SlideShare a Scribd company logo
1 of 24
Bapinger Solution: Wireless Security   1




     WIRELESS SECURITY LECTURE



Djadja Sardjana
djadja@bapinger.web.id




7-Dec-09
Bapinger Solution: Wireless Security   2

    AGENDA :

      Introduction :
          Network Security Definition
          Virus, Worm, Trojan and
      Intrusion Attack

       Bapinger Wireless Security
      Solutions

      Conclusion




7-Dec-09
Bapinger Solution: Wireless Security   3


   INTRODUCTION :
      NETWORK SECURITY DEFINITION
      VIRUS, WORM, TROJAN AND INTRUSION ATTACK




    Bapinger Solution,
    Djadja Achmad S




7-Dec-09
NETWORK SECURITY                    Bapinger Solution: Wireless Security   4

       DEFINITION

  1.   The protection of networks and their services from unauthorized
       modification, destruction, or disclosure. Network security provides
       for assurance that a network performs its critical functions correctly
       and there are no harmful side effects. (US Army Information
       Assurance Security Officer (IASO) /
       http://ia.gordon.army.mil/iaso/default.htm)
  2.    Computer security is the effort to create a secure computing
       platform, designed so that agents (users or programs) can only
       perform actions that have been allowed. This involves specifying
       and implementing a security policy. The actions in question can be
       reduced to operations of access, modification and deletion.
       Computer security can be seen as a subfield of security
       engineering, which looks at broader security issues in addition to
       computer security.
       (Wikipedia / en.wikipedia.org/wiki/Network_security)


7-Dec-09
Bapinger Solution: Wireless Security   5
  TELECOMMUNICATION
  NETWORK SECURITY

  Quote from Houlin Zhao, Director of the Telecom
      Standardization Bureau, ITU :
      “All businesses face pressure to increase revenue and
      reduce costs. And in the face of this pressure, security is
      often sidelined as non-essential. But investment in
      security is money in the bank. And investment in the
      making of security standards means that manufacturers
      and service providers can be sure that their needs and
      views are taken into account. “
  (http://www.itu.int/ITU-T/lighthouse/articles/ecta-
      2004.html)


7-Dec-09
VIRUS, WORM, TROJAN                                  Bapinger Solution: Wireless Security   6

AND INTRUSION ATTACK
  What is a virus?
    A computer virus, according to Webster's Collegiate Dictionary, is
    "a computer program usually hidden within another seemingly
    innocuous program that produces copies of itself and inserts them
    into other programs or files, and that usually performs a malicious
    action (such as destroying data)".
    Two categories of viruses:
    - macro viruses
    - worms

      Computer viruses are never naturally occurring; they are always
      man-made. Once created and released, however, their spread is
      not directly under human control.
  (Indiana University Knowledge Base / http://kb.iu.edu/data/aehm.html )



7-Dec-09
VIRUS, WORM, TROJAN                         Bapinger Solution: Wireless Security   7

AND INTRUSION ATTACK

  What is a Trojan horse?
    Named after the wooden horse the
    Greeks used to infiltrate Troy. According
    to some people, a virus is a particular
    case of a Trojan horse, namely one which
    is able to spread to other programs (i.e.,
    it turns them into Trojans too). According
    to others, a virus that does not do any
    deliberate damage (other than merely
    replicating) is not a Trojan. Finally,
    despite the definitions, many people use
    the term "Trojan" to refer only to a non-
    replicating malicious program.
     (Indiana University Knowledge Base /
     http://kb.iu.edu/data/aehm.html )




7-Dec-09
VIRUS, WORM, TROJAN                                                       Bapinger Solution: Wireless Security   8


AND INTRUSION ATTACK
  What is a Intrusion Attack?
        The willful or negligent unauthorized
    activity that affects the availability,
    confidentiality, or integrity of computer
    resources. Computer abuse includes
    fraud, embezzlement, theft, malicious
    damage, unauthorized use, denial of
    service, and misappropriation.
        Operations to disrupt, deny, degrade,
    or destroy information resident in
    computers and computer networks, or the
    computers and networks themselves.
    (DODD S-3600.1 of 9 Dec 96)

  (Texas State Library Home Page / http://www.tsl.state.tx.us/ld/pubs/compsecurity/glossary.html
        )




7-Dec-09
Bapinger Solution: Wireless Security   9




    BAPINGER WIRELESS
    SECURITY SOLUTIONS
    PORTFOLIOS




    Bapinger Solution,
    Djadja Achmad S



7-Dec-09
Business Position
10




Practice
Areas




         • Network Support        • Planning & Design • GAMA                  • Managed Operations
         • Optimization           • Install & Comm       (Services              Services
Key      • Operations             • Network Integration Development           • Seamless Mobility
Elements & Maintenance            • Program              and Delivery           Management
         • Network                  Management           Platform)            • Managed Security
           Management                                  • Hosted Services        Services
                                                       • Content              • Project and Outsource
             •Security                                   Management             Management Services
             • Training                                • IMS/non-IMS
                                                         Revenue Based
           “Total Network Care”
                                                         Applications
                            Bapinger Solution: Wireless Security   7-Dec-09
Future Growth is in IP Based Services
11    Billions of
     Subscribers

