SlideShare una empresa de Scribd logo
1 de 35
Descargar para leer sin conexión
Summary of
Network Security Conference
(#NetworkSecurity)
May 2013
The only secure mobile is one that is switched
off with battery removed - Charles Brookson,
GSMA/ETSI at #NetworkSecurity
 Professor Ed Candy, Technology Strategist, 3 Group: Diversity
in devices is great. It allows no collective threats to be posed
due to their diversity of make models, OS’s, apps, etc.
Firewalls in the networks are good too but too many of them
can slow the network down. In the beginning when ‘3’ UK
rolled out 3G, 14 seconds were being lost due to them.
 Charles Brookson mentioned that he turns off 3G and uses
GSM/GPRS to save battery life
 Apps should store data on the cloud and not the device so if
the device is lost or compromised then the user data is not
lost to the third parties
 Users should be made aware of the background functions and
services on the device and also the threat/safety level of
these.
Interesting comments, questions, etc. - #1
 The operators can provide more security but it costs them to
do this. They have to work out a way to pass this on to the
users.
 Very little malware on google play. Risk is v.low. Android
malware hits countries where 3rd party appstores are the
norm
 Consumer education is key. Good to not be complacent about
malware, generally unnecessary to have mob antivirus.
 Mobile network should not be the only technology for critical
access. There should be other means as well
 A5/3 (security algorithm for GSM/GPRS) was standardised in
2001 and is more secure than the previous algorithms but
was not available widely till quite late because it was not IOT
tested and mandated by operators.
Interesting comments, questions, etc. - #2
Day 1
Day 1 began with a Panel Discussion moderated by Charles Brookson from GSMA with
some of the points I have already mentioned earlier
David Rogers from Copper Horse spoke on Incident Management for Mobile Malware and
on Responsible Disclosure. He also distributed a leaflet prepared for the UK police
regarding phone security. More details on that here.
Eric Gauthier, Head of Technical Fraud and Revenue Assurance, Orange gave an
Introduction on LTE and how Security was handled all the way from 0G (pre-cellular) to
4G/LTE.
Talal Faroug, Quality Assurance Manager, MTN, SUDAN gave a talk on Understanding the
Business Case for Network Security. His main focus was on SIM Box Fraud.
Telecom Concepts Blog has a nice write-up on this topic here -
http://telecomconcepts.wordpress.com/2010/02/01/simbox-fraud-detection-and-billing/
Another useful writeup on this topic here.
See Also GSMA press release: Raids on SIM box/GSM gateway fraudsters save mobile
operators millions
Feride Cetin, Group Strategy & Innovation Security & Intelligence, Swisscom focussed her
presentation on some of the initiatives taken by Swisscom on Apps Security and Rating
There were some good examples on how developers manage to ignore basic security
guidelines while making excellent apps. The result is they have to go back and fix the issues
at a much later stage and at the same time get a lots of negative publicity that can be
sometimes harmful for the business.
5 Rating Criteria to understand how apps behave; Permission, Privacy, Data Traffic, Data
Storage and Man in the Middle
Day 2
David Rogers from Copper Horse Solutions Limited chaired the second day proceedings. I
think his main message is as shown in the slide above and is self explanatory.
Ps: In case you are not from the UK, the above picture highlights beef (horsemeat) scandal
Dr. Christoph Peylo, VP Deutsche Telekom Innovation Laboratories started the day with an
interesting presentation on "Remote Control and Device Security: How Cyber-Attacks Can
Impact M2M"
The talk was so interesting that I should put up the slides or more detailed presentation on
this topic sometime later
Christoph showing http://www.sicherheitstacho.eu - Real time cyber-attacks.
Gert Pauwels, M2M Marketing Director, Mobistar spoke on the operator Orange’s position
on M2M. The key takeaway was the GMA Certification Program as shown in the slide
above.
Carlos Olea, Network Security Manager, Telefonica International focussed on DDoS
(distributed denial-of-service) and how Telefonica handled the Spamhaus and other Ddos
attacks and what they have learnt from this.
Adrian Drury, Lead analyst, Ovum spoke about RTB. I don’t remember him mentioning what
RTB is but my understanding it stands for Real Time Bidding -
http://en.wikipedia.org/wiki/Real-time_bidding
Raj Samani, Vice President, EMEA CTO, McAfee spoke about how connected devices have
changed our lifestle and the security issues that we are facing in this connected world.
Raj had some very interesting bits that he mentioned but the slides let him
a bit down. Here are some that were mentioned on twitter during the
event:
• In Germany, the smart meters polling interval was reduced to 2 sec and
it can tell the name of movie being watched. This is because each movie
has its own unique energy consumption pattern.
• Privacy a big issue for smart meters. Easy to analyse usage; what is being
used and when.
• In USA in some new buildings, connected devices are even being put in
the bricks to track humidity, etc.
• Everyone has a price when it comes to giving up private data
• A powergrid in US said that they face 10K cyber attacks per month as per
@Raj_Samani
Jon Howes, Technology Director, Beecham Research spoke on "M2M Solution Security“. A
whitepaper on this topic is also available on their website here.
Reinder Wolthuis, Project Manager Information Security, TNO spoke on "M2M Security"
and gave us the results of the etis M2M security survey
Personally I am a bit surprised that M2M devices would move to UMTS. The biggest issue
for M2M devices using UMTS is the battery power consumption. Its better to stay on
GSM/GPRS is the amount of data transfer is low or move to LTE if the amount of data
transfer required is high.
“Dutch research found that network operators worry about physical tampering but don't
do anything about it”
The final talk of the day was by Ravishankar Borgaonkar, Researcher, Deutsche Telekom on
the topic of “Small Cells in Hostile Environment“. I have covered earlier presentations by
Ravi on the blog here and here. One of the issue highlighted above and by others as well is
that a security feature may be asked by the operator but may not be supplied by vendor.
Hope you've enjoyed
the summary
Prepared by:
Zahid Ghadialy
eXplanoTech & 3G4G
Blog
Additional Reading
• Small Cells and the City – My presentation from Small
Cells Global Congress 2012
• Rel-11/12 3GPP Security Update – 3GPP
• Present and future Standards for mobile internet and
smart phone information security - ETSI
• Evolution of 3GPP Security
• Femto Hacking in UMTS and LTE

