secure voice, video. Patient data. Security sensitive info.  Integrity: command and control channels  Availability: Denial of Service, appropriate use of the network, VSAT  Authenticity: User/admin verification, trusted endpoints. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
  • 31. IP Traffic Planes (a Reminder)  Data plane traffic: end-station, user generated traffic.  Control plane traffic: network device generated or received traffic used to operate create the network itself. (ARP, EIGRP, OSPF, etc.)  Management plane traffic: traffic designed to manage the network or devices on the network. (SSH, FTP, SNMP, NTP, etc.)  Addressing can help keep things organized: All kits/vehicles have /16, and each vlan is a /24 with a specified role. We can identify traffic flows easily. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
  • 32. HFNs Use the Same Basic Infosec Assumptions  Least-privilege access: Users, devices, systems are given minimal access given the crisis environment (advanced AAA solutions, etc. may not be available!)  Threats may come from anywhere in the network.  Simplicity: Once initially configured, the security architecture should establish itself without requiring any additional work from personnel who already have too much to do.  Defense-in-Depth: No single security feature or technology can mitigate the range of possible threats. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
  • 33. Cisco NERV Architecture Internet VHF VSAT UHF Wireless DMVPN/FW Core IPICS IP Phone Router Router HF Inside Wireless 3925 3945 AP 1242 Satellite Modem Access Switch Wireless Controller Cisco Systems San Jose, CA Wireless Raleigh, NC Mesh AP Video 1524- Surveillance PS/1522 IP Phone Video 7970/9971 Conferencing (C40) Cameras BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
  • 34. Use Strong Passwords, Restricted Privileges  For system/network devices, strong passwords are enforced. - No dictionary words, mix of special chars, letters, numbers - Based on mnemonic/phrase that is easily remembered (no guesswork in a disaster) - No “cisco/cisco” or similar. Duh!  Computers and other devices: “user” (non admin accounts), and administrative accounts. Use the least-access user needed for a task. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
  • 35. DoS is the Primary Security Concern with Satellite  Satellite is often the only way to get broadband data in a disaster.  The “thin sippy straw” – b/w from 128kbps – 5mbps (typical Ku VSAT system)  Protect your satellite bandwidth at all costs!  Malicious traffic ‒ Zombie, flooding traffic.  Inappropriate use …? ‒ YouTube ‒ BitTorrent ‒ FarmVille BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
  • 36. A Real World Security Incident…  Once upon a time… the NERV had a flat, open network.  Evans Road Fire in North Carolina.  Firefighter’s laptop came onto the NERV pre-infected – DDoS zombie w/spoofed SRC IP.  Created DoS condition on the satellite uplink. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
  • 37. …Had Us Reevaluate Access.  Designed for differentiated access in a easy-to-deploy fashion.  “Untrusted” VLANs: open WiFi, certain networks such as those external to the NERV or kits Optical & Copper (patch panel) – access to the patch panel allow only limited access Internet only.  “Trusted” VLANs have open access to servers, vehicle-based resources, etc. Requires you to have physical access to vehicle/kit BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
  • 38. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
  • 39. Our HFN Firewall Strategy – One Policy, Everywhere Field Units  Each “unit” is responsible ASA Firewall for its own firewall  Each policy is the same San Jose, CA  Inbound IOS firewall, BOGON filters Internet  Egress Internet-only from “untrusted” networks  Egress “sanity checking” ASA Firewall filters for spoofed outbound traffic Raleigh, NC BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
  • 40. Dynamic Multipoint VPN Increases Resiliency  3DES / SHA1 IPSEC DMVPN ASA Firewall protects all management plane control plane VoIP, TelePresence DMVPN Tunnel traffic. San Jose, CA  IPSEC tunnels link both backend hubs in San Jose Internet IPSEC and RTP  Each remote unit comes ASA Firewall up and establishes two tunnels DMVPN Tunnel  DMVPN is NAT friendly & Raleigh, NC increases resiliency. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
