Wireless Security on Context (disponible en español)

Cisco Service Provider Mobility
Cisco Service Provider MobilityCisco Service Provider Mobility

For more discussions and topics around SP Mobility, please visit our Mobility Community: http://cisco.com/go/mobilitycommunity

Wireless Security on Context (disponible en español)
Posted by Jorge Guzman Olaya on Apr 15, 2013 10:02:25 AM


Why Security?

It all started with an email account you accessed through your laptop, and now sometimes it is really hard to track all
the digital profiles you own, plus we tend to pay little attention about accessing our digital assets in secure “wireless
domains”, these factors combined form a scenario where security breaches can really hurt your digital self as it
exists. It is clear that wireless communications has allowed us to adopt technology in a new way; we can use digital
tools without being tied to a location, but the fact is that when you use technology everywhere you are exposing
yourself to that “everywhere”. Popularity of wireless technology has shifted the usage of digital tools, your mobile
device is amazingly powerful and networks are growing in complexity to cope with better services. All this power
makes it difficult on the user to keep a track of the myriad of vulnerabilities and possible security exploits.




As mentioned above we have in our hands a complex scenario; from one side we have an exponential growth and
success of the wireless technology plus an increasing exposure of personal sensitive data to the digital world plus
more physical spaces where we can use the technology that at the same time increases the number of personal and
social contexts involved in our interactions with technology. On the other side we have a user that is still adapting to
the rapid shift, possibly meaning that he is less conscious of how various factors come together to form the service,
and it is how we find the first weak link in the chain; the lack of knowledge. Another factor is the fierce competition
among industry stakeholders; they are working isolated pushing their own agendas, creating a non -cohesive
framework of security for the wireless industry. On the contrary, threats and bad-intentioned people usually
beneficiate upon gathered knowledge of collaborative open communities through the Internet.

Taking Action to be More Secure

From the user perspective, the main action must be to increase knowledge of the technology. For example, where to
tune security configurations on the device or what information is being accessed on your device by the apps installed.
It is also important to know the risks of using a non-secure WLAN network. In the final part of this blog I summarize
various security tips you can find on the Internet and my personal recommendation.

Application developers must commit more responsibly to security and inform the customer about their efforts on the
matter, especially considering privacy of user sensitive information and its management; aspects like the length of
conservation of user information even after the user has uninstalled the app or the permissions of sh aring personal
information with third parties. Regarding the OS developers, it is expected that SW threats are addressed not only for
     the new releases of the product but also previous versions must be covered, and somehow frequency of security
     updates or patches must be increased.

     Other contributors to the industry take action: like national government’s initiative to extend EIR databases beyond
     countries frontiers to discourage device theft, or the effort countries are making, to oblige Internet giants to comply
     with international policies of user’s personal data handling. Academia presents innovative testing techniques against
     security breaches including fuzzy logic and genetic algorithms to simulate real life environments. New wireless
     applications like NFC and M2M also pose big questions and challenges to the industry that are being addressed;
     solutions like data encryption while being transferred or stored are being integrated into architectures and regulations,
     but the main path the industry must take is an improvement of the vision about security. Seurity threats cannot be
     avoided - they can only be managed and management must start with a plan to achieve a clear goal.

     A Framework to Achieve a More Secure Wireless Ecosystem

     If security threats can only be managed at the most, then, a base framework can be formulated to then build a plan or
     strategy to efficiently manage wireless security. CTIA has made a pretty good effort formulating such a framework in
     which the elements are:

    Consumers
    MNO
    Device Manufacturers
    Application Market Places
    Operating System vendors
    Chipset Manufacturers
    Network Services Systems
    Support SW Vendors
    VAS Service Providers
    Network Equipment Manufacturers

     Under its view CTIA proposes five cornerstones, around which security actions are executed and efforts should be
     built around:

