SlideShare a Scribd company logo
1 of 28
Strong Security
for Microwave
Radio
April 2013
AVIAT NETWORKS
WHY IS SECURITY BECOMING A GROWING CONCERN?
AVIAT NETWORKS
DRASTIC CONTEXT EVOLUTION
AVIAT NETWORKS
YOU THINK SECURITY IS IMPROVING IN KEY
NETWORKS? THINK AGAIN!
Extract from McAfee Avert Labs researcher Francois Paget's blog:
"…Modern SCADA networks are more vulnerable
than ever because they use open networking standards
(such as TCP/IP), are now deployed under less secure
operating systems (Windows), are connected to other
networks (including Internet), and cannot be easily
updated and rebooted."
AVIAT NETWORKS
WHY IS STRONGER SECURITY BECOMING A MUST?!
For example,
The U.S. State Dept. detects in a typical week over
a million external probes to their primary
non-classified network
• 340,000 computers are hijacked every day
Cybercrime economy was estimated at over
$1 trillion in 2010
Number of attacks are growing exponentially
AVIAT NETWORKS
YOU THINK STRONG SECURITY IS JUST FOR MILITARY?
THINK AGAIN!
Extract from Backbone magazine reporting on a McAfee survey of 600 IT executives:
AVIAT NETWORKS
FEELING SAFE BECAUSE YOU ARE NOT CONNECTED TO
INTERNET?
AVIAT NETWORKS
INSIDERS ARE THE #1 SOURCE OF HACKING/SECURITY
PROBLEMS
AVIAT NETWORKS
WHAT IS YOUR INFORMATION A WORTH?
AVIAT NETWORKS
SO FAR WE HAVE SEEN THAT…
AVIAT NETWORKS
NOW LET’S…
AVIAT NETWORKS
A FEW GENERAL SECURITY PRINCIPLES
AVIAT NETWORKS
A FEW GENERAL SECURITY PRINCIPLES
AVIAT NETWORKS
LET’S FACE IT…
You need the most complete solution possible!
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
W W W . AV I AT N E T W O R K S . C O M

More Related Content

What's hot

Nokia gsm-kpi-analysis-based-on-daily-monitoring-basis-presentation
Nokia gsm-kpi-analysis-based-on-daily-monitoring-basis-presentationNokia gsm-kpi-analysis-based-on-daily-monitoring-basis-presentation
Nokia gsm-kpi-analysis-based-on-daily-monitoring-basis-presentation
mohammed khairy
 
Ericsson technical interview questions
Ericsson technical interview questionsEricsson technical interview questions
Ericsson technical interview questions
sethshivam75
 

What's hot (20)

E2 e+call+setup+time+(cst)+enhacenments p3_benchmarking
E2 e+call+setup+time+(cst)+enhacenments p3_benchmarkingE2 e+call+setup+time+(cst)+enhacenments p3_benchmarking
E2 e+call+setup+time+(cst)+enhacenments p3_benchmarking
 
Factors affecting lte throughput and calculation methodology
Factors affecting lte throughput and calculation methodologyFactors affecting lte throughput and calculation methodology
Factors affecting lte throughput and calculation methodology
 
Lte basic parameters
Lte basic parametersLte basic parameters
Lte basic parameters
 
08. DRIVE TEST Analysis
08. DRIVE TEST Analysis08. DRIVE TEST Analysis
08. DRIVE TEST Analysis
 
1 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.00
1 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.001 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.00
1 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.00
 
Nokia gsm-kpi-analysis-based-on-daily-monitoring-basis-presentation
Nokia gsm-kpi-analysis-based-on-daily-monitoring-basis-presentationNokia gsm-kpi-analysis-based-on-daily-monitoring-basis-presentation
Nokia gsm-kpi-analysis-based-on-daily-monitoring-basis-presentation
 
Gsm interview question
Gsm interview questionGsm interview question
Gsm interview question
 
Fdd or tdd
Fdd or tddFdd or tdd
Fdd or tdd
 
Wcdma
WcdmaWcdma
Wcdma
 
LTE KPI
LTE KPILTE KPI
LTE KPI
 
dsp-processor-ppt.ppt
dsp-processor-ppt.pptdsp-processor-ppt.ppt
dsp-processor-ppt.ppt
 
UMTS Protocols
UMTS ProtocolsUMTS Protocols
UMTS Protocols
 
Top 10 3 G Radio Optimisation Actions
Top 10 3 G Radio Optimisation ActionsTop 10 3 G Radio Optimisation Actions
Top 10 3 G Radio Optimisation Actions
 
Umts
UmtsUmts
Umts
 
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
 
Nokia_GSM_KPI_ANALYSIS_Based_on_Daily_Mo.ppt
Nokia_GSM_KPI_ANALYSIS_Based_on_Daily_Mo.pptNokia_GSM_KPI_ANALYSIS_Based_on_Daily_Mo.ppt
Nokia_GSM_KPI_ANALYSIS_Based_on_Daily_Mo.ppt
 
Ericsson technical interview questions
Ericsson technical interview questionsEricsson technical interview questions
Ericsson technical interview questions
 