Más contenido relacionado

La actualidad más candente

Green Future Networks: Network Energy Efficiency
Green Future Networks: Network Energy EfficiencyGreen Future Networks: Network Energy Efficiency
Green Future Networks: Network Energy EfficiencyIPLOOK Networks
 
5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement
5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement
5G’s Impact on Telecom Infrastructure 2019 report by Yole DéveloppementYole Developpement
 
ZTE Communication - March 2015
ZTE Communication - March 2015ZTE Communication - March 2015
ZTE Communication - March 2015Sitha Sok
 
Jisc's Vision for 5G - Digital Catapult Future of 5G Summit
Jisc's Vision for 5G - Digital Catapult Future of 5G SummitJisc's Vision for 5G - Digital Catapult Future of 5G Summit
Jisc's Vision for 5G - Digital Catapult Future of 5G SummitMartin Hamilton
 
Performance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless NetworksPerformance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless NetworksUniversity of Piraeus
 
Vision only 5G AnyBee (Anycasting Beyond the Edge)
Vision only 5G AnyBee (Anycasting Beyond the Edge)Vision only 5G AnyBee (Anycasting Beyond the Edge)
Vision only 5G AnyBee (Anycasting Beyond the Edge)Thierry Lestable
 
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-20215G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021IPLOOK Networks
 
Reporte a cerca de 6G
Reporte a cerca de 6GReporte a cerca de 6G
Reporte a cerca de 6GMiguel Mora
 
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...Antenna Manufacturer Coco
 
Private 5G Networks and Vendor Diversification
Private 5G Networks and Vendor DiversificationPrivate 5G Networks and Vendor Diversification
Private 5G Networks and Vendor DiversificationDean Bubley
 
An Introduction to IoT: Connectivity & Case Studies
An Introduction to IoT: Connectivity & Case StudiesAn Introduction to IoT: Connectivity & Case Studies
An Introduction to IoT: Connectivity & Case Studies3G4G
 
Aviation 5G/5G in Aviation
Aviation 5G/5G in AviationAviation 5G/5G in Aviation
Aviation 5G/5G in AviationAssem mousa
 
5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networking5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networkingvenkada ramanujam
 
Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129Mohammad Khatib
 

La actualidad más candente (20)

