Presentation on theme: "Telecom Network Security: Implications, Telecom Fraud, and Revenue-Assurance Security First 2007 Riaz Asher Siddiqui President, Operations Pakistan & Vice."— Presentation transcript:
Telecom Network Security: Implications, Telecom Fraud, and Revenue-Assurance Security First 2007 Riaz Asher Siddiqui President, Operations Pakistan & Vice President, South Asia Region UNITING THE OLD WORLD… …WITH THE NEW UNITING THE OLD WORLD… …WITH THE NEW
Presentation Agenda Network Security –What is it? –What constitutes it? –Things to consider –What’s involved? Focus Areas Telecom Fraud Teralight’s Solutions
What is Network Security? Protection of networks and their services from unauthorized modification, destruction, or information disclosure Assurance that there no harmful elements exist, which can compromise security or data integrity It is not a technology. It is an approach; a continually evolving process
What Constitutes Network Security? Controlling access to the network Safe-guarding a network through the implementation of a set of policies Providing authorized network access to individuals, businesses, applications, firewalls, and devices Tracking access to the network and constantly monitoring the changes Understanding aspects of information security: –Being promptly aware of Security Attacks –Developing Security Mechanisms –Creating enhancements to security levels and to counter security threats by implementing Security Services
Telecom Network Security: Things to Consider A secure telecommunications infrastructure is crucial to a society’s needs –It dictates how we interact with businesses, with government, with each other Economies are becoming more dependent on a secure telecommunications infrastructure Administrations must take a more active role in security standards development
Telecom Network Security: Things to Consider An Evolving need to make connectivity resources available to customers effectively and securely Mobile workforce is expanding and the challenge of making the network available whenever and wherever is magnifying The convergence of voice, video, and data over a single network is materializing, overcoming the hassle and expense of running multiple networks
Compromises on Network Security: Huge losses to government institutions worldwide Developing countries expend considerable resources to police illegal operators Local hi-tech enterprises get repressed; domestic deployment of useful technologies is constrained Threat to national security Revenue margins shift from local operators to overseas operators Utter disregard for a country’s licensing status Telecom Network Security: Things to Consider
Types of Network Security Threats Unstructured Threats: unintentional; a result of curious downloading Structured Threats: purposeful hacking of or attempted penetration into the network External Threats: from businesses or individuals who have found a hole in the network, or have found a way to manipulate it Internal Threats: the most serious of all threats, given its very nature, and internal network access
Factors for Ensuring Network Security Data security Infrastructure protection Investment protection and revenue-generation Effective Regulatory initiatives and manageable strategy designs (!) Monitoring and warding of illegal network manipulation or utilization (!)
Network Security: Special Focus Areas Effective regulatory initiatives and manageable strategy designs –Regulatory campaigns to educate –Highlighting the importance of this issue –Encouraging operator cooperation –Devising policies –Enforcing implementation of devised policies, especially in compliance with international standards Network protection through available solutions –Network security auditing solution (Teralight) –Telecom fraud mitigation solution (Teralight)
Network Security Threats: Telecom Fraud Telecommunication fraud is the theft of telecommunication service (telephones, cell phones, computers etc.) or the use of telecommunication service to commit other forms of fraud. Telecommunications fraud costs carriers billions of revenue dollars annually. Telecommunications fraud is one of the largest causes of revenue loss for service providers. Approximately US$35 to 40 billion is lost due to telecom fraud (Source: Communications Fraud Control Association)
Telecom Fraud – Bypass Fraud Wireless (GSM, AMPS, CDMA, etc) GSM gateways Wire-line network bypass – use of the Internet greatly reduced cost barriers Alternate access methods – VSAT satellite systems Wireless border “bleed over” – cross boundary wireless access into other network area
Telecom Fraud – Effects Huge losses to government institutions worldwide Developing countries expend considerable resources to police illegal operators Local hi-tech enterprises get repressed; domestic deployment of useful technologies is constrained Threat to national security Revenue margins shift from local operators to overseas operators Utter disregard for a country’s licensing status Example: In India, the grey market (fraud) has snatched away almost 50% of the call traffic, which should have been legitimately routed (this translates to nearly 3.5 billion minutes and between US$ million monthly loss)
Bypass Fraud – Signs of Presence Frequent wrong-number phone calls Difficulty in receiving incoming calls Unusual calls appearing on suspicious phone bills. The number of outgoing/incoming calls are higher than a given value The rate of outgoing/incoming calls are lower than a given percentage There are no outgoing/incoming domestic calls Long duration of calls (international calls using all of a prepaid card) High number of peak calls (time zone difference)
Bypass Fraud – Difficulty in Detecting Network bypass generally relies upon readily available and legally acquired equipment Moreover, with the increased reliance on VoIP, bypass operators can operate transparently But there is a way — Teralight’s Guardian solutions suite!