1.   Consumers: Responsible to protect their devices through better configuration and installing applications to secure
     their devices and their data, also keeping that SW Up-to-date., Ffinally the users must be aware of what they put in
     their devices and what they disclosed on their social profiles.
2.   Devices: Comprises all the tools and methods that the industry and you as user, can use to minimize risks from
     security threats, given the high complexity of current devices and the great deal of information and activities we do
     with them.
3.   Network based security policies: Includes all the tools that network providers should use as countermeasures against
     security threats;, examples like Policy Routing Traffic Analysis, Service provider SSL VPN, and MDM (Mobile Device
     Management) capabilities for BYOD environments.
4.   Authentication control: Covers the authentication methods of the device with the network and those for the user to
     access the device, considering the multifactor method trend and the biometric approaches.
5.   Cloud, Networks and Services: Comprehends the whole extend of the network, its functional entities and the
     services that each part provides both for regular customers and enterprise users. Also the different precautions and
     plans that the network has to have in place for Disaster recovery scenarios and security schemes that ensure privacy
     and integrity of stored user information.
My Personal View on Wireless Security




                                     Image courtesy of Paola Buelvas (papolareina@yahoo.es)

    As mentioned above, a framework is only useful if there is some intention to develop something around that baseline,
    and in the introduction of this post I mentioned that industry main stakeholders tend to work isolated in a non -
    collaborative way, so I agree with some proposals about a push towards a multisource intelligence environment. In
    order to accomplish such an environment a Multisource Intelligent System could be the center tool to allow a
    collaborative effort of this kind. And so, the industry will have a transnational, multivendor, multi -technology tool,
    containing well documented security threats, problem workarounds, countermeasures and possible patches and
    solutions against known security breaches; all this following the best of the bread practices in IT management to
    organize, produce, control and store the flow of information that comes from solving engineering problems related to
    security in the wireless industry.

    This multi-collaborative industry repository will be accessible to all accredited members of the wireless industry and/or
    active contributors of security assets construction within the ecosystem. They will feed, maintain and update the
    content of this tool. Through the use of guidelines contained in international bodies of knowledge for IT handling, it
    will be possible to ensure the appropriate privacy for each industry stakeholder regarding industrial secret
    information, while still helping the development of solutions from already known threats and those foreseen by
    academia. The main objectives for an endeavor of this kind would be:

   Provide the industry with a construct around which industry stakeholders can produce collaborative efforts to better
    countermeasure security threats.
   To speed the production and divulgation processes of effective and more complete security countermeasures that
    better protect the customer and the industry, taking advantage of already documented knowledge, avoiding re -work
    and misinformation.

    Finally, I think that future technologies, like Context Aware networks can help to create a more secure environment
    for the user, allowing the execution of a counter action at the precise instant of technology usage and at the precise
    moment where a security threat becomes obvious, and without the need for the user to know or be prepared to all
    existent risks of his ongoing wireless transaction or service at a random space and time combination. All while at the
    same time optimizing the resources of the network devoted to protect the user against threats .; Ffor example, if the
    network detects that certain user is connecting through its own VPN client, a network base VPN solution flow can be
    allocated for another user.

    A Look into the Future of Wireless Security

    Fields for further study: BSN and BAN give security a totally new meaning, because this technology puts information
    concerning your own body into networks that today, cannot be considered totally secured;, so if this field of the
    industry is set for any success then security must be further developed and strengthen. Now MTC (Machine Type
    Communications) where human intervention is not required also needs an intelligent non supervised scheme that can
    ensure the basics of a secure communication network: Confidentiality, Integrity, Authentication, Non Repudiation,
    Access Control, Availability and Privacy.
Security future concepts: like beneficial viruses, SW that in the same line of DRM remain inactive but when found in
     unauthorized digital environments then proceed to delete themselves and the information attached to them. Another
     concept is the Active sentinel SW that contrary to a regular antivirus this SW adapts to a certain extent to identify the
     threat even if is not specified in the database but that follows a suspicious activity pattern against predefine rules.
     New biometric authentication methods like brain wave authentication that is really unique and fast.

     Summarized Tips for the Wireless User

     As promised, here is a list of “do's” and “don'ts” for the user of wireless technology.