Sync in 3 g
Sync in 3 gSync in 3 g
Sync in 3 g
 
FEC-Forward Error Correction for Optics Professionals
FEC-Forward Error Correction for Optics ProfessionalsFEC-Forward Error Correction for Optics Professionals
FEC-Forward Error Correction for Optics Professionals
 
ZTE-umts-congestion-control-feature-guide-v8-5-2011312
ZTE-umts-congestion-control-feature-guide-v8-5-2011312ZTE-umts-congestion-control-feature-guide-v8-5-2011312
ZTE-umts-congestion-control-feature-guide-v8-5-2011312
 

Similar to Strong Security for Microwave Radio

Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
Samuel Kamuli
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
mahendrarm2112
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
MeshDynamics
 
Topic #17 IT Security ITSecurityIncidentsA.docx
Topic #17   IT Security ITSecurityIncidentsA.docxTopic #17   IT Security ITSecurityIncidentsA.docx
Topic #17 IT Security ITSecurityIncidentsA.docx
juliennehar
 

Similar to Strong Security for Microwave Radio (20)

Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
The application security controller
The application security controllerThe application security controller
The application security controller
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Internet(2)
Internet(2)Internet(2)
Internet(2)
 
INSECURE Magazine - 39
INSECURE Magazine - 39INSECURE Magazine - 39
INSECURE Magazine - 39
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
SCADA White Paper March2012
SCADA White Paper March2012SCADA White Paper March2012
SCADA White Paper March2012
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
 
pptt.pptx
pptt.pptxpptt.pptx
pptt.pptx
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
 
Topic #17 IT Security ITSecurityIncidentsA.docx
Topic #17   IT Security ITSecurityIncidentsA.docxTopic #17   IT Security ITSecurityIncidentsA.docx
Topic #17 IT Security ITSecurityIncidentsA.docx
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Port security
Port securityPort security
Port security
 
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Cyber security and Industry.pptx
Cyber security and Industry.pptxCyber security and Industry.pptx
Cyber security and Industry.pptx
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 

More from Aviat Networks

More from Aviat Networks (16)

Case for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell SiteCase for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell Site
 
Innovations for Better Performing Networks
Innovations for Better Performing NetworksInnovations for Better Performing Networks
Innovations for Better Performing Networks
 
Small Cell Backhaul Technology
Small Cell Backhaul TechnologySmall Cell Backhaul Technology
Small Cell Backhaul Technology
 
Low latency Microwave: Fact, Fiction & Future
Low latency Microwave: Fact, Fiction & FutureLow latency Microwave: Fact, Fiction & Future
Low latency Microwave: Fact, Fiction & Future
 
5 Things You Should Know About Fronthaul
5 Things You Should Know About Fronthaul5 Things You Should Know About Fronthaul
5 Things You Should Know About Fronthaul
 
LONG HAUL MULTI-GIGABIT MICROWAVE: A NEW APPROACH
LONG HAUL MULTI-GIGABIT MICROWAVE: A NEW APPROACHLONG HAUL MULTI-GIGABIT MICROWAVE: A NEW APPROACH
LONG HAUL MULTI-GIGABIT MICROWAVE: A NEW APPROACH
 
Microwave Technology Options
Microwave Technology OptionsMicrowave Technology Options
Microwave Technology Options
 
Building the FirstNet Nationwide Network: Architecture Solutions
Building the FirstNet Nationwide Network: Architecture SolutionsBuilding the FirstNet Nationwide Network: Architecture Solutions
Building the FirstNet Nationwide Network: Architecture Solutions
 
LTE Backhaul Challenges, Small Cells and the Critical Role of Microwave
LTE Backhaul Challenges, Small Cells and the Critical Role of MicrowaveLTE Backhaul Challenges, Small Cells and the Critical Role of Microwave
LTE Backhaul Challenges, Small Cells and the Critical Role of Microwave
 
Best Practices for Building Ultra-Low Latency Microwave Networks
Best Practices for Building Ultra-Low Latency Microwave NetworksBest Practices for Building Ultra-Low Latency Microwave Networks
Best Practices for Building Ultra-Low Latency Microwave Networks
 
Improving Microwave Capacity
Improving Microwave CapacityImproving Microwave Capacity
Improving Microwave Capacity
 
The Evolution of Microwave Communications
The Evolution of Microwave CommunicationsThe Evolution of Microwave Communications
The Evolution of Microwave Communications
 
Eclipse IDU GE3 for Mobile Backhaul
Eclipse IDU GE3 for Mobile BackhaulEclipse IDU GE3 for Mobile Backhaul
Eclipse IDU GE3 for Mobile Backhaul
 
Microwave Solutions for LTE Networks
Microwave Solutions for LTE NetworksMicrowave Solutions for LTE Networks
Microwave Solutions for LTE Networks
 
Turnkey Network Services - Aviat Networks
Turnkey Network Services - Aviat NetworksTurnkey Network Services - Aviat Networks
Turnkey Network Services - Aviat Networks
 
IP Mobile Backhaul Presentation
IP Mobile Backhaul PresentationIP Mobile Backhaul Presentation
IP Mobile Backhaul Presentation
 

Recently uploaded

Recently uploaded (20)

Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 

Strong Security for Microwave Radio