SlideShare une entreprise Scribd logo
1  sur  35
Télécharger pour lire hors ligne
Summary of
Network Security Conference
(#NetworkSecurity)
May 2013
The only secure mobile is one that is switched
off with battery removed - Charles Brookson,
GSMA/ETSI at #NetworkSecurity
 Professor Ed Candy, Technology Strategist, 3 Group: Diversity
in devices is great. It allows no collective threats to be posed
due to their diversity of make models, OS’s, apps, etc.
Firewalls in the networks are good too but too many of them
can slow the network down. In the beginning when ‘3’ UK
rolled out 3G, 14 seconds were being lost due to them.
 Charles Brookson mentioned that he turns off 3G and uses
GSM/GPRS to save battery life
 Apps should store data on the cloud and not the device so if
the device is lost or compromised then the user data is not
lost to the third parties
 Users should be made aware of the background functions and
services on the device and also the threat/safety level of
these.
Interesting comments, questions, etc. - #1
 The operators can provide more security but it costs them to
do this. They have to work out a way to pass this on to the
users.
 Very little malware on google play. Risk is v.low. Android
malware hits countries where 3rd party appstores are the
norm
 Consumer education is key. Good to not be complacent about
malware, generally unnecessary to have mob antivirus.
 Mobile network should not be the only technology for critical
access. There should be other means as well
 A5/3 (security algorithm for GSM/GPRS) was standardised in
2001 and is more secure than the previous algorithms but
was not available widely till quite late because it was not IOT
tested and mandated by operators.
Interesting comments, questions, etc. - #2
Day 1
Day 1 began with a Panel Discussion moderated by Charles Brookson from GSMA with
some of the points I have already mentioned earlier
David Rogers from Copper Horse spoke on Incident Management for Mobile Malware and
on Responsible Disclosure. He also distributed a leaflet prepared for the UK police
regarding phone security. More details on that here.
Eric Gauthier, Head of Technical Fraud and Revenue Assurance, Orange gave an
Introduction on LTE and how Security was handled all the way from 0G (pre-cellular) to
4G/LTE.
Talal Faroug, Quality Assurance Manager, MTN, SUDAN gave a talk on Understanding the
Business Case for Network Security. His main focus was on SIM Box Fraud.
Telecom Concepts Blog has a nice write-up on this topic here -
http://telecomconcepts.wordpress.com/2010/02/01/simbox-fraud-detection-and-billing/
Another useful writeup on this topic here.
See Also GSMA press release: Raids on SIM box/GSM gateway fraudsters save mobile
operators millions
Feride Cetin, Group Strategy & Innovation Security & Intelligence, Swisscom focussed her
presentation on some of the initiatives taken by Swisscom on Apps Security and Rating
There were some good examples on how developers manage to ignore basic security
guidelines while making excellent apps. The result is they have to go back and fix the issues
at a much later stage and at the same time get a lots of negative publicity that can be
sometimes harmful for the business.
5 Rating Criteria to understand how apps behave; Permission, Privacy, Data Traffic, Data
Storage and Man in the Middle
Day 2
David Rogers from Copper Horse Solutions Limited chaired the second day proceedings. I
think his main message is as shown in the slide above and is self explanatory.
Ps: In case you are not from the UK, the above picture highlights beef (horsemeat) scandal
Dr. Christoph Peylo, VP Deutsche Telekom Innovation Laboratories started the day with an
interesting presentation on "Remote Control and Device Security: How Cyber-Attacks Can
Impact M2M"
The talk was so interesting that I should put up the slides or more detailed presentation on
this topic sometime later
Christoph showing http://www.sicherheitstacho.eu - Real time cyber-attacks.
Gert Pauwels, M2M Marketing Director, Mobistar spoke on the operator Orange’s position
on M2M. The key takeaway was the GMA Certification Program as shown in the slide
above.
Carlos Olea, Network Security Manager, Telefonica International focussed on DDoS
(distributed denial-of-service) and how Telefonica handled the Spamhaus and other Ddos
attacks and what they have learnt from this.
Adrian Drury, Lead analyst, Ovum spoke about RTB. I don’t remember him mentioning what
RTB is but my understanding it stands for Real Time Bidding -
http://en.wikipedia.org/wiki/Real-time_bidding
Raj Samani, Vice President, EMEA CTO, McAfee spoke about how connected devices have
changed our lifestle and the security issues that we are facing in this connected world.
Raj had some very interesting bits that he mentioned but the slides let him
a bit down. Here are some that were mentioned on twitter during the
event:
• In Germany, the smart meters polling interval was reduced to 2 sec and
it can tell the name of movie being watched. This is because each movie
has its own unique energy consumption pattern.
• Privacy a big issue for smart meters. Easy to analyse usage; what is being
used and when.
• In USA in some new buildings, connected devices are even being put in
the bricks to track humidity, etc.
• Everyone has a price when it comes to giving up private data
• A powergrid in US said that they face 10K cyber attacks per month as per
@Raj_Samani
Jon Howes, Technology Director, Beecham Research spoke on "M2M Solution Security“. A
whitepaper on this topic is also available on their website here.
Reinder Wolthuis, Project Manager Information Security, TNO spoke on "M2M Security"
and gave us the results of the etis M2M security survey
Personally I am a bit surprised that M2M devices would move to UMTS. The biggest issue
for M2M devices using UMTS is the battery power consumption. Its better to stay on
GSM/GPRS is the amount of data transfer is low or move to LTE if the amount of data
transfer required is high.
“Dutch research found that network operators worry about physical tampering but don't
do anything about it”
The final talk of the day was by Ravishankar Borgaonkar, Researcher, Deutsche Telekom on
the topic of “Small Cells in Hostile Environment“. I have covered earlier presentations by
Ravi on the blog here and here. One of the issue highlighted above and by others as well is
that a security feature may be asked by the operator but may not be supplied by vendor.
Hope you've enjoyed
the summary
Prepared by:
Zahid Ghadialy
eXplanoTech & 3G4G
Blog
Additional Reading
• Small Cells and the City – My presentation from Small
Cells Global Congress 2012
• Rel-11/12 3GPP Security Update – 3GPP
• Present and future Standards for mobile internet and
smart phone information security - ETSI
• Evolution of 3GPP Security
• Femto Hacking in UMTS and LTE

