GISFI_SP_201206241TEC-GISFI Workshop, 21 June, 2012 Overview and System Security to Security Testing Company:NEC Corporation Author(s):Anand R. Prasad,

Slides:



Advertisements
Similar presentations
Module 1 Evaluation Overview © Crown Copyright (2000)
Advertisements

Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
LTE Security. Agenda Intro … Intro … The LTE System Radio Side (LTE – Long Term Evolution/Evolved UTRAN - EUTRAN) – Improvements in spectral efficiency,
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
G53SEC 1 Mobile Security GSM, UTMS, Wi-Fi and some Bluetooth.
Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
GLOBAL ICT STANDARDISATION FORUM FOR INDIA (GISFI) Prof. Dr. Ramjee Prasad, CTiF, Aalborg University Fellow IEEE, FIET, FIETE, FWWRF - Founding Chairman,
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
Introduction to ICANN’s new gTLD program. A practical example: the Dot Deloitte case. Jan Corstens, Partner, Deloitte WIPO Moscow, 9 Dec 2011.
GISFI_SP_ GISIF#8, 26-28, March Proposals for Activity on Network Security Requirement of India Company:NEC Corporation, Chair Security &
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
SEC835 Database and Web application security Information Security Architecture.
Lucent Technologies – Proprietary Use pursuant to company instruction 1 3GPP2 Workshop MMD IMS Architecture June 28, 2005 Anne Y. Lee IMS Systems Engineering.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Lessons Learned in Smart Grid Cyber Security
“Mitigating Offshoring Risks in a Global Business Environment“
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
“Securing IP Multimedia Subsystem (IMS) infrastructures …,” M. Tsagkaropoulos UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Integrating Security Design Into The Software Development Process For E-Commerce Systems By: M.T. Chan, L.F. Kwok (City University of Hong Kong)
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Module 6 Planning and Deploying Messaging Security.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
GISFI_SP_ Operator-GISFI Workshop 22 June, 2012 Overview and System Security to Security Testing Company:NEC Corporation Author(s):Anand R. Prasad,
“4WARD – Architecture and Design for the Future Internet” D2.1 Technical Requirement Hoon-gyu Choi
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
Chapter 4 Application Level Security in Cellular Networks.
LTE Architecture KANNAN M JTO(3G).
Lecture 24 Wireless Network Security
1 6/3/2003 IEEE Link Security Study Group, June 2003, Ottawa, Canada Secure Frame Format PAR: 5 Criteria.
1 GISFI_SIG_ GISIF#7, Dec., 2011 Agenda GISFI_SIG_ : Security SIG to Security WG, NEC Corporation GISFI_SIG_ : Security and.
GISFI_SP_ GISIF#8, , March GISFI#8 Security & Privacy Working Group: Activity Update and Agenda Company:NEC Corporation Author(s):Chair.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
GISFI_SP_ GISIF#8, , March GISFI#8 Security & Privacy Working Group: Report Company:NEC Corporation Author(s):Anand R. Prasad, Chair.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.
Update on ETSI Security work Charles Brookson OCG Security Chairman DOCUMENT #:GSC13-PLEN-57 FOR:Information SOURCE:Charles Brookson AGENDA ITEM:6.3
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
November 2001 Lars Falk, TeliaSlide 1 doc.: IEEE /617r1 Submission Status of 3G Interworking Lars Falk, Telia.
Doc. numberGISFI#19, January , Security & Privacy Working Group: Closing Session Company:NEC Corporation Author(s):Chairman Contact
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
IS3220 Information Technology Infrastructure Security
1 On 3GPP2 Femto Security Anand Palanigounder Qualcomm Inc. Notice: Contributors grant a free, irrevocable license to 3GPP2 and its Organization.
OUTCOMES OBJECTIVES FUNCTIONS ACTIONS TERRITORIES LOCATIONS MARKET SEGMENTS TIME LINESCHALLENGE IMPACT RESOURCESACTIVITIESCHANNELS RELATIONS PARTNERS CUSTOMERS.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
1 Special Topics in Computer Engineering Supervised by Dr. Walid Abu-Sufah Jordan University Department of Computer Engineering.
Cloud Security for eHealth – Study Validation
OmniRAN Overview and status
GLOBAL ict standardisation forum for india (Gisfi)
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

