Your SlideShare is downloading. ×
Cognitive Security - Telco & Mobile Security ('12)
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cognitive Security - Telco & Mobile Security ('12)

1,302
views

Published on

Download the original PowerPoint version here: http://gdusil.wordpress.com/2013/03/08/telco-and-mobile-security-12/ …

Download the original PowerPoint version here: http://gdusil.wordpress.com/2013/03/08/telco-and-mobile-security-12/
Check out my blog "Multiscreen & OTT for the Digital Generation" @ gdusil.wordpress.com.

As mobile data is expected to grow 16 fold over the next four years*, mobile providers are facing new challenges in balancing subscriber ease-of-use, with cyber-security protection.  This explosion in cellular usage and mobile commerce will require advanced levels of protection for mobile users, as hackers continue to find vulnerabilities to exploit. A dual strategy which includes end-point and infrastructure security will provide robust and cost effective levels of protection, which will also expand provider revenue streams to enhanced services, and increase ARPU through value added security solutions.  Network Behavior Analysis is a viable building block to infrastructure security, and helps to protects a collective subscriber base against sophisticated mobile cyber-attacks.
*Cisco - Visual Networking Index Global Mobile Data '11 ARPU – Average Revenue Per User

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,302
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
37
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Gabriel DusilVP, Global Sales & Marketing www.facebook.com/gdusil cz.linkedin.com/in/gabrieldusil gdusil.wordpress.com dusilg@gmail.com
  • 2. Permissions Limited access to approved data/systemsAccess Control Password & Idle screen locking AndroidIsolation Limits an apps ability to access data or other system resources Apple iOSEncryption Conceal data at rest on the deviceProvenance Apps are stamped to identity the author for tamper resistance Experts in Network Behavior Analysis Page 2, www.cognitive-security.com Symantec - A Window Into Mobile Device Security (11.Jun) © 2012, gdusil.wordpress.com
  • 3. Mobile devices hold a richset of personal information: Location details browsing & call history contact lists & phone #’s SMS, email & Facebook Calendar details Passwords in clear text Premium-rate callingInternet Access remainsa large vulnerability holeUp-In-Coming Threats Micro-payment vulnerabilities Access to corporate server “LikeJacking” McAfee - Mobility and Security Dazzling Opportunities, Experts in Network Behavior Analysis Profound Challenges (11.May) Page 3, www.cognitive-security.com LookOut - Mobile Threat Report (11.Aug) © 2012, gdusil.wordpress.com
  • 4. Recent Issues… Device Management Checklist iPhone “Root-kitting” • Bypassing device security Cur- Next Description Theft of smartphones, & tablets rent Gen • sensitive records compromised Device Upgrade Flexibility   Spoofed ActiveSync policy apps • Reporting higher security than Threat Analysis   what is actually available Location-Aware usage   “Co-mingling” User Device Switching   • Mixing private & corporate data Malware Device Policy Capabilities   • Stealing data & bandwidth Network Security   • Uncertified apps with malware Dynamic Corporate Policies   • Capturing info & forwarding Scalability Expandability   App & Data Security   Experts in Network Behavior Analysis Page 4, www.cognitive-security.com J. Gold - A Heuristic Approach to Mobile Security, ‘11 © 2012, gdusil.wordpress.com
  • 5. Experts in Network Behavior Analysis Page 5, www.cognitive-security.comLookOut - Mobile Threat Report (11.Aug) © 2012, gdusil.wordpress.com
  • 6. Awareness of CompanySecurity and Data ProtectionPolicies for Mobile Devices:Greatest Security Concerns for Mobile Devices Experts in Network Behavior Analysis McAfee - Mobility and Security Dazzling Opportunities, Page 6, www.cognitive-security.com Profound Challenges (11.May) © 2012, gdusil.wordpress.com
