Technical Challenges of Privacy, Reliability, and Security Dr. Marcus Brunner Head of Standardization, Eco-system Development, and Open Source Swisscom.

Slides:



Advertisements
Similar presentations
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Advertisements

Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Qusay H. Mahmoud CIS* CIS* Service-Oriented Computing Qusay H. Mahmoud, Ph.D.
Jose Jimenez Director. International Programmes Telefónica Digital.
OTP – SMS Two-Factor Authentication. TABLE OF CONTENTS Introduction3 OTP – SMS Two-Factor Authentication5 Technical Overview9 Features10 Benefits11 About.
Cloud Computing Brandon Hixon Jonathan Moore. Cloud Computing Brandon Hixon What is Cloud Computing? How does it work? Jonathan Moore What are the key.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Lecture 2: Security Rachana Ananthakrishnan Argonne National Lab.
PKI Implementation in the Real World
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Systems and Internet Infrastructure Security (SIIS) LaboratoryPage Systems and Internet Infrastructure Security Network and Security Research Center Department.
Principles of Information Systems, Sixth Edition 1 Electronic Commerce Chapter 8.
CS 268: Active Networks Ion Stoica May 6, 2002 (* Based on David Wheterall presentation from SOSP ’99)
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
1© Copyright 2015 EMC Corporation. All rights reserved. SDN INTELLIGENT NETWORKING IMPLICATIONS FOR END-TO-END INTERNETWORKING Simone Mangiante Senior.
Control of Personal Information in a Networked World Rebecca Wright Boaz Barak Jim Aspnes Avi Wigderson Sanjeev Arora David Goodman Joan Feigenbaum ToNC.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
VPN Extension Requirements for Private Clouds draft-so-vepc-00.txt.
Cloud Usability Framework
Make your messaging reliable use it Messaging. A single and global solution Send, receive and process any type of message through the appropriate channel.
Security in application integration Kari Nordström.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
X-Road (X-tee) A platform-independent secure standard interface between databases and information systems to connect databases and information systems.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
FI-WARE – Future Internet Core Platform FI-WARE Interface to Networks and Devices (I2ND) July 2011 High-level description.
CS 4720 Security CS 4720 – Web & Mobile Systems. CS 4720 The Traditional Security Model The Firewall Approach “Keep the good guys in and the bad guys.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Chapter 3 : Distributed Data Processing Business Data Communications, 4e.
INTERNET- A BOON OR A CURSE AYUSHI PRADHAN. WHAT IS IT? Internet or INTERnational NETwork is a network of networks that crisscrosses the globe and even.
Workshop 3 Tutor: William Yeoh
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Cellular Device – Versatile personal identification Joint workshop on mobile web privacy W3C presentation, Dec
Virtual Workspaces Kate Keahey Argonne National Laboratory.
Enterprise Solutions Chapter 12 – Mobility and Its Need in an Enterprise.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Security Vulnerabilities in A Virtual Environment
Capacity Planning Plans Capacity Planning Operational Laws
Converged & Secured Networks for Business Transformation & Competitive Advantage Pradeep Kalra Head – IT Infrastructure. Yes Bank.
Gaining Unprecedented Visibility into Microsoft Dynamics CRM with Halo’s Pipeline Advisor, Powered by the Microsoft Azure Cloud Platform MICROSOFT AZURE.
By Jessica Parkinson. Mobile phones have allowed our generation to connect with others all over the world. However, the potential threats are numerous,
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Information systems and management in business Chapter 2 Electronic Business and Business Mobility.
György Kálmán, Josef Noll Mobile and Wireless Communications Summit, th IST 1-5, July 2007 Speaker : 黃韋綸 Right Management Infrastructure for Home.
TCS Internal Security. 2 TCS Internal Objective Objective :  Android Platform Security Architecture.
Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania.
HP Network and Service Provider Business Unit Sebastiano Tevarotto February 2003.
Improve the Performance, Scalability, and Reliability of Applications in the Cloud with jetNEXUS Load Balancer for Microsoft Azure MICROSOFT AZURE ISV.
INFSO-RI Enabling Grids for E-sciencE Grid & Cloud Computing Introduction
GameChanger’s Rate Quote Issue Solution is Deployed to Microsoft Azure for a Fast, Flexible Direct to Consumer Insurance Sales Solution MICROSOFT AZURE.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
ESign Aashutosh.
Prepared By : Pina Chhatrala
Understanding the OSI Reference Model
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Software Defined Networking Market to grow at 54% CAGR from 2017 to 2024:
Cloud Testing Shilpi Chugh.
Software Defined Networking (SDN)
Enabling the hybrid cloud with remote access appliances
Capitalize on Your Business’s Technology
Presentation transcript:

Technical Challenges of Privacy, Reliability, and Security Dr. Marcus Brunner Head of Standardization, Eco-system Development, and Open Source Swisscom

Measurability and Provability To achieve more secure, privacy aware networks –Rely on competition, which requires a certain level of measurability –A key business driver is having a competitive advantage and being able to market it Provability of security –A posteriori, I can prove that something happened –A priori, I can “prove” that the quality is on the requested level

User Experience and Interface End-user do not understand anymore what is going on –What happens with my data? –How save are they and to whom I actually have to trust about handling it correctly? –Whom to trust telco/network, end-system, server/cloud provider –Worse in case of any type of proxying Usability –For an end-user it is very unclear who has access to what data –What usage rights everybody in the chain has –Most of the time it is unclear to the user whether he is secure or not

Reliability Today it is mainly a game in mobile coverage and per-node reliability Is a traditional parameter in an SLA –Challenge to differentiate the reliability for different product offerings, based on the same platform Virtualization and automated control enables networks to build reliability at another layer –Is this more cost-effective or has better properties –What is the required platform reliability?

Applications to 5G and Virtualization Non-SIM/Non-HW ? –Is software-only possible from a security perspective for network access, service access, fraud prevention, etc. Pattern recognition on encrypted packets –What can be said about encrypted traffic –For some traffic management applications in the network it might be good enough Several layers of virtualization and/or abstraction –Nested virtualization technologies are security-wise a challenge –Specifically, hardware oriented approaches, since virtualization is abstracting away the hardware

Various PKI –CA as single point of failure –Trust in Internet in general Next generation crypto –Applicability of new crypto technology –Quantum-proof crypto-algorithms –Future proof of our security solutions in practice? Block chain –Applicability to various use cases possible beyond crypto-money? Everything encrypted by browser/application –http 2.0 and proxying –Customer associates security with telco