       1.8
       1.6                                                                   IP Services:
                                                                             VoIP
       1.4                   IP Enabled                                      PoC, Push-to-View
       1.2                                                                   SMS & IM
         1                                                                   Music
                                                                             Gaming
       0.8                                                                   Presence
                                                                             Location Based Srvs
       0.6
                                                                             Multimedia Messaging
       0.4                          Circuit Only                             Video Streaming
       0.2                                                                   Converged Voice
                                                                             Srvs
         0
              2002   2003   2004   2005    2006     2007      2008
                                                  Source: IMS Research

        Market is moving towards IP enabled service

                             Bapinger Solution: Wireless Security        7-Dec-09
GROWTH IN DATA SERVICES
                      Worldwide Wireless
                   Operator Data Revenue ($M)

     100.000
                                           92.011


      80.000
                                  71.272


      60.000                 51.897                 Total
                                                    SMS
                                                    Rich Data
                        34.117                      MMS
      40.000
                    20.311


      20.000   12.978



          0                                           Source:
               2003 2004 2005 2006 2007 2008          MOT est.


       Introduce new applications and services
      consistently and securely while optimizing
       total cost of ownership, time-to-revenue
            and delivery of compelling new
                      applications
OPERATOR FOCUS / CONCERNS
13
               Planning & Strategy
                Enterprise customers recognize security as
                differentiator
     Focus      Concerned about migration to open, IP-based
                network
                Impact of government regulations and requirements
                How do we improve security while controlling costs?


             Security into Operations
               How do I structure my security organization?
 Concerns      Need to coordinate multiple organizations, no standards
               We need a security baseline to develop a plan
               We’re concerned about virus activity
               How to define and split security domains, what to protect?
               Potential vulnerabilities from the roaming environment
               Bapinger Solution: Wireless Security   7-Dec-09
SECURITY – ALREADY AFFECTING
      WIRELESS CARRIERS
14
                                                                              Total 183 Million Reported Security Incidents
                                                                              Number of Internet Security Incidents Reported
 Attacks Are:                                                            90
                                                                         80
                                                                                                                           82.1
                                                                                 ($000's)
 ► Occurring More Frequently                                             70
 ► Disruptive And Costly                                                 60                                             52.7
                                                                         50
 ► Impacting Operators As Data Usage Grows                               40
                                                                         30                                        21.8
                                                                         20
                                                                                                                    9.9
                                                                         10
                                                                               0.1 0. 0.4 0.8 1.3 2.3 2. 2. 2.1 3.7
                                                                          0        3                  4 6
              Downtime Impact/Revenue Per Hour                              88 89 90 91 92 93 94 95 96 97 98 99 00 01 02
 ($000's)
 $3,000
                                                                           Cost of Computer Crime & Security Losses
 $2,500
                                                                           Total Losses Reported (1997-2002): $1.43B
 $2,000                                                                   450                                             $425
                                                                          400                                    $378
 $1,500
                                                                          350
 $1,000                                                                   300                             $265
     $500                                                                 250
                                                                          200
     $-                                                                                     $137
                                                                          150                      $124
            Energy Telecom   MFG Financial   Info   Insurance Retail             $100
                                             Tech                         100
      Source: Meta Group                                                   50
                                                                            0
                                                                                 1997   1998     1999     2000   2001     2002E
                                                                                Source: CSI/FBI Survey
                                               Bapinger Solution: Wireless Security          7-Dec-09
FASTER CYCLES:
      Time From Vulnerability To Attack



300


250                  300 days from known vulnerability
                     until widespread attack in 1999…
200


150


100


 50                                                  Now only 10 days!!!
  0
        1999       2000        2001        2002        2003           2004

                                                                             Foundstone Data


        Vulnerability Management Capability is Baseline Requirement
OPERATOR’S DILEMMA
16
                                                                        Significant Barriers to Improving Network Security
                                                                        Determining NW Security Requirements
       Operators Know The
     Importance Of Security…                                                               Cost of Products/tools

                                                                                     Lack of Experienced staff

                                                                       Justify Cost/Benefit to Mgmt
            Importance of Improving
               Network Security                                                   Other projects

                     Very Important                                             Staff Training
                         75%
                                                                     Lack of Products/Tools

                                                                              Staff Turnover

                                                                0%      10%        20%         30%    40%        50%   60%

      Not So                                   Somewhat
     Important                                 Important
       6%                                        19%

                                                                                    …But Seeking Assistance
                                                                                     On How To Address It
     Source: IDC, Lucent Network Security Survey
                                              Bapinger Solution: Wireless Security       7-Dec-09
Enabling Revenue
17




             Comprehensive Security Program
              Provides Market Differentiation
              Bapinger Solution: Wireless Security   7-Dec-09
THE CHALLENGE – WIRELESS
 OPERATORS
Rapidly Expanding Operations
    Subscriber Base; Coverage; Revenue-Generating Services


Operations in Multiple Markets
    Multiple operations
    Varied policy and processes