Green Future Networks: Network Energy Efficiency
Green Future Networks: Network Energy EfficiencyGreen Future Networks: Network Energy Efficiency
Green Future Networks: Network Energy Efficiency
 
5G Technology
5G Technology5G Technology
5G Technology
 
5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement
5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement
5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement
 
ZTE Communication - March 2015
ZTE Communication - March 2015ZTE Communication - March 2015
ZTE Communication - March 2015
 
Tcl telecom expertise v 2 00 vs 220812
Tcl telecom expertise v 2 00 vs 220812Tcl telecom expertise v 2 00 vs 220812
Tcl telecom expertise v 2 00 vs 220812
 
Jisc's Vision for 5G - Digital Catapult Future of 5G Summit
Jisc's Vision for 5G - Digital Catapult Future of 5G SummitJisc's Vision for 5G - Digital Catapult Future of 5G Summit
Jisc's Vision for 5G - Digital Catapult Future of 5G Summit
 
Performance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless NetworksPerformance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless Networks
 
Private 5G Seminar Brochure
Private 5G Seminar BrochurePrivate 5G Seminar Brochure
Private 5G Seminar Brochure
 
Vision only 5G AnyBee (Anycasting Beyond the Edge)
Vision only 5G AnyBee (Anycasting Beyond the Edge)Vision only 5G AnyBee (Anycasting Beyond the Edge)
Vision only 5G AnyBee (Anycasting Beyond the Edge)
 
NB-IoT and 5G
NB-IoT and 5GNB-IoT and 5G
NB-IoT and 5G
 
5G technology
5G technology5G technology
5G technology
 
Economics of 4G Introduction in Growth Markets
Economics of 4G Introduction in Growth MarketsEconomics of 4G Introduction in Growth Markets
Economics of 4G Introduction in Growth Markets
 
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-20215G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
 
Reporte a cerca de 6G
Reporte a cerca de 6GReporte a cerca de 6G
Reporte a cerca de 6G
 
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
 
Private 5G Networks and Vendor Diversification
Private 5G Networks and Vendor DiversificationPrivate 5G Networks and Vendor Diversification
Private 5G Networks and Vendor Diversification
 
An Introduction to IoT: Connectivity & Case Studies
An Introduction to IoT: Connectivity & Case StudiesAn Introduction to IoT: Connectivity & Case Studies
An Introduction to IoT: Connectivity & Case Studies
 
Aviation 5G/5G in Aviation
Aviation 5G/5G in AviationAviation 5G/5G in Aviation
Aviation 5G/5G in Aviation
 
5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networking5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networking
 
Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129
 

Similar a Summary of Network Security Conference (#NetworkSecurity) May 2013

J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseDroidcon Berlin
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfSecurityGen1
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenSecurityGen1
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceSecurityGen1
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksWilliam Chipman
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communicationardhita banu adji
 
Public safety is reshaped with 5G
Public safety is reshaped with 5GPublic safety is reshaped with 5G
Public safety is reshaped with 5GaNumak & Company
 
Security model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentationSecurity model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentationRotract CLUB of BSAU
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417IJRAT
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-maindsfsadfas
 
M2M Journal - 22nd edition
M2M Journal - 22nd editionM2M Journal - 22nd edition
M2M Journal - 22nd editionMartin Gutberlet
 
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Security Issues and challenges with Wireless M2Mutilising Cloud infrastructureSecurity Issues and challenges with Wireless M2Mutilising Cloud infrastructure
Security Issues and challenges with Wireless M2M utilising Cloud infrastructureStuart Bennett
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trendsKen Huang
 
The 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problemThe 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problemSherry Jones
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possibleIJNSA Journal
 

Similar a Summary of Network Security Conference (#NetworkSecurity) May 2013 (20)

J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdf
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGen
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
 
B010331019
B010331019B010331019
B010331019
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communication
 
Public safety is reshaped with 5G
Public safety is reshaped with 5GPublic safety is reshaped with 5G
Public safety is reshaped with 5G
 
Security model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentationSecurity model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentation
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main
 
M2M Journal - 22nd edition
M2M Journal - 22nd editionM2M Journal - 22nd edition
M2M Journal - 22nd edition
 
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Security Issues and challenges with Wireless M2Mutilising Cloud infrastructureSecurity Issues and challenges with Wireless M2Mutilising Cloud infrastructure
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
 
Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trends
 
The 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problemThe 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problem
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possible
 