  • 41. Remote Access VPN Brings in Remote Users Remote user (Jabber Video)  Cisco ASAs configured to support both ASA Firewall remote access IPSEC and AnyConnect SSL VPN AnyConnect  Remote users are typically San Jose, CA trying to join the TelePresence environment, or Internet CTS C40 administer the infrastructure. Low volume. ASA Firewall Raleigh, NC BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
  • 42. Intrusion Monitoring for Malicious Traffic  Monitor network traffic using NM-IPS  Monitor the VLAN between core router and gateway router (e.g. to/from Internet or VPN)  Since our usage patterns change from deployment to deployment, we use them in IDS mode and rely upon on-scene engineers to investigate alarms.  Consider which network segments you “care the most about” BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
  • 43. Security Features for 802.11 Mesh Networks  Mesh networks support 802.11i – WPA2  But do your clients? Old devices may not support it.  Cisco LWAPP considered insecure – avoid it (it’s old anyway!)  Since code 5.2 – CAPWAP [RFC 5415] interoperable … but don’t bet on it.  Encryption + authentication required between AP and controller (which means you’ll have to do some pre-config, not plug and play)  Segment traffic across multiple wireless VLANs BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
  • 44. 802.16e WiMax Security – Proceed with Caution  WiMax provides a wireless bridge technology (4G)  Range: dozens of kilometers  BUT …  Security features variable from each vendor, no standardization  Do your homework. ‒ Quality of security implementation is spotty. ‒ 3DES, AES 128, 192, 256 for encryption ‒ Don’t use MAC auth. Use vs X.509 EAP-TLS BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
  • 45. Host Security…When You Don’t Control the Host!  All TacOps server hosts are hardened. PCs have a/v, CSA, etc.  But what about “untrusted” hosts on scene?  American Red Cross ‒ maintains ghost master system images, keep them patched & up to date. ‒ When they’re deploying laptops, they will image the laptops immediately before shipping them out. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
  • 46. Network Monitoring – Know Your Network Health (Don’t Just Assume!)  You need to know what’s going on before your users do.  SNMP, Cisco NetFlow, ASDM ‒ Beware of “chatty” management plane protocols that might cause trouble over satellite. ‒ Consider what network elements really need to be monitored. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
  • 47. Q&A
  • 48. Wrapping it all up  The need for technology in disasters is increasing.  Hastily Formed Networks provide IP in austere environments  SECURE Hastily Formed Networks can help save lives and speed recovery to affected communities.  You can have ease of deployment and security – it takes an architectural approach. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
  • 49. Connect with us Online Web. Email. Social Media.  On Cisco.com: http://www.cisco.com/go/tacops/  Email: tacops-info@cisco.com  Facebook: http://www.facebook.com/cisco.tacops  Twitter: @SJ_NERV @RTP_NERV BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
  • 50. Complete Your Online Session Evaluation  Give us your feedback and you could win fabulous prizes. Winners announced daily.  Receive 20 Passport points for each session evaluation you complete.  Complete your session evaluation online now (open a browser through our wireless network to access our Don’t forget to activate your portal) or visit one of the Internet Cisco Live Virtual account for access to stations throughout the Convention all session material, communities, and on-demand and live activities throughout Center. the year. Activate your account at the Cisco booth in the World of Solutions or visit www.ciscolive.com. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
  • 51. Final Thoughts  Get hands-on experience with the Walk-in Labs located in World of Solutions, booth 1042  Come see demos of many key solutions and products in the main Cisco booth 2924  Visit www.ciscoLive365.com after the event for updated PDFs, on- demand session videos, networking, and more!  Follow Cisco Live! using social media: ‒ Facebook: https://www.facebook.com/ciscoliveus ‒ Twitter: https://twitter.com/#!/CiscoLive ‒ LinkedIn Group: http://linkd.in/CiscoLI BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
  • 52. BRKSEC-1000 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public