Eliminating Telecom Fraud – Policy Decisions Perform studies on typical traffic loads for certain business types Perform studies on typical traffic loads for certain business types Set up procedures for any order of seven or more analog lines at a time for any small business. Set up procedures for any order of seven or more analog lines at a time for any small business. Standardize acceptable amount of traffic on a per-line basis for the number of lines ordered for each customer Standardize acceptable amount of traffic on a per-line basis for the number of lines ordered for each customer Insist accurate CLI is available on international tandems and central offices, & eliminate CLI stuffing Insist accurate CLI is available on international tandems and central offices, & eliminate CLI stuffing Create legal standards that are bad for the health And freedom of Bypass Operators Review ALL high capacity digital line orders
Bypass Fraud – Teralight’s Approach Create awareness Design strategies with full involvement of the regulatory body and the concerned operator Work closely with regulatory authorities with regard to the network, SS7, and billing programs that are currently in place. Employ fraud-detection (information collection) abilities, which are often enough to eliminate a majority of network leakages and bypass Implement any necessary billing system programming that will allow for automated CDR/IPDR capture, matching, and analysis.
Revenue Assurance The communications market is one of the most competitive sectors in the commercial world. As economic pressure increases, many operators are moving from a growth-based business model, where success is measured in numbers of subscribers, to a value-based model where success is measured by margins and profitability As part of this transition, operators are targeting both cost reduction and new, high-margin services that can increase revenues. Both of these can directly increase profitability. There is another area where profitability can be substantially improved with minimal investment, by implementing a proactive Revenue Assurance strategy. Teralight, through its portfolio of solutions, can provide you with tools and services to help ensure your Revenue Assurance strategy succeeds.
Teralight: Market Focus Areas Network Fraud Detection Network Security Auditing (OSS, BSS, and other components of the network) Revenue Assurance Interconnect Billing Soft Switching Technologies and Strategies – Leading Edge Services VoIP Systems and Technologies – Integration and Value Add Legacy and NGN Technology Switching Systems – (Integration, Hybrid, etc.) OSS / BSS Program Development
Teralight: Products & Solutions GUARDIAN – A Complete Suite of Services for By-Pass Fraud Detection and Elimination B-DRIVE – Business Suite Software Customer Care System – A complete suite for customer relationship management ERP –A Enterprise Resource Planning Solution for carriers and service providers TRS - Telecom Rating System CDR Mediation System – Provides hardware independent mediation
Teralight: Services Teralight offers the following services in Pakistan, the Middle East, and North Africa: Tera Net Test (TNT) WiMAX Deployment Global Exchange Business Services Managed Services – Networks, Systems, Security, IT, Telecoms Optic Fiber Laying and Horizontal Boring Software Development and support Market Research- Highly specialized custom and spec reports for focused on the SAMENA Region IT Network Integration Application Design, Engineering and Support BTS,MSC,BSS Deployment Services Satellite System Deployment Services
Contact Us Corporate Headquarters: Corporate Headquarters: Level 41, Emirates Towers P.O. Box Sheikh Zayed Road Dubai, UAE Tel: American Headquarters: American Headquarters: 295 North Rural 263 Chandler Arizona, Tel: Fax: Pakistan Office Pakistan Office 305-C, 3rd Floor, Evacuee Trust Complex,F-5/1 Islamabad, Pakistan TEL: , Fax: Hong Kong Office Hong Kong Office Bank of China Tower 1 Garden Road, 25th Floor Central, Hong Kong, China Tel: