IEEE COMMUNICATIONS SOCIETY Karl Rauscher October 17, 2006 C Q R Some Remarks Karl F. Rauscher Chair, IEEE CQR Advisory Board Bell Labs Fellow Executive.

Slides:



Advertisements
Similar presentations
Systems Security Engineering An Updated Paradigm INCOSE Enchantment Chapter November 8, 2006 John W. Wirsbinski.
Advertisements

ABET – An Update Willis King, ABET Director Feb. 17, 2007.
T ECHNICAL C OMMITTEE ON C OMMUNICATIONS Q UALITY & R ELIABILITY Committee Meeting GLOBECOM 2003 San Francisco, California U.S.A. C Q R.
T ECHNICAL C OMMITTEE ON C OMMUNICATIONS Q UALITY & R ELIABILITY Committee Meeting 12/2/2004 GLOBECOM 2004 Dallas, Texas, USA C Q R
T ECHNICAL C OMMITTEE ON C OMMUNICATIONS Q UALITY & R ELIABILITY Committee Meeting CQR Chair: Kenichi Mase CQR Workshop 2006 London, UK C Q R
T ECHNICAL C OMMITTEE ON C OMMUNICATIONS Q UALITY & R ELIABILITY Committee Meeting GLOBECOM 2005 St. Louis, Missouri, USA C Q R (toll free)
IEEE Communications Society T ECHNICAL C OMMITTEE ON C OMMUNICATIONS Q UALITY & R ELIABILITY Committee Meeting CQR.
B EST P RACTICES T UTORIAL 2/13/2014 K. F. Rauscher 1 IEEE Communications Society Technical Committee on Communications Quality & Reliability (CQR) PSAP.
IEEE CQR-TC Technical Committee Meeting Kenichi Mase and Hiromi Ueda Kenichi Mase and Hiromi Ueda May 19, 2005 ICC 2005, Seoul, Korea.
Reliable Security Current State, Challenges, Desired State S. Rao Vasireddy Bell Laboratories, Alcatel-Lucent Tel:
K. F. Rauscher November 2004 C Q R Welcome IEEE COMMUNICATIONS SOCIETY Emergency Power Conference Monday, November 22, 2004 Bell Labs Network Reliability.
COMNET Research Unit Dept. of Electrical and Computer Engineering Democritus University of Thrace, Greece
May 2 nd, 2001, page n° 1 The Invisible Network. May 2 nd, 2001, page n° 2 List of contents Introduction The invisible network: an example Some trends.
ITU-T Workshop on Security Seoul (Korea), May 2002 Telecommunication network reliability Dr. Chidung LAC.
Colombo, Sri Lanka, 7-10 April 2009 Preferential Telecommunications Service Access Networks Lakshmi Raman, Senior Staff Engineer Intellectual Ventures.
Frameworks of Telecom and protect Environment Chaesub Lee Chairman of ITU-T SG13.
IEEE/FIPA WG Mobile Agents Ulrich Pinsdorf Fraunhofer-Institute IGD, Germany Dept. Security Technology
Stakeholders and the Public
Securing Critical Unattended Systems with Identity Based Cryptography A Case Study Johannes Blömer, Peter Günther University of Paderborn Volker Krummel.
More Fiber in your Diet Richard Krock National Conference on Emergency Communications Systems December 12, 2005.
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Guide to Network Defense and Countermeasures Second Edition
© 2003 Carnegie Mellon University slide 1 Building CSIRT Capabilities and the State of the Practice Georgia Killcrece CSIRT Development Team CERT ® Training.
My School-Tech Roadmap Principal’s Name Name of School School Location.
Network Innovation using OpenFlow: A Survey
1 Federal Communications Commission Public Safety and Homeland Security Bureau NARUC Summer Committee Meetings Dallas, Texas July 13, 2014 Clete D. Johnson.
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.
Wireless Sensor Network Security Anuj Nagar CS 590.
Welcome to CS 395/495 Internet Measurement and its Reverse Engineering.
Frequently asked questions about software engineering
WORK PROGRAMME 2014 – 2015 Topic ICT 9: Tools and Methods for Software Development Odysseas I. PYROVOLAKIS European Commission DG CONNECT Software & Services,
Disaster & Smart City in Aging Society – Designing a secure and resilient smart city Smart City and Resiliency Jirapon Sunkpho College of Innovation Thammasat.
Cyber Security of SCADA Systems Testbed Testbed Development Group Members: Justin Fitzpatrick Rafi Adnan Michael Higdon Ben Kregel Adviser: Dr. Manimaran.
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
Critical Emerging Network-Centric Applications Tele-control/tele-presence Defense Tele-medicine Remote plane/vehicle/robot control Distance learning Real-time.
DOCUMENT #:GSC15-PLEN-48 FOR:Presentation SOURCE: ATIS AGENDA ITEM: PLEN 6.10 CONTACT(S): James McEachern
Management Information Systems
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Introduction to Information Security. 2 Historical aspects of InfoSec Critical characteristics of information CNSS security model Systems development.
Industry Collaboration to Achieve Network Security The Network Reliability and Interoperability Council Jeffery M. Goldthorp Chief – Network Technology.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
1 Availability Policy (slides from Clement Chen and Craig Lewis)
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
North American Network Operations Group (NANOG) October 23, 2000 Washington, DC PJ Aduskevicz AT&T.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Introduction to Information Security
Business Continuity Management Rikus Matthyser Executive: Telkom Business Integration Services.
PAMELA J. STEGORA AXBERG Chair, NRIC VI Steering Committee Qwest Senior Vice President Network Reliability Office:(763) Fax:(763)
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
The Internet Book. 3 The Internet Works Well The Internet is a marvel of technical accomplishment. TCP/IP: – Accommodates growth and change not imagined.
Data and Computer Communications Chapter 10 – Circuit Switching and Packet Switching.
H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL F. R AUSCHER Chair Homeland Security Physical Security.
Who doesn’t need to be WISE? Bringing into reality global information security collaboration Alessandra Scicchitano GÉANT - Project Development Officer.
DOWeR Detecting Outliers in Web Service Requests Master’s Presentation of Christian Blass.
World federation of associations for teacher education Post office Box Columbus, Ohio USA
Firmware threat Dhaval Chauhan MIS 534.
CIS 333 Course Experience Tradition/ snaptutorial.com
SOFTWARE-BASED NETWORKS: LEVERAGING HIGH-PERFORMANCE NFV PLATFORMS TO MEET FUTURE COMMUNICATION CHALLENGES Time: 16:40 pm - 18:00 pm, 2017/12/28 (Check-in:
Frequently asked questions about software engineering
CIS 333 Competitive Success/snaptutorial.com
SEC 572 Enthusiastic Studysnaptutorial.com
CIS 333 Education for Service-- snaptutorial.com.
CIS 333 Teaching Effectively-- snaptutorial.com
OUR CIVILIZATION: Indianapolis
ATIS Interoperability
Networking for Home and Small Businesses – Chapter 8
Network Security Ola Flygt Växjö University
Networking for Home and Small Businesses – Chapter 8
ITU-T Workshop on Security, Seoul (Korea), May 2002
Presentation transcript:

IEEE COMMUNICATIONS SOCIETY Karl Rauscher October 17, 2006 C Q R Some Remarks Karl F. Rauscher Chair, IEEE CQR Advisory Board Bell Labs Fellow Executive Director, Bell Labs Network Reliability & Security Office, Alcatel-Lucent Some Remarks Karl F. Rauscher Chair, IEEE CQR Advisory Board Bell Labs Fellow Executive Director, Bell Labs Network Reliability & Security Office, Alcatel-Lucent Ft. Myers, Florida, USA 16 May 2007 Ft. Myers, Florida, USA 16 May 2007

IEEE COMMUNICATIONS SOCIETY Karl Rauscher October 17, 2006 Questions you may be asking... What is the IEEE CQR? What is the purpose of CQR? How do I become a member of CQR? How do I get more involved in CQR? What is the value of CQR?

IEEE COMMUNICATIONS SOCIETY Karl Rauscher October 17, 2006 Questions you may be asking... What is the IEEE CQR?- a professional society What is the purpose of CQR?- to build YOU up How do I become a member of CQR? - you already are How do I get more involved in CQR?- ICC, GLOBECOM, workshops, journals, something new... What is the value of CQR?- networking, peer review, special workshops, coaching

IEEE COMMUNICATIONS SOCIETY Karl Rauscher October 17, 2006 Step back in time to the 2001 CQR International Workshop Issue discussed in a facilitated discussion: What is the complete list of things that can cause outages in emerging data networks? Background: took a while to learn circuit switched business... would be nice to have a faster learning curve.

IEEE COMMUNICATIONS SOCIETY Karl Rauscher October 17, 2006 A Running Jump onto a New S-Curve Cost Reliability Circuit-Switched Packet-Switched

IEEE COMMUNICATIONS SOCIETY Karl Rauscher October 17, 2006 A Running Jump onto a New S-Curve Cost Reliability Circuit-Switched Packet-Switched Historic Insights Non-Historic Insights +

IEEE COMMUNICATIONS SOCIETY Karl Rauscher October 17, 2006 Proceedings from the 2001 CQR International Workshop IEEE CQR Outline of Packet Switched Network Vulnerabilities Hardware, Firmware Software Protocols Interoperability Human Performance and Procedures Physical Environment Network Design and Planning Network Congestion / Traffic Engineering Power Rapid Pace of Growth, Change, Complexity Malicious Attacks, Security Disasters IEEE CQR Outline of Packet Switched Network Vulnerabilities Hardware, Firmware Software Protocols Interoperability Human Performance and Procedures Physical Environment Network Design and Planning Network Congestion / Traffic Engineering Power Rapid Pace of Growth, Change, Complexity Malicious Attacks, Security Disasters

IEEE COMMUNICATIONS SOCIETY Karl Rauscher October 17, 2006 Different sides of an equation Vulnerability A characteristic of any aspect of the communications infrastructure that renders it, or some portion of it, susceptible to damage or compromise Threat Anything with the potential to damage or compromise the communications infrastructure or some portion of it

IEEE COMMUNICATIONS SOCIETY Karl Rauscher October 17, 2006 Some Characteristics of Ts and Vs Vulnerabilities (intrinsic) finite fixed and well known only way threats can impact Threats ~ infinite in number knowledge value is fleeting each has permutations

IEEE COMMUNICATIONS SOCIETY Karl Rauscher October 17, 2006 Do you want to be responsible for this? Terrorism depends on surprise. Failure of imagination.

IEEE COMMUNICATIONS SOCIETY Karl Rauscher October 17, 2006 The Forces The need. The knowledge. The physics. The expecation.

IEEE COMMUNICATIONS SOCIETY Karl Rauscher October 17, Ingredient Framework...

IEEE COMMUNICATIONS SOCIETY Karl Rauscher October 17, 2006 Intrinsic Vulnerabilities Packet-Switched

IEEE COMMUNICATIONS SOCIETY Karl Rauscher October 17, 2006 Use of 8 Ingredient Model

IEEE COMMUNICATIONS SOCIETY Karl Rauscher October 17, stay engaged - contribute (ICC, Globecom, International workshops, special workshops, journals, your own idea, …) - step up to more responsibilities Take Aways