Contenu connexe

Tendances

Performance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless NetworksPerformance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless Networks
University of Piraeus
 
Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129
Mohammad Khatib
 

Tendances (20)

Green Future Networks: Network Energy Efficiency
Green Future Networks: Network Energy EfficiencyGreen Future Networks: Network Energy Efficiency
Green Future Networks: Network Energy Efficiency
 
5G Technology
5G Technology5G Technology
5G Technology
 
5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement
5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement
5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement
 
ZTE Communication - March 2015
ZTE Communication - March 2015ZTE Communication - March 2015
ZTE Communication - March 2015
 
Tcl telecom expertise v 2 00 vs 220812
Tcl telecom expertise v 2 00 vs 220812Tcl telecom expertise v 2 00 vs 220812
Tcl telecom expertise v 2 00 vs 220812
 
Jisc's Vision for 5G - Digital Catapult Future of 5G Summit
Jisc's Vision for 5G - Digital Catapult Future of 5G SummitJisc's Vision for 5G - Digital Catapult Future of 5G Summit
Jisc's Vision for 5G - Digital Catapult Future of 5G Summit
 
Performance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless NetworksPerformance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless Networks
 
Private 5G Seminar Brochure
Private 5G Seminar BrochurePrivate 5G Seminar Brochure
Private 5G Seminar Brochure
 
Vision only 5G AnyBee (Anycasting Beyond the Edge)
Vision only 5G AnyBee (Anycasting Beyond the Edge)Vision only 5G AnyBee (Anycasting Beyond the Edge)
Vision only 5G AnyBee (Anycasting Beyond the Edge)
 