Management Realization
    Growing awareness of need
    Minimal understanding of security capability
    Lack comprehensive vulnerability data
    Suspected breeches, reactive approach
    Security Purchases/Effort Integration
THE CHALLENGE – WIRELESS
OPERATORS
Vulnerabilities & Issues
    Quantity Varies with Size of Network
        From 200 to over 1000 issues identified
        High + Medium Risk = 30% to 70% of issues
    Multiple Sources of Issues
        Policy – Few Policies, Low/No Framework or Policy
        Management
        Process – Security updates, monitoring of network
        Operations – Lack of metrics and vulnerability data or
        remediation programs
        Password Management – Easily cracked passwords, shared or no
        passwords
        Funding – Prioritization, requisite skills or resource investment
    But….
        Operational Awareness of Need
        Small contingent usually working to improve
               Project based, slow evolution of management support, want
               ability to focus
THE CHALLENGE – WIRELESS
 OPERATORS
Examples
   Charging Gateway Vulnerabilities
        High + Medium Risk = up to 53% of issues on these elements
   DNS Servers vulnerabilities
        High + Medium Risk = up to 32% of issues on these elements
        DNS Cache poisoning, flooding from mobile devices
   Firewall Vulnerabilities
        High + Medium Risk = up to 65% of issues on these elements
        GTP-aware capability available but not configured
   FTP Servers
        Known vulnerabilities with potential for DoS attacks; establish Superuser permissions; control FTP
        sites
   Lack of Defense-in-Depth
        Internal network with unrestricted protocol and service access
        Spoofed source address from GRX into network, Remove GTP tunnels
        Inject routing changes, Ability to leverage access across network
   Undocumented Network Elements
        Not documented = not managed. Unrestricted access, potential impact to availability
THE CHALLENGE – WIRELESS
OPERATORS
Examples
   Test Systems: Higher level of vulnerabilities
       But unrestricted access to production network
       Additional threat vector; Ability to bypass firewall protection
   Network Management Systems
       Access to broad range of network elements
       Comprehensive policy for access and management not evident
       Secure communication not addressed
   Policy – Passwords, Access controls
       Managing, changing, logging, distribution & storage procedures required
       Incomplete password management policy and/or not enforced
       Easily cracked passwords
       Access rights - Lack consistent procedure to update, review as roles/personnel change
   Policy – Audits
       Baseline vulnerability data unavailable, lack of remediation plan or process
Bapinger Solution: Wireless Security   22



 BAPINGER NETWORK SECURITY
 LECTURE
 CONCLUSION




    Bapinger Solution,
    Djadja Achmad S



7-Dec-09
CONCLUSION :
                                       Bapinger Solution: Wireless Security   23




    1.   The successful operation of today’s communications
         networks demands that many disparate systems and
         applications can talk to each other. It’s no wonder there
         are a few loopholes that make vulnerability on the
         networks.
    2.   In recent years the most obvious threat to computer
         systems has come from viruses. These attacks can usually
         be traced to exploitation of one of a small number of
         security flaws.
    3.   Insider attacks are almost certainly more common and
         have the potential to be much more damaging.
    4.   A simple policy of ensuring that all systems are kept up to
         date with the latest security patches and users are aware
         of some simple security rules will thwart the majority of
         these attacks.



7-Dec-09
Bapinger Solution: Wireless Security   24




     THANK YOU


    Bapinger Solution,
    Djadja Achmad S




7-Dec-09

More Related Content

What's hot

Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Securityanniebrowny
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Arrow ECS UK
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)itforum-roundtable
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Amazon Web Services
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Global Business Events
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Arrow ECS UK
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentationhemanth102030
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Ingram Micro Cloud
 
NetAuthority Brochure
NetAuthority BrochureNetAuthority Brochure
NetAuthority BrochureVivastream
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete SecurityCTI Group
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defenseZsolt Nemeth
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsZsolt Nemeth
 

What's hot (20)

Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
NetAuthority Brochure
NetAuthority BrochureNetAuthority Brochure
NetAuthority Brochure
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete Security
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
 
C2MS
C2MSC2MS
C2MS
 

Viewers also liked

Mark hopkins frühstück
Mark hopkins frühstückMark hopkins frühstück
Mark hopkins frühstückAccuraMediaGroup
 
Mike Szu self-introduction
Mike Szu self-introductionMike Szu self-introduction
Mike Szu self-introductionMike Szu
 
Ksztaltki dane
Ksztaltki daneKsztaltki dane
Ksztaltki daneKsztaltki
 
Opis firmy-ksztaltki
Opis firmy-ksztaltkiOpis firmy-ksztaltki
Opis firmy-ksztaltkiKsztaltki
 
Accura news for the travel industry v2 pre flight
Accura news for the travel industry v2 pre flight Accura news for the travel industry v2 pre flight
Accura news for the travel industry v2 pre flight AccuraMediaGroup
 
Le incatevoli forme dei Frattali
Le incatevoli forme dei FrattaliLe incatevoli forme dei Frattali
Le incatevoli forme dei Frattalisamu97
 
Concepciones filosóficas de la ciencia y su desarrollo en el siglo xx
Concepciones filosóficas de la ciencia y su desarrollo en el siglo xxConcepciones filosóficas de la ciencia y su desarrollo en el siglo xx
Concepciones filosóficas de la ciencia y su desarrollo en el siglo xxwalter mamani tuco
 
Unidad 3 Filosofía Valeria Lopez
Unidad 3 Filosofía Valeria LopezUnidad 3 Filosofía Valeria Lopez
Unidad 3 Filosofía Valeria Lopezvalerialopezrojas
 
投資事業瞭望台(3)
投資事業瞭望台(3)投資事業瞭望台(3)
投資事業瞭望台(3)City Cheng
 
投資事業瞭望台(1) - 破迷思
投資事業瞭望台(1) - 破迷思投資事業瞭望台(1) - 破迷思
投資事業瞭望台(1) - 破迷思City Cheng
 

Viewers also liked (20)

In frame films
In frame filmsIn frame films
In frame films
 
Mark hopkins frühstück
Mark hopkins frühstückMark hopkins frühstück
Mark hopkins frühstück
 
Mike Szu self-introduction
Mike Szu self-introductionMike Szu self-introduction
Mike Szu self-introduction
 
Sistema nervioso autonomo
Sistema nervioso autonomoSistema nervioso autonomo
Sistema nervioso autonomo
 
Grupos sanguíneos
Grupos sanguíneosGrupos sanguíneos
Grupos sanguíneos
 
Conrad ny dining
Conrad ny diningConrad ny dining
Conrad ny dining
 
42 ciko
42 ciko42 ciko
42 ciko
 
Ksztaltki dane
Ksztaltki daneKsztaltki dane
Ksztaltki dane
 
Sostema nervioso central
Sostema nervioso centralSostema nervioso central
Sostema nervioso central
 
Opis firmy-ksztaltki
Opis firmy-ksztaltkiOpis firmy-ksztaltki
Opis firmy-ksztaltki
 
RESUME
RESUMERESUME
RESUME
 
Accura news for the travel industry v2 pre flight
Accura news for the travel industry v2 pre flight Accura news for the travel industry v2 pre flight
Accura news for the travel industry v2 pre flight
 
merged_document
merged_documentmerged_document
merged_document
 
Sava auto
Sava autoSava auto
Sava auto
 
Le incatevoli forme dei Frattali
Le incatevoli forme dei FrattaliLe incatevoli forme dei Frattali
Le incatevoli forme dei Frattali
 
360Games Insight Session Slides
360Games Insight Session Slides360Games Insight Session Slides
360Games Insight Session Slides
 
Concepciones filosóficas de la ciencia y su desarrollo en el siglo xx
Concepciones filosóficas de la ciencia y su desarrollo en el siglo xxConcepciones filosóficas de la ciencia y su desarrollo en el siglo xx
Concepciones filosóficas de la ciencia y su desarrollo en el siglo xx
 
Unidad 3 Filosofía Valeria Lopez
Unidad 3 Filosofía Valeria LopezUnidad 3 Filosofía Valeria Lopez
Unidad 3 Filosofía Valeria Lopez
 
投資事業瞭望台(3)
投資事業瞭望台(3)投資事業瞭望台(3)
投資事業瞭望台(3)
 
投資事業瞭望台(1) - 破迷思
投資事業瞭望台(1) - 破迷思投資事業瞭望台(1) - 破迷思
投資事業瞭望台(1) - 破迷思
 

Similar to Bapinger Network Security

NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...Cloudera, Inc.
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data securityUlf Mattsson
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mefRafael Junquera
 
Issa chicago next generation tokenization ulf mattsson apr 2011
Issa chicago next generation tokenization ulf mattsson   apr 2011Issa chicago next generation tokenization ulf mattsson   apr 2011
Issa chicago next generation tokenization ulf mattsson apr 2011Ulf Mattsson
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonIBM Danmark
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...cVidya Networks
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 

Similar to Bapinger Network Security (20)

VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
S series presentation
S series presentationS series presentation
S series presentation
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data security
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mef
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Issa chicago next generation tokenization ulf mattsson apr 2011
Issa chicago next generation tokenization ulf mattsson   apr 2011Issa chicago next generation tokenization ulf mattsson   apr 2011
Issa chicago next generation tokenization ulf mattsson apr 2011
 
Nas nie zaatakują!
Nas nie zaatakują!Nas nie zaatakują!
Nas nie zaatakują!
 
Mcafee ips nsp-2011
Mcafee ips  nsp-2011Mcafee ips  nsp-2011
Mcafee ips nsp-2011
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Securing VoIP Networks
Securing VoIP NetworksSecuring VoIP Networks
Securing VoIP Networks
 

More from Djadja Sardjana

Perancangan Diklat/Training Berbasis e-Learning di Perusahaan
Perancangan Diklat/Training Berbasis e-Learning di PerusahaanPerancangan Diklat/Training Berbasis e-Learning di Perusahaan
Perancangan Diklat/Training Berbasis e-Learning di PerusahaanDjadja Sardjana
 
Organisasi dan Tata Kelola e-Learning di Perusahaan
Organisasi dan Tata Kelola e-Learning di PerusahaanOrganisasi dan Tata Kelola e-Learning di Perusahaan
Organisasi dan Tata Kelola e-Learning di PerusahaanDjadja Sardjana
 
Pengembangan SDM Pertanian Berbasis TIK Dalam Rangka Mengantisipasi MEA (Masy...
Pengembangan SDM Pertanian Berbasis TIK Dalam Rangka Mengantisipasi MEA (Masy...Pengembangan SDM Pertanian Berbasis TIK Dalam Rangka Mengantisipasi MEA (Masy...
Pengembangan SDM Pertanian Berbasis TIK Dalam Rangka Mengantisipasi MEA (Masy...Djadja Sardjana
 
Digitalization of Learning and Knowledge Management on Corporate
Digitalization of Learning and  Knowledge Management on Corporate  Digitalization of Learning and  Knowledge Management on Corporate
Digitalization of Learning and Knowledge Management on Corporate Djadja Sardjana
 
Konsep, Model dan Pengembangan Knowledge Management & e-Learning di Perusahaan
Konsep, Model dan Pengembangan Knowledge Management & e-Learning di PerusahaanKonsep, Model dan Pengembangan Knowledge Management & e-Learning di Perusahaan
Konsep, Model dan Pengembangan Knowledge Management & e-Learning di PerusahaanDjadja Sardjana
 
Corporate Learning Toward Corporate University (Pembelajaran Menuju Universit...
Corporate Learning Toward Corporate University (Pembelajaran Menuju Universit...Corporate Learning Toward Corporate University (Pembelajaran Menuju Universit...
Corporate Learning Toward Corporate University (Pembelajaran Menuju Universit...Djadja Sardjana
 
Peningkatan Kemampuan Mahasiswa Muslim Dalam Menghadapi Era Globalisasi
Peningkatan Kemampuan Mahasiswa Muslim Dalam Menghadapi Era GlobalisasiPeningkatan Kemampuan Mahasiswa Muslim Dalam Menghadapi Era Globalisasi
Peningkatan Kemampuan Mahasiswa Muslim Dalam Menghadapi Era GlobalisasiDjadja Sardjana
 
TechnoEduPreneur 30 Mei 2013 Higher Education 21st Century Learning
TechnoEduPreneur 30 Mei 2013 Higher Education 21st Century Learning TechnoEduPreneur 30 Mei 2013 Higher Education 21st Century Learning
TechnoEduPreneur 30 Mei 2013 Higher Education 21st Century Learning Djadja Sardjana
 
Seminar TechnoEduPreneur 1 Juni 2013: "Tantangan dan Kesempatan Yang Kita Had...
Seminar TechnoEduPreneur 1 Juni 2013: "Tantangan dan Kesempatan Yang Kita Had...Seminar TechnoEduPreneur 1 Juni 2013: "Tantangan dan Kesempatan Yang Kita Had...
Seminar TechnoEduPreneur 1 Juni 2013: "Tantangan dan Kesempatan Yang Kita Had...Djadja Sardjana
 
Teknik Kreatif Menjalankan Usaha
Teknik Kreatif Menjalankan UsahaTeknik Kreatif Menjalankan Usaha
Teknik Kreatif Menjalankan UsahaDjadja Sardjana
 
Human Capital Development & Future Learning for BCA
Human Capital Development & Future Learning for BCAHuman Capital Development & Future Learning for BCA
Human Capital Development & Future Learning for BCADjadja Sardjana
 
Corporate Ethics and Social Responsibility
Corporate Ethics and Social ResponsibilityCorporate Ethics and Social Responsibility
Corporate Ethics and Social ResponsibilityDjadja Sardjana
 
Basic Concept of Strategy & Strategic Management
Basic Concept of Strategy & Strategic Management Basic Concept of Strategy & Strategic Management
Basic Concept of Strategy & Strategic Management Djadja Sardjana
 
Manajemen Stratejik dan Manajemen Mutu Terpadu Bapinger University
Manajemen Stratejik dan Manajemen Mutu Terpadu Bapinger UniversityManajemen Stratejik dan Manajemen Mutu Terpadu Bapinger University
Manajemen Stratejik dan Manajemen Mutu Terpadu Bapinger UniversityDjadja Sardjana
 
Policy Making and Decision Making in Education
Policy Making and Decision Making in EducationPolicy Making and Decision Making in Education
Policy Making and Decision Making in EducationDjadja Sardjana
 
Kebijakan Pembelajaran Dengan e-Learning di Lembaga Pendidikan
Kebijakan Pembelajaran Dengan e-Learning di Lembaga PendidikanKebijakan Pembelajaran Dengan e-Learning di Lembaga Pendidikan
Kebijakan Pembelajaran Dengan e-Learning di Lembaga PendidikanDjadja Sardjana
 
ICBEM2012: Knowledge Management for Small and Medium Enterprises to Win the C...
ICBEM2012: Knowledge Management for Small and Medium Enterprises to Win the C...ICBEM2012: Knowledge Management for Small and Medium Enterprises to Win the C...
ICBEM2012: Knowledge Management for Small and Medium Enterprises to Win the C...Djadja Sardjana
 