Más de 3G4G

TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...
TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...
TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...3G4G
 
Misc: What are No Mobile Coverage Zones called?
Misc: What are No Mobile Coverage Zones called?Misc: What are No Mobile Coverage Zones called?
Misc: What are No Mobile Coverage Zones called?3G4G
 
TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…
TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…
TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…3G4G
 
TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…
TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…
TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…3G4G
 
Beginners: An Quick Introduction to 3GPP
Beginners: An Quick Introduction to 3GPPBeginners: An Quick Introduction to 3GPP
Beginners: An Quick Introduction to 3GPP3G4G
 
Misc: Mobile Technology and Healthcare
Misc: Mobile Technology and HealthcareMisc: Mobile Technology and Healthcare
Misc: Mobile Technology and Healthcare3G4G
 
Should we stop the shutdown of 2G/3G to save lives??
Should we stop the shutdown of 2G/3G to save lives??Should we stop the shutdown of 2G/3G to save lives??
Should we stop the shutdown of 2G/3G to save lives??3G4G
 
Opinion – 5G Reality Check: Speeds
Opinion – 5G Reality Check: SpeedsOpinion – 5G Reality Check: Speeds
Opinion – 5G Reality Check: Speeds3G4G
 
Technology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdfTechnology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdf3G4G
 
6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies3G4G
 
3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)
3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)
3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)3G4G
 
3GPP SON Series: Energy Savings (ES)
3GPP SON Series: Energy Savings (ES)3GPP SON Series: Energy Savings (ES)
3GPP SON Series: Energy Savings (ES)3G4G
 
3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)
3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)
3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)3G4G
 
3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)3G4G
 
3GPP SON Series: Coverage and Capacity Optimization (CCO)
3GPP SON Series: Coverage and Capacity Optimization (CCO)3GPP SON Series: Coverage and Capacity Optimization (CCO)
3GPP SON Series: Coverage and Capacity Optimization (CCO)3G4G
 
3GPP SON Series: SON in 3GPP Release-10 – Self-healing
3GPP SON Series: SON in 3GPP Release-10 – Self-healing3GPP SON Series: SON in 3GPP Release-10 – Self-healing
3GPP SON Series: SON in 3GPP Release-10 – Self-healing3G4G
 
3GPP SON Series: RACH Optimization
3GPP SON Series: RACH Optimization3GPP SON Series: RACH Optimization
3GPP SON Series: RACH Optimization3G4G
 
3GPP SON Series: Mobility Robustness Optimization (MRO)
3GPP SON Series: Mobility Robustness Optimization (MRO)3GPP SON Series: Mobility Robustness Optimization (MRO)
3GPP SON Series: Mobility Robustness Optimization (MRO)3G4G
 
3GPP SON Series: SON in 3GPP Release-9 – Self-optimization
3GPP SON Series: SON in 3GPP Release-9 – Self-optimization3GPP SON Series: SON in 3GPP Release-9 – Self-optimization
3GPP SON Series: SON in 3GPP Release-9 – Self-optimization3G4G
 
Beginners: Energy Consumption in Mobile Networks - RAN Power Saving Schemes
Beginners: Energy Consumption in Mobile Networks - RAN Power Saving SchemesBeginners: Energy Consumption in Mobile Networks - RAN Power Saving Schemes
Beginners: Energy Consumption in Mobile Networks - RAN Power Saving Schemes3G4G
 

Más de 3G4G (20)

TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...
TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...
TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...
 
Misc: What are No Mobile Coverage Zones called?
Misc: What are No Mobile Coverage Zones called?Misc: What are No Mobile Coverage Zones called?
Misc: What are No Mobile Coverage Zones called?
 
TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…
TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…
TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…
 
TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…
TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…
TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…
 
Beginners: An Quick Introduction to 3GPP
Beginners: An Quick Introduction to 3GPPBeginners: An Quick Introduction to 3GPP
Beginners: An Quick Introduction to 3GPP
 
Misc: Mobile Technology and Healthcare
Misc: Mobile Technology and HealthcareMisc: Mobile Technology and Healthcare
Misc: Mobile Technology and Healthcare
 
Should we stop the shutdown of 2G/3G to save lives??
Should we stop the shutdown of 2G/3G to save lives??Should we stop the shutdown of 2G/3G to save lives??
Should we stop the shutdown of 2G/3G to save lives??
 