    Do:
1.  Be informed and cautious while downloading apps, clicking links, providing information to online sites, setting
    passwords, and linking accounts and online profiles. Always consider installing security software on your wireless
    device.
2. Check the permissions of each installed app, and take the time to read the permissions you give to apps while
    installing them.
3. Be conscious when using Wi-Fi, check the type of security used, if security is absent from the access point or lower
    than WPA2, avoid logging in your sensitive accounts, or do banking transactions, without a VPN client solution, if you
    don’t have such solution, restrict your session to just browsing if at all.
4. Be proactive and organized with your passwords: set a strategy to generate, change and store them, there are plenty
    of passwords apps.
5. Check the details of your wireless bill to identify unauthorized usage or suspicious usage patterns from your devices.
6. Update your trusted applications and OS in all the devices you run digital transactions.
7. Report stolen or lost phones.
8. Use a VPN solution for unsecure Wi-Fi
9. Use complex passwords for important accounts.
10. Set security questions that really help you protect your data.
11. Use encryption of your sensitive data while stored on mobile devices, available apps can be found on your preferred
    SW provider online stores.

     Do Not:
1.   Publish personal information or specific information about your wireless devices (phone number, IMEI, MAC address,
     etc.)
2.   Root your phone or mobile device for personalization purposes.
3.   Buy an stolen phone or buy it from a suspicious provider
4.   Download apps from un-authorized stores different from the OS manufacturer store, like directly from the internet.
5.   Be lazy, when setting passwords, logging into sensitive accounts, exchanging banking info, and protecting mobile
     devices, always use what you consider is more secure for your digital asset, even if it takes more time.
6.   Have one factor authentication for sensitive accounts or digital profiles.
7.   Have the same password across multiple online or digital profiles.
8.   Thrust blindly on third parties to secure your digital data, take your own measures, backup regularly, encrypt your
     data, do not use unsecure access points can be just some examples.
9.   Link social accounts all together if unnecessary, you’ll be providing a great deal of information without noticing it.

     For more, follow me on Twitter @jomaguo

     Read this blog post in Spanish.
     For all blog posts written by Jorge Guzman Olaya, please visit his Community Profile.




                          For more discussions and topics around SP Mobility, please visit our Mobility
                                      Community:http://cisco.com/go/mobilitycommunity

Recommandé

Paper Florencio Cano - Patient data security in a wireless and mobile world par
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldWTHS
521 vues7 diapositives
Toward Continuous Cybersecurity with Network Automation par
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
107 vues28 diapositives
Securing the network perimeter par
Securing the network perimeterSecuring the network perimeter
Securing the network perimeterinfra-si
128 vues4 diapositives
Unique Security Challenges in the Datacenter Demand Innovative Solutions par
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsJuniper Networks
1.2K vues12 diapositives
Ci31560566 par
Ci31560566Ci31560566
Ci31560566IJERA Editor
228 vues7 diapositives
A Novel Security Approach for Communication using IOT par
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTIJEACS
37 vues5 diapositives

Contenu connexe

Tendances

Introduction to the concept of it security par
Introduction to the concept of it securityIntroduction to the concept of it security
Introduction to the concept of it securityRAVIKUMAR Digital Signal Processing
59 vues48 diapositives
Information security.pptx par
Information security.pptxInformation security.pptx
Information security.pptxGovt. P.G. College Sendhwa, Barwani (M.P.)
1.6K vues47 diapositives
76 s201918 par
76 s20191876 s201918
76 s201918IJRAT
45 vues5 diapositives
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in... par
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
202 vues22 diapositives
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr... par
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...ijtsrd
35 vues4 diapositives
188 par
188188
188vivatechijri
35 vues6 diapositives

Tendances(20)

