SOURCE BOSTON 2008 Copyright 2008, James M. Atkinson.

Slides:



Advertisements
Similar presentations
Intermediate 2 Computing
Advertisements

Presented by: Eng. Karam Al-sofy
1 Telephone Connection. 2 Introduction The section instructs you on how to install a required phone line to every receiver.
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
IUT– Network Security Course 1 Network Security Firewalls.
Information Technology Foundations-BIT 112 TECHNOLOGY GUIDE FOUR Basics of Telecommunications and Networks.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
(part 4).  Gateways  A gateway is responsible for translating information from one format to another and can run at any layer of the OSI model, depending.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Presented by Serge Kpan LTEC Network Systems Administration 1.
IS Network and Telecommunications Risks
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER SEVEN NETWORKS: MOBILE BUSINESS CHAPTER SEVEN NETWORKS:
E-commerce and Information Technology in Hospitality and Tourism Chapter 3 Connecting to the World Copyright 2004 by Zongqing Zhou, PhD Niagara University.
Communications and Networks
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Communication Links Communication Link = Physical connection or Physical Medium Types: Wire Pair or Twisted Pair Coaxial Cable Fiber Optics Bandwidth,
Computers © 2005 Prentice-Hall, Inc.Slide 1. Computers Chapter 6 Networks and Networking © 2005 Prentice-Hall, Inc.Slide 2.
1 Chapter 7 Networking: Computer Connections. Basic Components of a Network Sending device Communications link Receiving device.
Chapter Preview  In this chapter, we will study:  The basic components of a telecomm system  The technologies used in telecomm systems  Various ways.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Chapter 12 Long-Distance Digital Connection Technologies Pulse Code Modulation DSU/CSU ISDN ADSL Cable Modem.
Power point presentation on internet Presentation by: Tenzin wangda.
Smart Grid Research Consortium Conference Communications: Technologies Systems Future Trends Dr Rick Russell.
Chapter 1: Overview Lecturer: Alias Mohd Telecommunications Department Faculty of Electrical Engineering UTM SET 4573: Data Communication and Switching.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
Lecture 9 Modems and Access Devices. Overview Computers are connected to telephone lines through the use of modems –modems: are connecting devices between.
TYPES OF INTERNET CONNECTION ANALOG (DIAL-UPANALOG (DIAL-UP) ISDNB-ISBNDSLADSLVDSLSDSLCABBLE WIRELESS INTERNET CONNECTION INTERNET BONDEDBONDED T-1T-1T-1LINESATTELITTE.
In The Name Of Allah Whose Blessings Are Uncountable.
Introduction to Computers Personal Computing 10. What is a computer? Electronic device Performs instructions in a program Performs four functions –Accepts.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Chapter 5 Networks Communicating and Sharing Resources
What is broadband Multiple broadband technologies Advantages DSL and DSLAM Types of DSL transmission Services through broadband Cable Modem Internet Access.
Chapter 9A Network Basics.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
Modems Mostly used to connect PCs to the Internet Modulates and demodulates the signal Converts analog data into digital and vice versa V.90/V.92 56K standards.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
Common Devices Used In Computer Networks
Chapter 7 Networking: Computer Connections. Networks n Network - a computer system that uses communications equipment to connect two or more computers.
Business Computing 550 Lesson 2. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
Communication Services Communication Services: –Problem: This chapter expands on topics introduced in earlier chapters related to long-distance communication.
NETWORKS.
Networking Components DAVID INGUANZO 7/10/14. HUB ~$20 ($20 - $1,000+) Best for: home networks light traffic business environment connecting multiple.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 2 – VoIP Versus PSTN.
Network Systems 3.01 Understand the physical components of a network.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Telecommunications and Networks Chapter 8. Types of Signals Analog – a continuous waveform that passes through a communications medium Digital signal.
Components of wireless LAN & Its connection to the Internet
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Essentials of Telecommunications.
TECHNOLOGY GUIDE FOUR Basics of Telecommunications and Networks.
Voice Over Internet Protocol
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
N ETWORK S YSTEMS 3.01 U NDERSTAND THE PHYSICAL COMPONENTS OF A NETWORK.
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
Communications and Networks Chapter 9 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
ICT Unit 4: Network and the effects of using them
Voice Over Internet Protocol Nelson Kattula Computer Science, Masters.
Intro to MIS – MGS351 Network Basics
CONNECTING TO THE INTERNET
Chapter 1: WAN Concepts Connecting Networks
Network Basics Extended Learning Module E
Internet of Things Vulnerabilities
Chapter 6 Networks Communicating and Sharing Resources
ANEEL ABBASI MUHAMMAD ADNAN MOIZ SHAH MUHAMMAD KHAYAM GROUP MEMBERS.
GETTING CONNECTED TO INTERNET
Connecting Devices Hosts and networks do not normally operate in isolation Connecting devices connect hosts together to make a network or connect networks.
Presentation transcript:

SOURCE BOSTON 2008 Copyright 2008, James M. Atkinson

Telephone Defenses Against the Dark Arts James M. Atkinson Granite Island Group

Telephone Vulnerability Basics 1. Instrument 2. Local Distribution 3. Local Switch 4. Demarcation/Network Interface 5. Transmission 6. Switching

Instrument Vulnerabilities 1.Speaker of Microphone Exploit 2.Installation of Foreign Device 3.Hookswitch Manipulation 4.Software/Firmware Exploits 5.Normal Operation Exploits 6.Moderate Protection, Easy to Subvert

Local Distribution Vulnerabilities 1.Wall Plates 2.Raw Wiring 3.Cross Connection Points 4.Normally Not Protected or Supervised