Opinion – 5G Reality Check: Speeds
Opinion – 5G Reality Check: SpeedsOpinion – 5G Reality Check: Speeds
Opinion – 5G Reality Check: Speeds
 
Technology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdfTechnology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdf
 
6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies
 
3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)
3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)
3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)
 
3GPP SON Series: Energy Savings (ES)
3GPP SON Series: Energy Savings (ES)3GPP SON Series: Energy Savings (ES)
3GPP SON Series: Energy Savings (ES)
 
3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)
3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)
3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)
 
3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)
 
3GPP SON Series: Coverage and Capacity Optimization (CCO)
3GPP SON Series: Coverage and Capacity Optimization (CCO)3GPP SON Series: Coverage and Capacity Optimization (CCO)
3GPP SON Series: Coverage and Capacity Optimization (CCO)
 
3GPP SON Series: SON in 3GPP Release-10 – Self-healing
3GPP SON Series: SON in 3GPP Release-10 – Self-healing3GPP SON Series: SON in 3GPP Release-10 – Self-healing
3GPP SON Series: SON in 3GPP Release-10 – Self-healing
 
3GPP SON Series: RACH Optimization
3GPP SON Series: RACH Optimization3GPP SON Series: RACH Optimization
3GPP SON Series: RACH Optimization
 
3GPP SON Series: Mobility Robustness Optimization (MRO)
3GPP SON Series: Mobility Robustness Optimization (MRO)3GPP SON Series: Mobility Robustness Optimization (MRO)
3GPP SON Series: Mobility Robustness Optimization (MRO)
 
3GPP SON Series: SON in 3GPP Release-9 – Self-optimization
3GPP SON Series: SON in 3GPP Release-9 – Self-optimization3GPP SON Series: SON in 3GPP Release-9 – Self-optimization
3GPP SON Series: SON in 3GPP Release-9 – Self-optimization
 
Beginners: Energy Consumption in Mobile Networks - RAN Power Saving Schemes
Beginners: Energy Consumption in Mobile Networks - RAN Power Saving SchemesBeginners: Energy Consumption in Mobile Networks - RAN Power Saving Schemes
Beginners: Energy Consumption in Mobile Networks - RAN Power Saving Schemes
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Summary of Network Security Conference (#NetworkSecurity) May 2013