  • 7. Subscribers Mobile users are in early stages of facing significant mobile threats. Handsets hold sensitive data • Access to sensitive data (online banking, micro payments) Subscriber are unaware of mobile security threats and mitigation is largely ignored. Operators  Lacking visibility to subscriber network activity & threats • mobile, land-line, & internet   protection for subscribers  Providing additional service value  Preparing for future mobile threats Experts in Network Behavior Analysis Page 7, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 8. Maintenance and Repair Managing signature updates Cost of paying to fix systems infected by malwareHardware Overhead Most anti-malware consume large amounts processing power, memory and storage space.Lost Productivity Lost Productivity per employee Differing mobile Operating Systems to manage infectionsCompany Costs Due to stolen Mbytes of bandwidth from Malware Experts in Network Behavior Analysis LookOut - Mobile Threat Report (11.Aug) Page 8, www.cognitive-security.com http://www.networksecurityjournal.com/features/malware-burden-012208/ © 2012, gdusil.wordpress.com
  • 9. Subscribers used 79 MB permonth in ‘10,  125% from ‘09 Expect a 16-fold increase (1.3 GB per month) by ‘15Average mobile speed in ‘10was 215 kbps,  2.2Mbps by‘15. Experts in Network Behavior Analysis Page 9, www.cognitive-security.com Cisco - Visual Networking Index Global Mobile Data 11 © 2012, gdusil.wordpress.com
  • 10. Evolving Usage by App – (Allot) Monthly Data Usage – (Nielson) Android 40% 580 Apple iPhone 35% Windows Mobile 480 BlackBerry 30% Windows 7 25% 380 20% File Sharing Web Browsing 15% Video Steaming 280 Other 10% VoIP & IM 180 5% 0% 80 Q209 Q309 Q409 Q110 Q210 Average– Mobile Trends, GlobalUsage Up 89% as Cost per MB Goes Down Allot U.S. Smartphone Data Mobile Broadband Traffic Report 11.H1 46% Experts in Network Behavior Analysis http://blog.nielsen.com/nielsenwire/online_mobile/ Page 10, www.cognitive-security.com http://www.wired.com/wiredscience/2011/06/how-much-does-your-data-cost/ © 2012, gdusil.wordpress.com
  • 11. Experts in Network Behavior Analysis Panda Security - Malware Statics, 11.Mar.16 Page 11, www.cognitive-security.comAllot – Mobile Trends, Global Mobile Broadband Traffic Report 11.H1 © 2012, gdusil.wordpress.com
  • 12. Malware bandwidth stolen From €15 to €60 per year0 €0.11 €0.10Accelerators Roaming will accelerate malware cost by over 30x1 €0.08 Multiple Malware instances  €0.07 Power Users are 25x more €0.06 exposed to malware costs2A Provider with 1m subscribers- Vampire Costs would exceed€30m per year3 Smartphones Data Cost 0 Based on 500 bytes/min typical = 21.6 MB per month @ €0.06 per MB, & up to 4 Malware per handset 1Based on Roaming costs in Europe between € 1.2 and € 12 Euros per MB, 2Based on 2GB monthly usage 3Average two malware instances across the subscriber base - http://ec.europa.eu/information_society/activities/roaming/data/index_en.htm Experts in Network Behavior Analysis - Average U.S. Smartphone Data Usage Up 89% as Cost per MB Goes Down 46% Page 12, www.cognitive-security.com http://blog.nielsen.com/nielsenwire/online_mobile/ © 2012, gdusil.wordpress.com
  • 13. Malware acting as abotnet will exploitmany vulnerabilities Abuse of premium- rate text messages Attacks gather sensitive data for commercial or political purposes Financial fraud as more mobile finance and payment apps emerge Experts in Network Behavior Analysis LookOut - Mobile Threat Report (11.Aug) Page 13, www.cognitive-security.com Cisco - Visual Networking Index Global Mobile Data 11 © 2012, gdusil.wordpress.com
  • 14. End-point protectionachieved by app suites Firewalls & VPN Disk Encryption Remote wiping Location-based services Anti-MalwareInfrastructure Securityutilizes Managed Security Flow statistics Policy compliance Intrusion detection Network Behavior Analysis • Separating normal behavior from anomalous behavior Experts in Network Behavior Analysis Page 14, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 15. Experts in Network Behavior AnalysisPage 15, www.cognitive-security.com© 2012, gdusil.wordpress.com
  • 16. Infrastructure The Identification Mobile SuspectedSecurity anomalies of deployed analyst (malicious)using detected by malware will services traffic isNetwork NBA will be help single- calls blocked,Behavior correlated out the subscriber filtered, orAnalysis (cross- malicious to confirm, diverted fromobserve referenced) software identify & the infectedmobile data with data & implement eliminate device.to identify from the mitigating malicious Networkirregularities handsets steps to behavior. traffic can bewhich may be where the protect optimized &due to the mobile anti- subscribers modeled inmalware malware order toactivity solutions improve are reliability. deployed. Experts in Network Behavior Analysis Page 16, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 17. Endpoint Security via securitysuites for mobile handsets “For €2 per month we will Via periodic signature updates protect you against malware- sent to the handset stealing-bandwidth & lost productivity”But Endpoint Security is relianton subscribers to install SWInfrastructure Security isnecessary to protect mobilesubscribers Via Network Behavior Analysis, core traffic patterns are analyzed and normal behavior is separated from abnormal behavior to detect malware Experts in Network Behavior Analysis Page 17, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 18.  