NB-IoT and 5G
NB-IoT and 5GNB-IoT and 5G
NB-IoT and 5G
 
5G technology
5G technology5G technology
5G technology
 
Economics of 4G Introduction in Growth Markets
Economics of 4G Introduction in Growth MarketsEconomics of 4G Introduction in Growth Markets
Economics of 4G Introduction in Growth Markets
 
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-20215G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
 
Reporte a cerca de 6G
Reporte a cerca de 6GReporte a cerca de 6G
Reporte a cerca de 6G
 
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
 
Private 5G Networks and Vendor Diversification
Private 5G Networks and Vendor DiversificationPrivate 5G Networks and Vendor Diversification
Private 5G Networks and Vendor Diversification
 
An Introduction to IoT: Connectivity & Case Studies
An Introduction to IoT: Connectivity & Case StudiesAn Introduction to IoT: Connectivity & Case Studies
An Introduction to IoT: Connectivity & Case Studies
 
Aviation 5G/5G in Aviation
Aviation 5G/5G in AviationAviation 5G/5G in Aviation
Aviation 5G/5G in Aviation
 
5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networking5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networking
 
Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129
 

Similaire à Summary of Network Security Conference (#NetworkSecurity)

J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
Droidcon Berlin
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
William Chipman
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communication
ardhita banu adji
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417
IJRAT
 
1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main
dsfsadfas
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trends
Ken Huang
 
The 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problemThe 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problem
Sherry Jones
 

Similaire à Summary of Network Security Conference (#NetworkSecurity) (20)

J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdf
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGen
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
 
B010331019
B010331019B010331019
B010331019
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communication
 
Public safety is reshaped with 5G
Public safety is reshaped with 5GPublic safety is reshaped with 5G
Public safety is reshaped with 5G
 
Security model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentationSecurity model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentation
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main
 
M2M Journal - 22nd edition
M2M Journal - 22nd editionM2M Journal - 22nd edition
M2M Journal - 22nd edition
 
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Security Issues and challenges with Wireless M2Mutilising Cloud infrastructureSecurity Issues and challenges with Wireless M2Mutilising Cloud infrastructure
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
 
Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trends
 
The 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problemThe 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problem
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possible
 

Plus de 3G4G

Plus de 3G4G (20)

TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...
TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...
TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...
 
Misc: What are No Mobile Coverage Zones called?
Misc: What are No Mobile Coverage Zones called?Misc: What are No Mobile Coverage Zones called?
Misc: What are No Mobile Coverage Zones called?
 
TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…
TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…
TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…
 
TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…
TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…
TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…
 
Beginners: An Quick Introduction to 3GPP
Beginners: An Quick Introduction to 3GPPBeginners: An Quick Introduction to 3GPP
Beginners: An Quick Introduction to 3GPP
 
Misc: Mobile Technology and Healthcare
Misc: Mobile Technology and HealthcareMisc: Mobile Technology and Healthcare
Misc: Mobile Technology and Healthcare
 
Should we stop the shutdown of 2G/3G to save lives??
Should we stop the shutdown of 2G/3G to save lives??Should we stop the shutdown of 2G/3G to save lives??
Should we stop the shutdown of 2G/3G to save lives??
 
Opinion – 5G Reality Check: Speeds
Opinion – 5G Reality Check: SpeedsOpinion – 5G Reality Check: Speeds
Opinion – 5G Reality Check: Speeds
 
Technology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdfTechnology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdf
 
6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies
 
3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)
3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)
3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)
 
3GPP SON Series: Energy Savings (ES)
3GPP SON Series: Energy Savings (ES)3GPP SON Series: Energy Savings (ES)
3GPP SON Series: Energy Savings (ES)
 
3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)
3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)
3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)
 
3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)
 
3GPP SON Series: Coverage and Capacity Optimization (CCO)
3GPP SON Series: Coverage and Capacity Optimization (CCO)3GPP SON Series: Coverage and Capacity Optimization (CCO)
3GPP SON Series: Coverage and Capacity Optimization (CCO)
 