  • 1. Summary of Network Security Conference (#NetworkSecurity) May 2013
  • 2. The only secure mobile is one that is switched off with battery removed - Charles Brookson, GSMA/ETSI at #NetworkSecurity
  • 3.  Professor Ed Candy, Technology Strategist, 3 Group: Diversity in devices is great. It allows no collective threats to be posed due to their diversity of make models, OS’s, apps, etc. Firewalls in the networks are good too but too many of them can slow the network down. In the beginning when ‘3’ UK rolled out 3G, 14 seconds were being lost due to them.  Charles Brookson mentioned that he turns off 3G and uses GSM/GPRS to save battery life  Apps should store data on the cloud and not the device so if the device is lost or compromised then the user data is not lost to the third parties  Users should be made aware of the background functions and services on the device and also the threat/safety level of these. Interesting comments, questions, etc. - #1
  • 4.  The operators can provide more security but it costs them to do this. They have to work out a way to pass this on to the users.  Very little malware on google play. Risk is v.low. Android malware hits countries where 3rd party appstores are the norm  Consumer education is key. Good to not be complacent about malware, generally unnecessary to have mob antivirus.  Mobile network should not be the only technology for critical access. There should be other means as well  A5/3 (security algorithm for GSM/GPRS) was standardised in 2001 and is more secure than the previous algorithms but was not available widely till quite late because it was not IOT tested and mandated by operators. Interesting comments, questions, etc. - #2
  • 6. Day 1 began with a Panel Discussion moderated by Charles Brookson from GSMA with some of the points I have already mentioned earlier
  • 7. David Rogers from Copper Horse spoke on Incident Management for Mobile Malware and on Responsible Disclosure. He also distributed a leaflet prepared for the UK police regarding phone security. More details on that here.
  • 8. Eric Gauthier, Head of Technical Fraud and Revenue Assurance, Orange gave an Introduction on LTE and how Security was handled all the way from 0G (pre-cellular) to 4G/LTE.
  • 9. Talal Faroug, Quality Assurance Manager, MTN, SUDAN gave a talk on Understanding the Business Case for Network Security. His main focus was on SIM Box Fraud.
  • 10. Telecom Concepts Blog has a nice write-up on this topic here - http://telecomconcepts.wordpress.com/2010/02/01/simbox-fraud-detection-and-billing/ Another useful writeup on this topic here.
  • 11. See Also GSMA press release: Raids on SIM box/GSM gateway fraudsters save mobile operators millions
  • 12. Feride Cetin, Group Strategy & Innovation Security & Intelligence, Swisscom focussed her presentation on some of the initiatives taken by Swisscom on Apps Security and Rating
  • 13. There were some good examples on how developers manage to ignore basic security guidelines while making excellent apps. The result is they have to go back and fix the issues at a much later stage and at the same time get a lots of negative publicity that can be sometimes harmful for the business.
  • 14. 5 Rating Criteria to understand how apps behave; Permission, Privacy, Data Traffic, Data Storage and Man in the Middle
  • 15. Day 2
  • 16. David Rogers from Copper Horse Solutions Limited chaired the second day proceedings. I think his main message is as shown in the slide above and is self explanatory. Ps: In case you are not from the UK, the above picture highlights beef (horsemeat) scandal
  • 17. Dr. Christoph Peylo, VP Deutsche Telekom Innovation Laboratories started the day with an interesting presentation on "Remote Control and Device Security: How Cyber-Attacks Can Impact M2M"
  • 18. The talk was so interesting that I should put up the slides or more detailed presentation on this topic sometime later
  • 20. Gert Pauwels, M2M Marketing Director, Mobistar spoke on the operator Orange’s position on M2M. The key takeaway was the GMA Certification Program as shown in the slide above.
  • 21. Carlos Olea, Network Security Manager, Telefonica International focussed on DDoS (distributed denial-of-service) and how Telefonica handled the Spamhaus and other Ddos attacks and what they have learnt from this.
  • 22.
  • 23. Adrian Drury, Lead analyst, Ovum spoke about RTB. I don’t remember him mentioning what RTB is but my understanding it stands for Real Time Bidding - http://en.wikipedia.org/wiki/Real-time_bidding
  • 24.
  • 25. Raj Samani, Vice President, EMEA CTO, McAfee spoke about how connected devices have changed our lifestle and the security issues that we are facing in this connected world.
  • 26. Raj had some very interesting bits that he mentioned but the slides let him a bit down. Here are some that were mentioned on twitter during the event: • In Germany, the smart meters polling interval was reduced to 2 sec and it can tell the name of movie being watched. This is because each movie has its own unique energy consumption pattern. • Privacy a big issue for smart meters. Easy to analyse usage; what is being used and when. • In USA in some new buildings, connected devices are even being put in the bricks to track humidity, etc. • Everyone has a price when it comes to giving up private data • A powergrid in US said that they face 10K cyber attacks per month as per @Raj_Samani
  • 27. Jon Howes, Technology Director, Beecham Research spoke on "M2M Solution Security“. A whitepaper on this topic is also available on their website here.
  • 28. Reinder Wolthuis, Project Manager Information Security, TNO spoke on "M2M Security" and gave us the results of the etis M2M security survey
  • 29. Personally I am a bit surprised that M2M devices would move to UMTS. The biggest issue for M2M devices using UMTS is the battery power consumption. Its better to stay on GSM/GPRS is the amount of data transfer is low or move to LTE if the amount of data transfer required is high.
  • 30. “Dutch research found that network operators worry about physical tampering but don't do anything about it”
  • 31.
  • 32.
  • 33. The final talk of the day was by Ravishankar Borgaonkar, Researcher, Deutsche Telekom on the topic of “Small Cells in Hostile Environment“. I have covered earlier presentations by Ravi on the blog here and here. One of the issue highlighted above and by others as well is that a security feature may be asked by the operator but may not be supplied by vendor.
  • 34. Hope you've enjoyed the summary Prepared by: Zahid Ghadialy eXplanoTech & 3G4G Blog
  • 35. Additional Reading • Small Cells and the City – My presentation from Small Cells Global Congress 2012 • Rel-11/12 3GPP Security Update – 3GPP • Present and future Standards for mobile internet and smart phone information security - ETSI • Evolution of 3GPP Security • Femto Hacking in UMTS and LTE