We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJamar Benn
Modified about 1 year ago
Cyberspace - A Global Battlespace? Joel Ebrahimi Solutions Architect Bivio Networks, Inc.
©2010 Bivio Networks, Inc. A Hacker’s Opportunity is Target Rich! Enterprise –Personal –Credit Card Government –Military secrets –Nuclear Information –Medical Records –Criminal Records –Classified Secrets and Information –Control of Physical Infrastructure Power Electrical Water 2 Joe Hacker
©2010 Bivio Networks, Inc. Exploitation Evolution While we look at the evolution trend, it should be noted that the less severe exploits have not gone away. They still exist today and have even increased in numbers. The problem is that we also have to deal with exploits that now affect our national security. Experimentation / Notoriety Hacktivism / Defacements Criminal Enterprise Espionage / Cyber Terrorism
©2010 Bivio Networks, Inc. Hacking Hotspots and Trends CHINA Targeting Japan, U.S., Taiwan and perceived allies of those countries; Falun Gong targeted also INDIA-PAKISTAN Worldwide targets, Kashmir-related and Muslim-related defacements MIDDLE EAST Palestinian hackers target Israeli websites; some pro-Israel activity WESTERN EUROPE Cyber-activists with anti-global/anti- capitalism goals; some malicious code BRAZIL Multiple hacker groups, many mercenary; random targets EASTERN EUROPE/RUSSIA Malicious code development; fraud and financial hacking U.S. Multiple hacker/cyber- activist/hacktivist groups; random targets
©2010 Bivio Networks, Inc. Is the threat real? 5
©2010 Bivio Networks, Inc. Its Real and Happening Now! Stuxnet Cyber Espionage DDOS attacks in Estonia Attacks on Booz Allen Hamilton Breach of defense contractor computers that let hackers get at information on the Joint Strike Fighter Power grid compromised Repeated attacks on.gov websites Real growing threat of cyber terrorism 6
©2010 Bivio Networks, Inc. The Threats Malware –Worms –Trojans –Rootkits –Spyware Remote of local exploitation Botnets
©2010 Bivio Networks, Inc. A Transforming Network Explosion in usage, applications, devices, protocols Basic networking problems remain –Security –Information assurance –Cyber defense –Awareness –Control Network role transition from connectivity to policy Key Enabling Technology: Deep Packet Inspection
©2010 Bivio Networks, Inc. Deep Packet Inspection (DPI) Set of technologies enabling fine-grained processing of network traffic Common analogy: processing regular mail based on letter contents vs. address Not a solution or an application! L2L3L4L5 – L7 Ethernet Internet Protocol (IP) Transport Layer (TCP/UDP) , IM Web File Transfer Peer-to-Peer (P2P) Viruses Intrusions Worms
©2010 Bivio Networks, Inc. L3/4 analysis clearly not granular enough –Source/Destination often irrelevant Most information is in the payload –Deeply embedded –Context dependent –Dynamic Tunneling makes outer protocols/headers insufficient Correlation between flows and payload often crucial Threats are real-time and dynamic; response can’t be –DPI is real-time networking analog to off-line analysis –Dramatically shortens threat identification and response Why DPI?
©2010 Bivio Networks, Inc. The Right Technology Scalability: variable throughput, computation Performance: –Computational: full packet inspection –Network: wire-speed Flexibility: software is king Customization: each mission different Adaptability: inherent in space Active/Passive: monitoring and enforcement Multi-function: parallel tasks Standardization: Avoid proprietary environments Rapid deployment
©2010 Bivio Networks, Inc. Protecting The Future Infrastructure –Focus on high-compute/high-throughput System design Semiconductors –Keep pace with networking advances 40Gb/s 100Gb/s –Storage integration Data Retention Post-processing Applications –Increased sophistication of protocol analysis –Increased cross-flow analysis –Information sharing between applications –Dynamic threat response
©2010 Bivio Networks, Inc. Summary Threats are already here Cyber Terrorism is real The network is changing and growing DPI technology underlies future networking Core technology for National Security requirements Challenges addressed in rapidly advancing market Significant innovation into the future
©2010 Bivio Networks, Inc. Not just a presenter, this is what I do Special purpose networking devices 10Gb/s+ High compute capacity Throughput and compute scaling Linux development environment Multi-application support Joel Ebrahimi Bivio Networks, Inc Thank You!
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written.
Norman SecureSurf Protect your users when surfing the Internet.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
What is FORENSICS? Why do we need Network Forensics? Why it is so important?
CYBER CRIME AND SECURITY TRENDS Presented By Infotrans Caribbean Ryan Ranes.
Trust, Safety, & Reliability Part 2 MALICE. Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
October 28, 2015 Cyber Security Awareness Update.
Monitoring for network security and management Cyber Solutions Inc.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem Overall size of cybercrime unclear; amount of losses.
© 2008 Bivio Networks, Inc. All rights reserved. Specifications subject to change without notice. Evolution & Requirements for DPI in Network Security.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
CS 3830 Day 5 Introduction 1-1. Announcements Program 1 due today at 3pm Program 2 posted by tonight (due next Friday at 3pm) Quiz 1 at the end.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
Association of Communications Engineers Corralling the Broadband Stampede May 7 – 9, 2012 Fort Worth, Texas.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Cyber-Warfare: The Future is Now!. BLUF - Bottom Line Up Front Cyber-Warfare - 5Ws Cyber-Threats and Targets Economic Impact and Cyber-Law Questions.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
CHAPTER 8 Securing Information Systems. System Vulnerability Security (policies, procedures, technical measures) and controls (methods, policies, procedures)
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Hurdles in implementation of cyber security in India.
Security Mindset Lesson Introduction ●Why is cyber security important? ●How do we understand cyber security? ●What needs to be done to address cyber security?
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Safe’n’Sec IT security solutions for enterprises of any size.
Bharat Book Bureau Your One Stop Shop For Business Information Market Research Report The report on Global Video Surveillance and VSaaS Market.
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Information Systems Week 7 Securing Information Systems.
SECURITY AND INFORMATION SYSTEMS THE EVOLUTION OF SECURITY SYSTEMS Created By: Jamere Hill Instructor: Kyhia Bostic Section University of Houston.
Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 5 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Microsoft Internet Security and Acceleration (ISA) Server 2004 Technical Overview Jirat Boomuang Technology Specialist Smith Mangmeetakun Technology Specialist.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Internet Protocol Security An Overview of IPSec. Outline: What Security Problem? Understanding TCP/IP. Security at What Level? IP Security.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Randy Beavers CS 585 – Computer Security February 19, 2009.
Keeping your network devices secure Despite constituting the lifeline of every corporate IT infrastructure, network devices happen to be the most notoriously.
Cybersecurity Test Review Introduction to Digital Technology.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
© 2017 SlidePlayer.com Inc. All rights reserved.