Local Switch Vulnerabilities 1.Cross Connections Points 2.Switch Inputs/Outputs 3.Switch/PCM Backplane 4.Parallel Channels 5.Switch Software/Firmware Exploits 6.May or May Not Be Protected

Demarcation/Network Interface Vulnerabilities 1.Ripe for Exploitation 2.Poorly Protected 3.Generally Accessible 4.Target Specific 5.Significant Choke Point

Local Transmission Network Vulnerabilities 1.Post Demarcation/NID 2.Before Switch 3.Easy to Isolate Single Subscriber 4.Open Terminals and Boots 5.Not Protected, Wide Open

Switching Vulnerabilities 1.Central Office 2.Used to Be Huge Buildings 3.Modern Small Scale Switching 4.Post 9-11 Logo Removals 5.High Value OVERT Choke Point CALEA and.gov targeting CALEA and.gov targeting 6.Usually Highly Protected

Transmission Network Vulnerabilities 1.Mostly Single Mode Fiber Optics 2.Accessible Pubic Pathways 3.Usually Well Marked 4.High Value COVERT Choke Point 5.Cable Vaults on Alarms 6.“Supervised” Against Breakage

Telephonic Integration Voice over IP Voice over IP Cable ModemsCable Modems Other Broadband ServicesOther Broadband Services ISDN ISDN Fiber Optic Internet Service Fiber Optic Internet Service EVDO EVDO Other Wireless Services Other Wireless Services

The Realistic Threat RF Device RF Device Hard Wired Recorder Hard Wired Recorder Wireless Intercept Wireless Intercept Software Manipulation Software Manipulation Other Methods Other Methods

Essential Tasks Conductor Inventory Conductor Inventory Pathway Mapping Pathway Mapping Known Electronic Metrics Known Electronic Metrics Re-Testing Against MetricRe-Testing Against Metric Open TestingOpen Testing Physical Inspection Physical Inspection

Auditing Telephone Instruments What Kind of Phones What Kind of Phones “Soft Under-Belly” “Soft Under-Belly” What Should It Normally Do What Should It Normally Do Is It a Risk?Is It a Risk? Is It a Threat?Is It a Threat? Hostile Manipulation?Hostile Manipulation? Feature, Hazard, or Risk?

Auditing Wiring What Wire is in the Walls? What Wire is in the Walls? What Wire is in the Ceiling? What Wire is in the Ceiling? Wall Plates? Wall Plates? Termination Points Termination Points Junction Points/Punch Blocks Junction Points/Punch Blocks

Auditing Wiring Conductor Maps Conductor Maps Signal PathwaysSignal Pathways Pair CombinationsPair Combinations Industry Standard Pin-OutsIndustry Standard Pin-Outs Color Codes?Color Codes? Conductor LengthConductor Length Fractions of an Inch Accuracy Fractions of an Inch Accuracy Non Linear Junction CombinationsNon Linear Junction Combinations

Auditing Transmission Paths Map Out Every Map Out Every CableCable ConductorConductor WireWire Fortuitous PathwayFortuitous Pathway Location Must Be Within InchesLocation Must Be Within Inches

Auditing Switching Systems What is a the Default Generic? What is a the Default Generic? Actual Translation?Actual Translation? What is Different?What is Different? Is it Safe?Is it Safe? Always Reduce to Hardcopy Form Always Reduce to Hardcopy Form

Auditing Secure Communications Systems Tampering with Actual Instrument Tampering with Actual Instrument Tampering with: Tampering with: Uncontrolled AccessoriesUncontrolled Accessories Handsets, Cords Cables Handsets, Cords Cables Power Supplies Power Supplies Low Bandwidth (300 Hz) Filter Bypass Low Bandwidth (300 Hz) Filter Bypass Proximity to RF Emitters Proximity to RF Emitters

Prior Penetrations, Hacks, and Attacks. Common Manipulations Common Manipulations Raw Hacking/Manipulations Raw Hacking/Manipulations Naked Attacks Naked Attacks Appropriate Counter Measures Appropriate Counter Measures

VOIP Attacks Extremely High Risk Extremely High Risk Rarely Utilize Hook SwitchRarely Utilize Hook Switch Open MicrophoneOpen Microphone Firmware Can Be Remotely UpdatedFirmware Can Be Remotely Updated Network Provides a Serious Choke PointNetwork Provides a Serious Choke Point

Mechanisms to Detect and Defeat VOIP Attacks and Exploits Detection Detection Unregistered IP Address on VOIP NWUnregistered IP Address on VOIP NW Non-VOIP Asset on VOIP NetworkNon-VOIP Asset on VOIP Network Hub, not Switch Being UsedHub, not Switch Being Used Machine Being Used On BackboneMachine Being Used On Backbone Classic Man-in-the-Middle Exploit Classic Man-in-the-Middle Exploit Suspect Data Traffic on an Unused VOIP Phone LineSuspect Data Traffic on an Unused VOIP Phone Line

Methods to Secure VOIP Systems Utilize Smart Switches Utilize Smart Switches Keep VOIP Terminals on Dedicated Networks and Gateways Keep VOIP Terminals on Dedicated Networks and Gateways Do Not Integrate in Data Networks Do Not Integrate in Data Networks Lockdown Instrument Firmware Lockdown Instrument Firmware Disallow Firmware UpdatesDisallow Firmware Updates

Cardinal Rule Convenience and Privacy are Inversely Proportional™

Questions? Thank You

Telephone Defenses Against the Dark Arts James M. Atkinson Granite Island Group