Management Creativity and Its Form: Lecture on Corporate Creativity
Management Creativity and Its Form: Lecture on Corporate CreativityManagement Creativity and Its Form: Lecture on Corporate Creativity
Management Creativity and Its Form: Lecture on Corporate CreativityDjadja Sardjana
 
Process of Creative Regeneration: Lecture on Corporate Creativity
Process of Creative Regeneration: Lecture on Corporate CreativityProcess of Creative Regeneration: Lecture on Corporate Creativity
Process of Creative Regeneration: Lecture on Corporate CreativityDjadja Sardjana
 
Creative Management: Lecture on Corporate Creativity
Creative Management: Lecture on Corporate CreativityCreative Management: Lecture on Corporate Creativity
Creative Management: Lecture on Corporate CreativityDjadja Sardjana
 

More from Djadja Sardjana (20)

Perancangan Diklat/Training Berbasis e-Learning di Perusahaan
Perancangan Diklat/Training Berbasis e-Learning di PerusahaanPerancangan Diklat/Training Berbasis e-Learning di Perusahaan
Perancangan Diklat/Training Berbasis e-Learning di Perusahaan
 
Organisasi dan Tata Kelola e-Learning di Perusahaan
Organisasi dan Tata Kelola e-Learning di PerusahaanOrganisasi dan Tata Kelola e-Learning di Perusahaan
Organisasi dan Tata Kelola e-Learning di Perusahaan
 
Pengembangan SDM Pertanian Berbasis TIK Dalam Rangka Mengantisipasi MEA (Masy...
Pengembangan SDM Pertanian Berbasis TIK Dalam Rangka Mengantisipasi MEA (Masy...Pengembangan SDM Pertanian Berbasis TIK Dalam Rangka Mengantisipasi MEA (Masy...
Pengembangan SDM Pertanian Berbasis TIK Dalam Rangka Mengantisipasi MEA (Masy...
 
Digitalization of Learning and Knowledge Management on Corporate
Digitalization of Learning and  Knowledge Management on Corporate  Digitalization of Learning and  Knowledge Management on Corporate
Digitalization of Learning and Knowledge Management on Corporate
 
Konsep, Model dan Pengembangan Knowledge Management & e-Learning di Perusahaan
Konsep, Model dan Pengembangan Knowledge Management & e-Learning di PerusahaanKonsep, Model dan Pengembangan Knowledge Management & e-Learning di Perusahaan
Konsep, Model dan Pengembangan Knowledge Management & e-Learning di Perusahaan
 
Corporate Learning Toward Corporate University (Pembelajaran Menuju Universit...
Corporate Learning Toward Corporate University (Pembelajaran Menuju Universit...Corporate Learning Toward Corporate University (Pembelajaran Menuju Universit...
Corporate Learning Toward Corporate University (Pembelajaran Menuju Universit...
 
Peningkatan Kemampuan Mahasiswa Muslim Dalam Menghadapi Era Globalisasi
Peningkatan Kemampuan Mahasiswa Muslim Dalam Menghadapi Era GlobalisasiPeningkatan Kemampuan Mahasiswa Muslim Dalam Menghadapi Era Globalisasi
Peningkatan Kemampuan Mahasiswa Muslim Dalam Menghadapi Era Globalisasi
 
TechnoEduPreneur 30 Mei 2013 Higher Education 21st Century Learning
TechnoEduPreneur 30 Mei 2013 Higher Education 21st Century Learning TechnoEduPreneur 30 Mei 2013 Higher Education 21st Century Learning
TechnoEduPreneur 30 Mei 2013 Higher Education 21st Century Learning
 
Seminar TechnoEduPreneur 1 Juni 2013: "Tantangan dan Kesempatan Yang Kita Had...
Seminar TechnoEduPreneur 1 Juni 2013: "Tantangan dan Kesempatan Yang Kita Had...Seminar TechnoEduPreneur 1 Juni 2013: "Tantangan dan Kesempatan Yang Kita Had...
Seminar TechnoEduPreneur 1 Juni 2013: "Tantangan dan Kesempatan Yang Kita Had...
 
Teknik Kreatif Menjalankan Usaha
Teknik Kreatif Menjalankan UsahaTeknik Kreatif Menjalankan Usaha
Teknik Kreatif Menjalankan Usaha
 
Human Capital Development & Future Learning for BCA
Human Capital Development & Future Learning for BCAHuman Capital Development & Future Learning for BCA
Human Capital Development & Future Learning for BCA
 
Corporate Ethics and Social Responsibility
Corporate Ethics and Social ResponsibilityCorporate Ethics and Social Responsibility
Corporate Ethics and Social Responsibility
 
Basic Concept of Strategy & Strategic Management
Basic Concept of Strategy & Strategic Management Basic Concept of Strategy & Strategic Management
Basic Concept of Strategy & Strategic Management
 