GISFI_SP_ TEC-GISFI Workshop, 21 June, 2012 Overview and System Security to Security Testing Company:NEC Corporation Author(s):Anand R. Prasad, Chairman Security & Privacy Working Group Purpose:Discussion Document#:GISFI_SP_

GISFI_SP_ TEC-GISFI Workshop, 21 June, 2012 Purpose Start committed relationship between TEC / DOT and GISFI This workshop on network security requirements is to –Share initial information and –Bring common understanding Next step: –Work together on a committed work-plan –Regularly meet and discuss: During GISFI meeting Separately just before or after a GISFI meeting

GISFI_SP_ TEC-GISFI Workshop, 21 June, 2012 GISFI Security & Privacy WG Tasks Work on security, privacy, legal intercept and algorithms Perform threat analysis and identify requirements Develop –recommendations regarding the above –security and privacy solutions –legal intercept solutions Bring Indian requirements to international bodies Activities Network security testing requirements of India Proposed new topics –Identity management –Unsolicited communication –Child security in cyber space Inter-WGs –Internet-of-things –Service Oriented Networks –Future Radio Networks

GISFI_SP_ TEC-GISFI Workshop, 21 June, 2012 Security Testing Requirements Companies should fulfill ISO 27k security guidelines Highest level of security from design, development, deployment, maintenance to running of all comm. products and networks Security testing of all products and network based on Indian guidelines set as per Common Criteria (ISO 15408) where testing: –performed by Indian labs from 1 April 2013 onwards – yearly –labs will be accredited by Indian government –test result will be certified by Indian government –only “type” testing will be done Products/network should fulfill Indian security requirements, implementation should comply with common security considerations and implemented as per standard specification (e.g. 3GPP)

GISFI_SP_ TEC-GISFI Workshop, 21 June, 2012 Impacts and Gaps Impact of requirements Technical skills growth Security awareness Vendors will see delay in sales and increase in product cost Operator cost will increase impacting rural deployment Potential trade impact Gaps Lab: Accreditation and certification method Common criteria –CC level –PP & STs – certify? who? Specification details Relation with CCRA, 3GPP etc. Acceptable level of risk Define safe to connect How to test existing network CC: Common Criteria PP: Protection Profile ST: Security Target

GISFI_SP_ TEC-GISFI Workshop, 21 June, 2012 Testing Related Duration of testing: Longer time to wait will impact business Periodicity of testing: Given product can have monthly software or firmware update Timing of testing: Before purchase will mean impact on vendors while after purchase could mean issues for operators/service providers Volume of testing, number of points: Type approval, extent/depth of testing to be performed and level of value-chain to be touched Human resource: Initially sufficient people will not be available to perform security tests. Steps to perform test and develop resources should be a concern Cost of testing: Cost of testing will lead to impact on market. Responsibility of accidents: Vendors pay for the accidents due to certified products? Security threats / attacks are maturing with time thus there should be consideration from long-term perspective Confidentiality and intellectual property: How can the testing “person” be certified? Also issue regarding escrow.

GISFI_SP_ TEC-GISFI Workshop, 21 June, 2012 S&P Work Item Following deliverables are expected: Requirement analysis and proposals (Framework) Complete security together with terminology definitions and proposals Policy study and proposals Security architecture in mobile communication systems: Comparison and proposals for India Monitoring Proposals for security testing Planning to liaise with 3GPP and CCRA

GISFI_SP_ TEC-GISFI Workshop, 21 June, 2012 Market Trend: Over-The-Top Services (OTT) and Cyber Attacks Over-the-top services NodeB WLAN AP X-CSCF HSS/ AAA RNC PDG MSC xGSN eNodeB H(e)NBGW H(e)NB MME S/PGW Advertisement 1.OTT is the killer app  Impact: -Loss of profit source and no new source of profit -Increase in CAPEX & OPEX Market trend : Moving towards services  Mobile operator becoming part of “the Internet”  OTT services is the killer app  Cyber attack is increasing 2.Cyber attacks is increasing  Impact: -Increase in CAPEX & OPEX -Dissatisfied customers