Increased Revenue -  ARPU • Value-added security services Core Infrastructure Cost Saving • Reduce “stolen” BW by malware • Increased security & network visibility - leads to efficient infrastructure spending Increased Client Satisfaction • Client trust in mobile carrier through safer mobile surfing • Protect transactions for online banking, & confidentiality Competitive Differentiation • Through enhanced security  Increased Network Reliability services for corporate clients • From reduced malware instability Legal Conformity • Data traffic prediction becomes • Protection of minors, dangerous, & more precise, through modeling of illegal content legitimate applications Experts in Network Behavior Analysis Page 18, www.cognitive-security.com ARPU – Average Revenue Per User © 2012, gdusil.wordpress.com BW - Bandwidth
  • 19. Security Innovation Product Stability Delivering Next Generations  5th Generation Network Behavior Security Solutions Analysis platformResearch & Development Intuitive Management InterfaceExpertise  Easy-to-Use Dashboard Continual & Rapid development  Granular attack detection analysis Quick development turn-around Cost Effective R&D Resources Integration with OEMs, MSSPs, & Device manufacturersAddressing Privacy Concerns Data anonymity is maintained Experts in Network Behavior Analysis Page 19, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 20. “The number of times an “… mobile operators will try touninteresting thing happens prevent threats at the networkis an interesting thing.” level… ‘If the mobile operators Marcus Ranum pushed out antivirus to their “laws of intrusion detection.” customers’ devices, it would scare users … So operators are“Cybercriminals are investing keen to solve security issuesmore toward ‘R&D’ to find waysto use mobile devices and themselves at the networkpenetrate the cloud to seize the level.”data they need to make a profit  Gareth Machlachlanor undermine a company’s Chief Operating Officersuccess.” Cisco - Annual Security Report 11 Experts in Network Behavior Analysis TechTarget - Security Tech Guide Mobile 11, “Mobile Page 20, www.cognitive-security.com Phone Security Threats, Blended Attacks Increasing” © 2012, gdusil.wordpress.com
  • 21. http://gdusil.wordpress.com/2013/03/08/telco-and-mobile-security-12/ Experts in Network Behavior Analysis Page 21, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 22. Experts in Network Behavior AnalysisPage 22, www.cognitive-security.com© 2012, gdusil.wordpress.com
  • 23.  As mobile data is expected to grow 16 fold over the next four years*, mobile providers are facing new challenges in balancing subscriber ease-of-use, with cyber-security protection. This explosion in cellular usage and mobile commerce will require advanced levels of protection for mobile users, as hackers continue to find vulnerabilities to exploit. A dual strategy which includes end-point and infrastructure security will provide robust and cost effective levels of protection, which will also expand provider revenue streams to enhanced services, and increase ARPU through value added security solutions. Network Behavior Analysis is a viable building block to infrastructure security, and helps to protects a collective subscriber base against sophisticated mobile cyber-attacks. • *Cisco - Visual Networking Index Global Mobile Data 11 ARPU – Average Revenue Per User Experts in Network Behavior Analysis Page 23, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 24. Network Behavior Analysis, NBA, Cyber Attacks, Forensics Analysis,Normal vs. Abnormal Behavior, Anomaly Detection, NetFlow, IncidentResponse, Security as a Service, SaaS, Managed Security Services,MSS, Monitoring & Management, Advanced Persistent Threats, APT,Zero-Day attacks, Zero Day attacks, polymorphic malware, ModernSophisticated Attacks, MSA, Non-Signature Detection, ArtificialIntelligence, A.I., AI, Security Innovation, Mobile security, CognitiveSecurity, Cognitive Analyst, Forensics analysis Experts in Network Behavior Analysis Page 24, www.cognitive-security.com © 2012, gdusil.wordpress.com

×