Manajemen Stratejik dan Manajemen Mutu Terpadu Bapinger University
Manajemen Stratejik dan Manajemen Mutu Terpadu Bapinger UniversityManajemen Stratejik dan Manajemen Mutu Terpadu Bapinger University
Manajemen Stratejik dan Manajemen Mutu Terpadu Bapinger University
 
Policy Making and Decision Making in Education
Policy Making and Decision Making in EducationPolicy Making and Decision Making in Education
Policy Making and Decision Making in Education
 
Kebijakan Pembelajaran Dengan e-Learning di Lembaga Pendidikan
Kebijakan Pembelajaran Dengan e-Learning di Lembaga PendidikanKebijakan Pembelajaran Dengan e-Learning di Lembaga Pendidikan
Kebijakan Pembelajaran Dengan e-Learning di Lembaga Pendidikan
 
ICBEM2012: Knowledge Management for Small and Medium Enterprises to Win the C...
ICBEM2012: Knowledge Management for Small and Medium Enterprises to Win the C...ICBEM2012: Knowledge Management for Small and Medium Enterprises to Win the C...
ICBEM2012: Knowledge Management for Small and Medium Enterprises to Win the C...
 
Management Creativity and Its Form: Lecture on Corporate Creativity
Management Creativity and Its Form: Lecture on Corporate CreativityManagement Creativity and Its Form: Lecture on Corporate Creativity
Management Creativity and Its Form: Lecture on Corporate Creativity
 
Process of Creative Regeneration: Lecture on Corporate Creativity
Process of Creative Regeneration: Lecture on Corporate CreativityProcess of Creative Regeneration: Lecture on Corporate Creativity
Process of Creative Regeneration: Lecture on Corporate Creativity
 
Creative Management: Lecture on Corporate Creativity
Creative Management: Lecture on Corporate CreativityCreative Management: Lecture on Corporate Creativity
Creative Management: Lecture on Corporate Creativity
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Bapinger Network Security