GISFI_SP_ TEC-GISFI Workshop, 21 June, 2012 Security Considerations Over-the-top services NodeB WLAN AP X-CSCF HSS/ AAA RNC PDG MSC xGSN eNodeB H(e)NBGW H(e)NB MME S/PGW 1.Overloading of network (DoS / DDoS) Overloading network with botnets, malware, home made terminals etc. 2.Finding network topology (privacy) 3.Network element attacks 4.Protocol attack 5.Subscriber privacy issues 6.Fraudulent charging Analyzing network to find network topology Attacking specific network elements Protocol weaknesses used to perform attack OAM attack, spoofing etc. used to get subscriber private data and cause fraudulent charging  Several attacks are possible on mobile network  Newer services bring new business opportunities and also threats  Complete system security consideration from the is necessary

GISFI_SP_ TEC-GISFI Workshop, 21 June, 2012

GISFI_SP_ TEC-GISFI Workshop, 21 June, 2012 Core Network (CN) Radio Access Network (RAN) User Equipment (UE) Service (or service provider) Subscriber Identity Module (SIM) Internet Local break-out Foreign Network

GISFI_SP_ TEC-GISFI Workshop, 21 June, 2012 Legacy Service Layer Service Control e.g. IMS NGMN PS core Enablers Other Radio Access Networks e.g. WiFi NGMN Radio Access Network External Networks like PSTN, Internet etc. CS core UTRANGERAN

GISFI_SP_ TEC-GISFI Workshop, 21 June, 2012 Mobile Systems Security Comparison GSMGPRSUMTSSAE/LTE Security servicesCiphering User authentication Equivalent to wired Ciphering User authentication Ciphering & integrity Mutual auth. Ciphering & integrity Mutual auth. AuthenticationAuthentication: 3 valuesUMTS-AKA: 5 valuesEPS-AKA: 5 values KeysDerivation of a ciphering key after auth.Derivation of CK & IKSeparate keys for each purpose Key lengthShared key 128 bits for authentication Derived 64 bits out of which 54 used for ciphering Shared key 128 bits for authentication Derived 64 bits for ciphering 128 bits Key handlingChanged on authenticationChanged on each handover & more AlgorithmA5/1 / 2 /3; specification is confidential. A5/3 is based on Kasumi GPRS Encryption Algorithm (GEA): GEA0, GEA1, GEA2 and GEA3 Kasumi from Rel. 4SNOW 3G, AES and ZUC Security end-pointBTSSGSNRNC / SGSNeNB for UP & RRC MME for NAS Network securityNoneNone initiallyMAPsec and IPsecIPsec

GISFI_SP_ TEC-GISFI Workshop, 21 June, 2012 Designing Security Determine the assets Determine the threats and risks to each asset  set security requirements Design and implement countermeasures for the threats and residual risks  economical Monitor, manage and update the implementation Deter, detect and react against any attack

GISFI_SP_ TEC-GISFI Workshop, 21 June, 2012 Common Criteria Testing PPSTDocumentation Design Review Code Review Product Test Certification 9 ~ 24 months

GISFI_SP_ TEC-GISFI Workshop, 21 June, 2012 Security Test Lab Accreditation & Certification TEC/DOT & CCRA,3GPP Security Test Lab Vendors / Operators 1.Vendors/operators request security testing 0.Security test labs accredited by CCRA taking care of Indian needs as per TEC 2.Send security test results for certification 3.Result: Certified or not certified 4.Result: Certified or not certified CCRA: Common Criteria Recognition Arrangement DOT: Department of Telecommunications TEC: Telecommunications Engineering Centres

GISFI_SP_ TEC-GISFI Workshop, 21 June, 2012 Finally Setting security requirements is important and has its own benefits A balance need to be found between what is needed and what can be done Current national requirements have gaps GISFI is working on several topics related to security testing requirements GISFI proposes TEC/DOT to work together on network security testing requirements