76 s201918 par IJRAT
76 s20191876 s201918
76 s201918
IJRAT45 vues
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in... par CODE BLUE
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
CODE BLUE202 vues
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr... par ijtsrd
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
ijtsrd35 vues
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS par George Wainblat
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
George Wainblat512 vues
Report: Study and Implementation of Advance Intrusion Detection and Preventio... par Deepak Mishra
Report: Study and Implementation of Advance Intrusion Detection and Preventio...Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Deepak Mishra3.3K vues
Role of Forensic Triage In Cyber Security Trends 2021 par Amrit Chhetri
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
Amrit Chhetri188 vues
A Collaborative Intrusion Detection System for Cloud Computing par ijsrd.com
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computing
ijsrd.com386 vues
The Next Generation Cognitive Security Operations Center: Network Flow Forens... par Konstantinos Demertzis
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING par Nishanth Gandhidoss
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things... par Dr Dev Kambhampati
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Securing the Digital Economy: Reinventing the Internet par accenture
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture907 vues
Risks and Security of Internet and System par Param Nanavati
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
Param Nanavati140 vues
An Empirical Study on Information Security par ijtsrd
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
ijtsrd80 vues
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu... par Ivanti
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
Ivanti107 vues
Security and Privacy in IoT and Cyber-physical Systems par Bob Marcus
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
Bob Marcus62 vues
Trust based Mechanism for Secure Cloud Computing Environment: A Survey par inventionjournals
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey

Similaire à Wireless Security on Context (disponible en español)

Nt1330 Unit 2 Research Paper par
Nt1330 Unit 2 Research PaperNt1330 Unit 2 Research Paper
Nt1330 Unit 2 Research PaperMarilyn Marie
2 vues49 diapositives
How To Manage Iot And Byod Threats While Still Preserving par
How To Manage Iot And Byod Threats While Still PreservingHow To Manage Iot And Byod Threats While Still Preserving
How To Manage Iot And Byod Threats While Still PreservingMelissa Hewitt
4 vues49 diapositives
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New... par
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Unisys Corporation
2.1K vues16 diapositives
report on Mobile security par
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
956 vues13 diapositives
Firewalls And Infrastructure Security par
Firewalls And Infrastructure SecurityFirewalls And Infrastructure Security
Firewalls And Infrastructure SecurityBrooke Curtis
4 vues82 diapositives
Essay On Network Security par
Essay On Network SecurityEssay On Network Security
Essay On Network SecurityAlison Hall
4 vues152 diapositives

Similaire à Wireless Security on Context (disponible en español)(20)

How To Manage Iot And Byod Threats While Still Preserving par Melissa Hewitt
How To Manage Iot And Byod Threats While Still PreservingHow To Manage Iot And Byod Threats While Still Preserving
How To Manage Iot And Byod Threats While Still Preserving
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New... par Unisys Corporation
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Unisys Corporation2.1K vues
Firewalls And Infrastructure Security par Brooke Curtis
Firewalls And Infrastructure SecurityFirewalls And Infrastructure Security
Firewalls And Infrastructure Security
Brooke Curtis4 vues
Firewall buyers-guide par Andy Kwong
Firewall buyers-guideFirewall buyers-guide
Firewall buyers-guide
Andy Kwong79 vues
Toward Continuous Cybersecurity With Network Automation par Ken Flott
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
Ken Flott236 vues
Implementing An Automated Distributed Firewall par Gloria Young
Implementing An Automated Distributed FirewallImplementing An Automated Distributed Firewall
Implementing An Automated Distributed Firewall
Gloria Young1 vue
The new era of Cyber Security IEC62443 par WoMaster
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
WoMaster116 vues
Security Attacks And Solutions On Ubiquitous Computing Networks par Ahmad Sharifi
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
Ahmad Sharifi567 vues
A survey study of title security and privacy in mobile systems par Kavita Rastogi
A survey study of title security and privacy in mobile systemsA survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systems
Kavita Rastogi21 vues
Securing the digital economy par accenture
Securing the digital economySecuring the digital economy
Securing the digital economy
accenture671 vues
Global Security Law And Act Of Network Security par Dotha Keller
Global Security Law And Act Of Network SecurityGlobal Security Law And Act Of Network Security
Global Security Law And Act Of Network Security
Dotha Keller2 vues