3GPP SON Series: SON in 3GPP Release-10 – Self-healing
3GPP SON Series: SON in 3GPP Release-10 – Self-healing3GPP SON Series: SON in 3GPP Release-10 – Self-healing
3GPP SON Series: SON in 3GPP Release-10 – Self-healing
 
3GPP SON Series: RACH Optimization
3GPP SON Series: RACH Optimization3GPP SON Series: RACH Optimization
3GPP SON Series: RACH Optimization
 
3GPP SON Series: Mobility Robustness Optimization (MRO)
3GPP SON Series: Mobility Robustness Optimization (MRO)3GPP SON Series: Mobility Robustness Optimization (MRO)
3GPP SON Series: Mobility Robustness Optimization (MRO)
 
3GPP SON Series: SON in 3GPP Release-9 – Self-optimization
3GPP SON Series: SON in 3GPP Release-9 – Self-optimization3GPP SON Series: SON in 3GPP Release-9 – Self-optimization
3GPP SON Series: SON in 3GPP Release-9 – Self-optimization
 
Beginners: Energy Consumption in Mobile Networks - RAN Power Saving Schemes
Beginners: Energy Consumption in Mobile Networks - RAN Power Saving SchemesBeginners: Energy Consumption in Mobile Networks - RAN Power Saving Schemes
Beginners: Energy Consumption in Mobile Networks - RAN Power Saving Schemes
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Summary of Network Security Conference (#NetworkSecurity)

