ELKAT Security Engineering Ltd. Poland Activity Plan Avi Arbili Regional Sales Director – Europe Cell:+972-(0) 52 – 3910006 Tel: +972-(0)3-5604744 Fax:

Slides:



Advertisements
Similar presentations
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Advertisements

Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Akshat Sharma Samarth Shah
Meganet Corporation VME Office Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Interlock Protocol - Akanksha Srivastava 2002A7PS589.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
U N C L A S S I F I E D LA-UR LANL Exchange / Blackberry Deployment June 2, 2009 Anil Karmel Solutions Architect Network and Infrastructure Engineering.
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
Meganet Corporation VME Mail Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Wired Equivalent Privacy (WEP)
Security Awareness: Applying Practical Security in Your World
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
INTERNET and CODE OF CONDUCT
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
CSCI 6962: Server-side Design and Programming
ELKAT Security Engineering Ltd. Poland Activity Plan Avi Arbili Regional Sales Director – Europe Cell:+972-(0) 52 – Tel: +972-(0) Fax:
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Authentication Approaches over Internet Jia Li
Chapter 10: Authentication Guide to Computer Network Security.
ELKAT Security Engineering Ltd. Poland Activity Plan Avi Arbili Regional Sales Director – Europe Cell:+972-(0) 52 – Tel: +972-(0) Fax:
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Cosmos Security Feature Overview Product Planning Group Samsung IT Solutions Business 12 July 2010.
A History of WEP The Ups and Downs of Wireless Security.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Certain security vulnerabilities exist in every mode of wireless communications.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 3.  The characteristics and purpose of: ◦ Intranets ◦ Internet ◦ Extranets.
James Higdon, Sameer Sherwani
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Secure Authentication System for Public WLAN Roaming Ana Sanz Merino, Yasuhiko.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Wireless and Mobile Security
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
1 Thuy, Le Huu | Pentalog VN Web Services Security.
Trusted Operating Systems
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Fall 2006CS 395: Computer Security1 Key Management.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Security Bob Cowles
Antony Edwin Keane Inc Ltd
Dr. Nermin Hamza.  Attacks:  Traffic Analysis : traffic analysis occurs when an eavesdroppers observes message traffic on network. Not understand the.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Web Services Security.
Meganet Corporation VME Mail 2004
Security through Encryption
Wireless Spoofing Attacks on Mobile Devices
Presentation transcript:

ELKAT Security Engineering Ltd. Poland Activity Plan Avi Arbili Regional Sales Director – Europe Cell:+972-(0) 52 – Tel: +972-(0) Fax: +972-(0)

Military Grade Encryption Systems Secure Lock 3G BBM Full security suite to your BBM chat

BlackBerry Messenger ( BBM PIN-to-PIN )  Only possible between BlackBerry devices  If permitted by departmental policy, users who know the PINs of other users' BlackBerry device can use the PINs to directly exchange data messages with the other devices across the wireless network (outside the normal process), thus bypassing the internal departmental servers and security filters  Addressed to a "PIN" instead of an address.  A "PIN" is a hardware address, similar to a computer network.  adapter's MAC address, and is unique to every BlackBerry device.  A "PIN" is not an authentication password nor is it a user  identifier. It is the method by which the BlackBerry device is  identified to the RIM relay for the purpose of finding the device within the global wireless service providers' networks.

Sending/Receiving PIN-to-PIN Messages In this case, a PIN-to-PIN message sent from a BlackBerry device is forwarded to the RIM relay by the user's wireless service provider as in the case of . However, for a PIN-to-PIN message, instead of going back through departmental servers, the relay identifies the destination BlackBerry device by its PIN and forwards the message directly to the destination user's wireless service provider (which may or may not be the same provider as the originating user) for direct delivery to the destination device. How it is works !

PIN-to-PIN main security concern !!! PIN-to-PIN is not suitable for exchanging sensitive messages: Although PIN-to-PIN messages are encrypted using Triple-DES, the key used is a global cryptographic "key" that is common to every BlackBerry device all over the world. This means any BlackBerry device can potentially decrypt all PIN-to-PIN messages sent by any other BlackBerry device, if the messages can be intercepted and the destination PIN spoofed. Further, unfriendly third parties who know the key could potentially use it to decrypt messages captured over the air.

PIN Address Vulnerability A BlackBerry device that has been used for PIN messaging should not be recycled for re-use. The reason is that the hard- coded PIN cannot be erased or modified, and therefore the PIN does not follow a user to a new device. Even after memory wiping and reloading, the BlackBerry device still has the same PIN identity and will continue to receive PIN messages addressed to that PIN. This can expose unsuspecting users of BlackBerry devices to potential information compromise in the following ways : A new owner of the recycled BlackBerry device could view PIN messages sent from a colleague of the previous owner who is unaware that the message is now going to the wrong recipient (recall that the PIN is a device ID, and not a user ID. A message sent by the BlackBerry device's new owner contains a known PIN credential which might be mistakenly accepted as being from the previous owner )impersonation)

Secure Lock 3G BBM & s Encryption !! Developed a newBBM application that provides high encryption solution that use the existing PIN mechanism !! Based on the following encryption standard: 1.Keys exchange : Elliptic Curve 384 Bits (approved as equivalent to RSA 7680 Bits by the NSA 2. Encryption : AES 256 (approved for protection TOP SECRET information by the NSA

 Compatible Networks : WI-FI, 3G, GPRS, UMTS  Full support for worldwide roaming  Peer to peer communication  Communication via PIN messaging infrastructure  Address Book/Presence  Import contacts from Blackberry BBM address book Tree-based buddy-list  Add/Delete contact  Add contact authorization  Contact/own status: Do Not Disturb, Busy etc...  Messaging: Text messaging, Offline text messaging, Messaging history  File transfer Key features

Thank You