Plus de Cisco Service Provider Mobility

Cisco quantum policy suite par
Cisco quantum policy suiteCisco quantum policy suite
Cisco quantum policy suiteCisco Service Provider Mobility
3.1K vues1 diapositive
Cisco Use Case: Location-Based Advertising par
Cisco Use Case: Location-Based AdvertisingCisco Use Case: Location-Based Advertising
Cisco Use Case: Location-Based AdvertisingCisco Service Provider Mobility
665 vues2 diapositives
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper) par
Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)Cisco Service Provider Mobility
1.8K vues20 diapositives
Unveiling the Monetization Opportunities for Carrier Wi-Fi par
Unveiling the Monetization Opportunities for Carrier Wi-FiUnveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiCisco Service Provider Mobility
3K vues16 diapositives
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer... par
Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer...Cisco Service Provider Mobility
800 vues8 diapositives
Defining the Business Case for Carrier-Grade Wi-Fi par
Defining the Business Case for Carrier-Grade Wi-FiDefining the Business Case for Carrier-Grade Wi-Fi
Defining the Business Case for Carrier-Grade Wi-FiCisco Service Provider Mobility
1.7K vues10 diapositives

Plus de Cisco Service Provider Mobility(20)

Dernier

Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... par
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...ShapeBlue
35 vues10 diapositives
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue par
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlueShapeBlue
50 vues23 diapositives
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue par
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueShapeBlue
96 vues20 diapositives
Network Source of Truth and Infrastructure as Code revisited par
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisitedNetwork Automation Forum
42 vues45 diapositives
NTGapps NTG LowCode Platform par
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform Mustafa Kuğu
141 vues30 diapositives
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... par
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...ShapeBlue
54 vues15 diapositives

Dernier(20)

Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... par ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue35 vues
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue par ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue50 vues
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue par ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue96 vues
NTGapps NTG LowCode Platform par Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu141 vues
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... par ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue54 vues
Why and How CloudStack at weSystems - Stephan Bienek - weSystems par ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue111 vues
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... par ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue88 vues
Business Analyst Series 2023 - Week 4 Session 7 par DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray1080 vues
Future of AR - Facebook Presentation par Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty46 vues
The Power of Heat Decarbonisation Plans in the Built Environment par IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE57 vues
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... par ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue42 vues
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... par Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 vues
Data Integrity for Banking and Financial Services par Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely56 vues
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue par ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue85 vues
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online par ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue102 vues
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... par The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... par ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue48 vues

Wireless Security on Context (disponible en español)