  • 1. Summary of Network Security Conference (#NetworkSecurity) May 2013
  • 2. The only secure mobile is one that is switched off with battery removed - Charles Brookson, GSMA/ETSI at #NetworkSecurity
  • 3.  Professor Ed Candy, Technology Strategist, 3 Group: Diversity in devices is great. It allows no collective threats to be posed due to their diversity of make models, OS’s, apps, etc. Firewalls in the networks are good too but too many of them can slow the network down. In the beginning when ‘3’ UK rolled out 3G, 14 seconds were being lost due to them.  Charles Brookson mentioned that he turns off 3G and uses GSM/GPRS to save battery life  Apps should store data on the cloud and not the device so if the device is lost or compromised then the user data is not lost to the third parties  Users should be made aware of the background functions and services on the device and also the threat/safety level of these. Interesting comments, questions, etc. - #1
  • 4.  The operators can provide more security but it costs them to do this. They have to work out a way to pass this on to the users.  Very little malware on google play. Risk is v.low. Android malware hits countries where 3rd party appstores are the norm  Consumer education is key. Good to not be complacent about malware, generally unnecessary to have mob antivirus.  Mobile network should not be the only technology for critical access. There should be other means as well  A5/3 (security algorithm for GSM/GPRS) was standardised in 2001 and is more secure than the previous algorithms but was not available widely till quite late because it was not IOT tested and mandated by operators. Interesting comments, questions, etc. - #2
  • 6. Day 1 began with a Panel Discussion moderated by Charles Brookson from GSMA with some of the points I have already mentioned earlier
  • 7. David Rogers from Copper Horse spoke on Incident Management for Mobile Malware and on Responsible Disclosure. He also distributed a leaflet prepared for the UK police regarding phone security. More details on that here.
  • 8. Eric Gauthier, Head of Technical Fraud and Revenue Assurance, Orange gave an Introduction on LTE and how Security was handled all the way from 0G (pre-cellular) to 4G/LTE.
  • 9. Talal Faroug, Quality Assurance Manager, MTN, SUDAN gave a talk on Understanding the Business Case for Network Security. His main focus was on SIM Box Fraud.
  • 10. Telecom Concepts Blog has a nice write-up on this topic here - http://telecomconcepts.wordpress.com/2010/02/01/simbox-fraud-detection-and-billing/ Another useful writeup on this topic here.
  • 11. See Also GSMA press release: Raids on SIM box/GSM gateway fraudsters save mobile operators millions
  • 12. Feride Cetin, Group Strategy & Innovation Security & Intelligence, Swisscom focussed her presentation on some of the initiatives taken by Swisscom on Apps Security and Rating
  • 13. There were some good examples on how developers manage to ignore basic security guidelines while making excellent apps. The result is they have to go back and fix the issues at a much later stage and at the same time get a lots of negative publicity that can be sometimes harmful for the business.
  • 14. 5 Rating Criteria to understand how apps behave; Permission, Privacy, Data Traffic, Data Storage and Man in the Middle
  • 15. Day 2
  • 16. David Rogers from Copper Horse Solutions Limited chaired the second day proceedings. I think his main message is as shown in the slide above and is self explanatory. Ps: In case you are not from the UK, the above picture highlights beef (horsemeat) scandal
  • 17. Dr. Christoph Peylo, VP Deutsche Telekom Innovation Laboratories started the day with an interesting presentation on "Remote Control and Device Security: How Cyber-Attacks Can Impact M2M"
  • 18. The talk was so interesting that I should put up the slides or more detailed presentation on this topic sometime later
  • 20. Gert Pauwels, M2M Marketing Director, Mobistar spoke on the operator Orange’s position on M2M. The key takeaway was the GMA Certification Program as shown in the slide above.
  • 21. Carlos Olea, Network Security Manager, Telefonica International focussed on DDoS (distributed denial-of-service) and how Telefonica handled the Spamhaus and other Ddos attacks and what they have learnt from this.
  • 22.
  • 23. Adrian Drury, Lead analyst, Ovum spoke about RTB. I don’t remember him mentioning what RTB is but my understanding it stands for Real Time Bidding - http://en.wikipedia.org/wiki/Real-time_bidding
  • 24.
  • 25. Raj Samani, Vice President, EMEA CTO, McAfee spoke about how connected devices have changed our lifestle and the security issues that we are facing in this connected world.
  • 26. Raj had some very interesting bits that he mentioned but the slides let him a bit down. Here are some that were mentioned on twitter during the event: • In Germany, the smart meters polling interval was reduced to 2 sec and it can tell the name of movie being watched. This is because each movie has its own unique energy consumption pattern. • Privacy a big issue for smart meters. Easy to analyse usage; what is being used and when. • In USA in some new buildings, connected devices are even being put in the bricks to track humidity, etc. • Everyone has a price when it comes to giving up private data • A powergrid in US said that they face 10K cyber attacks per month as per @Raj_Samani
  • 27. Jon Howes, Technology Director, Beecham Research spoke on "M2M Solution Security“. A whitepaper on this topic is also available on their website here.
  • 28. Reinder Wolthuis, Project Manager Information Security, TNO spoke on "M2M Security" and gave us the results of the etis M2M security survey
  • 29. Personally I am a bit surprised that M2M devices would move to UMTS. The biggest issue for M2M devices using UMTS is the battery power consumption. Its better to stay on GSM/GPRS is the amount of data transfer is low or move to LTE if the amount of data transfer required is high.
  • 30. “Dutch research found that network operators worry about physical tampering but don't do anything about it”
  • 31.
  • 32.
  • 33. The final talk of the day was by Ravishankar Borgaonkar, Researcher, Deutsche Telekom on the topic of “Small Cells in Hostile Environment“. I have covered earlier presentations by Ravi on the blog here and here. One of the issue highlighted above and by others as well is that a security feature may be asked by the operator but may not be supplied by vendor.
  • 34. Hope you've enjoyed the summary Prepared by: Zahid Ghadialy eXplanoTech & 3G4G Blog
  • 35. Additional Reading • Small Cells and the City – My presentation from Small Cells Global Congress 2012 • Rel-11/12 3GPP Security Update – 3GPP • Present and future Standards for mobile internet and smart phone information security - ETSI • Evolution of 3GPP Security • Femto Hacking in UMTS and LTE