  • 1. Wireless Security on Context (disponible en español) Posted by Jorge Guzman Olaya on Apr 15, 2013 10:02:25 AM Why Security? It all started with an email account you accessed through your laptop, and now sometimes it is really hard to track all the digital profiles you own, plus we tend to pay little attention about accessing our digital assets in secure “wireless domains”, these factors combined form a scenario where security breaches can really hurt your digital self as it exists. It is clear that wireless communications has allowed us to adopt technology in a new way; we can use digital tools without being tied to a location, but the fact is that when you use technology everywhere you are exposing yourself to that “everywhere”. Popularity of wireless technology has shifted the usage of digital tools, your mobile device is amazingly powerful and networks are growing in complexity to cope with better services. All this power makes it difficult on the user to keep a track of the myriad of vulnerabilities and possible security exploits. As mentioned above we have in our hands a complex scenario; from one side we have an exponential growth and success of the wireless technology plus an increasing exposure of personal sensitive data to the digital world plus more physical spaces where we can use the technology that at the same time increases the number of personal and social contexts involved in our interactions with technology. On the other side we have a user that is still adapting to the rapid shift, possibly meaning that he is less conscious of how various factors come together to form the service, and it is how we find the first weak link in the chain; the lack of knowledge. Another factor is the fierce competition among industry stakeholders; they are working isolated pushing their own agendas, creating a non -cohesive framework of security for the wireless industry. On the contrary, threats and bad-intentioned people usually beneficiate upon gathered knowledge of collaborative open communities through the Internet. Taking Action to be More Secure From the user perspective, the main action must be to increase knowledge of the technology. For example, where to tune security configurations on the device or what information is being accessed on your device by the apps installed. It is also important to know the risks of using a non-secure WLAN network. In the final part of this blog I summarize various security tips you can find on the Internet and my personal recommendation. Application developers must commit more responsibly to security and inform the customer about their efforts on the matter, especially considering privacy of user sensitive information and its management; aspects like the length of conservation of user information even after the user has uninstalled the app or the permissions of sh aring personal
  • 2. information with third parties. Regarding the OS developers, it is expected that SW threats are addressed not only for the new releases of the product but also previous versions must be covered, and somehow frequency of security updates or patches must be increased. Other contributors to the industry take action: like national government’s initiative to extend EIR databases beyond countries frontiers to discourage device theft, or the effort countries are making, to oblige Internet giants to comply with international policies of user’s personal data handling. Academia presents innovative testing techniques against security breaches including fuzzy logic and genetic algorithms to simulate real life environments. New wireless applications like NFC and M2M also pose big questions and challenges to the industry that are being addressed; solutions like data encryption while being transferred or stored are being integrated into architectures and regulations, but the main path the industry must take is an improvement of the vision about security. Seurity threats cannot be avoided - they can only be managed and management must start with a plan to achieve a clear goal. A Framework to Achieve a More Secure Wireless Ecosystem If security threats can only be managed at the most, then, a base framework can be formulated to then build a plan or strategy to efficiently manage wireless security. CTIA has made a pretty good effort formulating such a framework in which the elements are:  Consumers  MNO  Device Manufacturers  Application Market Places  Operating System vendors  Chipset Manufacturers  Network Services Systems  Support SW Vendors  VAS Service Providers  Network Equipment Manufacturers Under its view CTIA proposes five cornerstones, around which security actions are executed and efforts should be built around: 1. Consumers: Responsible to protect their devices through better configuration and installing applications to secure their devices and their data, also keeping that SW Up-to-date., Ffinally the users must be aware of what they put in their devices and what they disclosed on their social profiles. 2. Devices: Comprises all the tools and methods that the industry and you as user, can use to minimize risks from security threats, given the high complexity of current devices and the great deal of information and activities we do with them. 3. Network based security policies: Includes all the tools that network providers should use as countermeasures against security threats;, examples like Policy Routing Traffic Analysis, Service provider SSL VPN, and MDM (Mobile Device Management) capabilities for BYOD environments. 4. Authentication control: Covers the authentication methods of the device with the network and those for the user to access the device, considering the multifactor method trend and the biometric approaches. 5. Cloud, Networks and Services: Comprehends the whole extend of the network, its functional entities and the services that each part provides both for regular customers and enterprise users. Also the different precautions and plans that the network has to have in place for Disaster recovery scenarios and security schemes that ensure privacy and integrity of stored user information.
  • 3. My Personal View on Wireless Security Image courtesy of Paola Buelvas (papolareina@yahoo.es) As mentioned above, a framework is only useful if there is some intention to develop something around that baseline, and in the introduction of this post I mentioned that industry main stakeholders tend to work isolated in a non - collaborative way, so I agree with some proposals about a push towards a multisource intelligence environment. In order to accomplish such an environment a Multisource Intelligent System could be the center tool to allow a collaborative effort of this kind. And so, the industry will have a transnational, multivendor, multi -technology tool, containing well documented security threats, problem workarounds, countermeasures and possible patches and solutions against known security breaches; all this following the best of the bread practices in IT management to organize, produce, control and store the flow of information that comes from solving engineering problems related to security in the wireless industry. This multi-collaborative industry repository will be accessible to all accredited members of the wireless industry and/or active contributors of security assets construction within the ecosystem. They will feed, maintain and update the content of this tool. Through the use of guidelines contained in international bodies of knowledge for IT handling, it will be possible to ensure the appropriate privacy for each industry stakeholder regarding industrial secret information, while still helping the development of solutions from already known threats and those foreseen by academia. The main objectives for an endeavor of this kind would be:  Provide the industry with a construct around which industry stakeholders can produce collaborative efforts to better countermeasure security threats.  To speed the production and divulgation processes of effective and more complete security countermeasures that better protect the customer and the industry, taking advantage of already documented knowledge, avoiding re -work and misinformation. Finally, I think that future technologies, like Context Aware networks can help to create a more secure environment for the user, allowing the execution of a counter action at the precise instant of technology usage and at the precise moment where a security threat becomes obvious, and without the need for the user to know or be prepared to all existent risks of his ongoing wireless transaction or service at a random space and time combination. All while at the same time optimizing the resources of the network devoted to protect the user against threats .; Ffor example, if the network detects that certain user is connecting through its own VPN client, a network base VPN solution flow can be allocated for another user. A Look into the Future of Wireless Security Fields for further study: BSN and BAN give security a totally new meaning, because this technology puts information concerning your own body into networks that today, cannot be considered totally secured;, so if this field of the industry is set for any success then security must be further developed and strengthen. Now MTC (Machine Type Communications) where human intervention is not required also needs an intelligent non supervised scheme that can ensure the basics of a secure communication network: Confidentiality, Integrity, Authentication, Non Repudiation, Access Control, Availability and Privacy.
  • 4. Security future concepts: like beneficial viruses, SW that in the same line of DRM remain inactive but when found in unauthorized digital environments then proceed to delete themselves and the information attached to them. Another concept is the Active sentinel SW that contrary to a regular antivirus this SW adapts to a certain extent to identify the threat even if is not specified in the database but that follows a suspicious activity pattern against predefine rules. New biometric authentication methods like brain wave authentication that is really unique and fast. Summarized Tips for the Wireless User As promised, here is a list of “do's” and “don'ts” for the user of wireless technology. Do: 1. Be informed and cautious while downloading apps, clicking links, providing information to online sites, setting passwords, and linking accounts and online profiles. Always consider installing security software on your wireless device. 2. Check the permissions of each installed app, and take the time to read the permissions you give to apps while installing them. 3. Be conscious when using Wi-Fi, check the type of security used, if security is absent from the access point or lower than WPA2, avoid logging in your sensitive accounts, or do banking transactions, without a VPN client solution, if you don’t have such solution, restrict your session to just browsing if at all. 4. Be proactive and organized with your passwords: set a strategy to generate, change and store them, there are plenty of passwords apps. 5. Check the details of your wireless bill to identify unauthorized usage or suspicious usage patterns from your devices. 6. Update your trusted applications and OS in all the devices you run digital transactions. 7. Report stolen or lost phones. 8. Use a VPN solution for unsecure Wi-Fi 9. Use complex passwords for important accounts. 10. Set security questions that really help you protect your data. 11. Use encryption of your sensitive data while stored on mobile devices, available apps can be found on your preferred SW provider online stores. Do Not: 1. Publish personal information or specific information about your wireless devices (phone number, IMEI, MAC address, etc.) 2. Root your phone or mobile device for personalization purposes. 3. Buy an stolen phone or buy it from a suspicious provider 4. Download apps from un-authorized stores different from the OS manufacturer store, like directly from the internet. 5. Be lazy, when setting passwords, logging into sensitive accounts, exchanging banking info, and protecting mobile devices, always use what you consider is more secure for your digital asset, even if it takes more time. 6. Have one factor authentication for sensitive accounts or digital profiles. 7. Have the same password across multiple online or digital profiles. 8. Thrust blindly on third parties to secure your digital data, take your own measures, backup regularly, encrypt your data, do not use unsecure access points can be just some examples. 9. Link social accounts all together if unnecessary, you’ll be providing a great deal of information without noticing it. For more, follow me on Twitter @jomaguo Read this blog post in Spanish. For all blog posts written by Jorge Guzman Olaya, please visit his Community Profile. For more discussions and topics around SP Mobility, please visit our Mobility Community:http://cisco.com/go/mobilitycommunity