  • 1. Bapinger Solution: Wireless Security 1 WIRELESS SECURITY LECTURE Djadja Sardjana djadja@bapinger.web.id 7-Dec-09
  • 2. Bapinger Solution: Wireless Security 2 AGENDA : Introduction : Network Security Definition Virus, Worm, Trojan and Intrusion Attack Bapinger Wireless Security Solutions Conclusion 7-Dec-09
  • 3. Bapinger Solution: Wireless Security 3 INTRODUCTION : NETWORK SECURITY DEFINITION VIRUS, WORM, TROJAN AND INTRUSION ATTACK Bapinger Solution, Djadja Achmad S 7-Dec-09
  • 4. NETWORK SECURITY Bapinger Solution: Wireless Security 4 DEFINITION 1. The protection of networks and their services from unauthorized modification, destruction, or disclosure. Network security provides for assurance that a network performs its critical functions correctly and there are no harmful side effects. (US Army Information Assurance Security Officer (IASO) / http://ia.gordon.army.mil/iaso/default.htm) 2. Computer security is the effort to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion. Computer security can be seen as a subfield of security engineering, which looks at broader security issues in addition to computer security. (Wikipedia / en.wikipedia.org/wiki/Network_security) 7-Dec-09
  • 5. Bapinger Solution: Wireless Security 5 TELECOMMUNICATION NETWORK SECURITY Quote from Houlin Zhao, Director of the Telecom Standardization Bureau, ITU : “All businesses face pressure to increase revenue and reduce costs. And in the face of this pressure, security is often sidelined as non-essential. But investment in security is money in the bank. And investment in the making of security standards means that manufacturers and service providers can be sure that their needs and views are taken into account. “ (http://www.itu.int/ITU-T/lighthouse/articles/ecta- 2004.html) 7-Dec-09
  • 6. VIRUS, WORM, TROJAN Bapinger Solution: Wireless Security 6 AND INTRUSION ATTACK What is a virus? A computer virus, according to Webster's Collegiate Dictionary, is "a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data)". Two categories of viruses: - macro viruses - worms Computer viruses are never naturally occurring; they are always man-made. Once created and released, however, their spread is not directly under human control. (Indiana University Knowledge Base / http://kb.iu.edu/data/aehm.html ) 7-Dec-09
  • 7. VIRUS, WORM, TROJAN Bapinger Solution: Wireless Security 7 AND INTRUSION ATTACK What is a Trojan horse? Named after the wooden horse the Greeks used to infiltrate Troy. According to some people, a virus is a particular case of a Trojan horse, namely one which is able to spread to other programs (i.e., it turns them into Trojans too). According to others, a virus that does not do any deliberate damage (other than merely replicating) is not a Trojan. Finally, despite the definitions, many people use the term "Trojan" to refer only to a non- replicating malicious program. (Indiana University Knowledge Base / http://kb.iu.edu/data/aehm.html ) 7-Dec-09
  • 8. VIRUS, WORM, TROJAN Bapinger Solution: Wireless Security 8 AND INTRUSION ATTACK What is a Intrusion Attack? The willful or negligent unauthorized activity that affects the availability, confidentiality, or integrity of computer resources. Computer abuse includes fraud, embezzlement, theft, malicious damage, unauthorized use, denial of service, and misappropriation. Operations to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. (DODD S-3600.1 of 9 Dec 96) (Texas State Library Home Page / http://www.tsl.state.tx.us/ld/pubs/compsecurity/glossary.html ) 7-Dec-09
  • 9. Bapinger Solution: Wireless Security 9 BAPINGER WIRELESS SECURITY SOLUTIONS PORTFOLIOS Bapinger Solution, Djadja Achmad S 7-Dec-09
  • 10. Business Position 10 Practice Areas • Network Support • Planning & Design • GAMA • Managed Operations • Optimization • Install & Comm (Services Services Key • Operations • Network Integration Development • Seamless Mobility Elements & Maintenance • Program and Delivery Management • Network Management Platform) • Managed Security Management • Hosted Services Services • Content • Project and Outsource •Security Management Management Services • Training • IMS/non-IMS Revenue Based “Total Network Care” Applications Bapinger Solution: Wireless Security 7-Dec-09
  • 11. Future Growth is in IP Based Services 11 Billions of Subscribers 1.8 1.6 IP Services: VoIP 1.4 IP Enabled PoC, Push-to-View 1.2 SMS & IM 1 Music Gaming 0.8 Presence Location Based Srvs 0.6 Multimedia Messaging 0.4 Circuit Only Video Streaming 0.2 Converged Voice Srvs 0 2002 2003 2004 2005 2006 2007 2008 Source: IMS Research Market is moving towards IP enabled service Bapinger Solution: Wireless Security 7-Dec-09
  • 12. GROWTH IN DATA SERVICES Worldwide Wireless Operator Data Revenue ($M) 100.000 92.011 80.000 71.272 60.000 51.897 Total SMS Rich Data 34.117 MMS 40.000 20.311 20.000 12.978 0 Source: 2003 2004 2005 2006 2007 2008 MOT est. Introduce new applications and services consistently and securely while optimizing total cost of ownership, time-to-revenue and delivery of compelling new applications
  • 13. OPERATOR FOCUS / CONCERNS 13 Planning & Strategy Enterprise customers recognize security as differentiator Focus Concerned about migration to open, IP-based network Impact of government regulations and requirements How do we improve security while controlling costs? Security into Operations How do I structure my security organization? Concerns Need to coordinate multiple organizations, no standards We need a security baseline to develop a plan We’re concerned about virus activity How to define and split security domains, what to protect? Potential vulnerabilities from the roaming environment Bapinger Solution: Wireless Security 7-Dec-09
  • 14. SECURITY – ALREADY AFFECTING WIRELESS CARRIERS 14 Total 183 Million Reported Security Incidents Number of Internet Security Incidents Reported Attacks Are: 90 80 82.1 ($000's) ► Occurring More Frequently 70 ► Disruptive And Costly 60 52.7 50 ► Impacting Operators As Data Usage Grows 40 30 21.8 20 9.9 10 0.1 0. 0.4 0.8 1.3 2.3 2. 2. 2.1 3.7 0 3 4 6 Downtime Impact/Revenue Per Hour 88 89 90 91 92 93 94 95 96 97 98 99 00 01 02 ($000's) $3,000 Cost of Computer Crime & Security Losses $2,500 Total Losses Reported (1997-2002): $1.43B $2,000 450 $425 400 $378 $1,500 350 $1,000 300 $265 $500 250 200 $- $137 150 $124 Energy Telecom MFG Financial Info Insurance Retail $100 Tech 100 Source: Meta Group 50 0 1997 1998 1999 2000 2001 2002E Source: CSI/FBI Survey Bapinger Solution: Wireless Security 7-Dec-09
  • 15. FASTER CYCLES: Time From Vulnerability To Attack 300 250 300 days from known vulnerability until widespread attack in 1999… 200 150 100 50 Now only 10 days!!! 0 1999 2000 2001 2002 2003 2004 Foundstone Data Vulnerability Management Capability is Baseline Requirement
  • 16. OPERATOR’S DILEMMA 16 Significant Barriers to Improving Network Security Determining NW Security Requirements Operators Know The Importance Of Security… Cost of Products/tools Lack of Experienced staff Justify Cost/Benefit to Mgmt Importance of Improving Network Security Other projects Very Important Staff Training 75% Lack of Products/Tools Staff Turnover 0% 10% 20% 30% 40% 50% 60% Not So Somewhat Important Important 6% 19% …But Seeking Assistance On How To Address It Source: IDC, Lucent Network Security Survey Bapinger Solution: Wireless Security 7-Dec-09
  • 17. Enabling Revenue 17 Comprehensive Security Program Provides Market Differentiation Bapinger Solution: Wireless Security 7-Dec-09
  • 18. THE CHALLENGE – WIRELESS OPERATORS Rapidly Expanding Operations Subscriber Base; Coverage; Revenue-Generating Services Operations in Multiple Markets Multiple operations Varied policy and processes Management Realization Growing awareness of need Minimal understanding of security capability Lack comprehensive vulnerability data Suspected breeches, reactive approach Security Purchases/Effort Integration
  • 19. THE CHALLENGE – WIRELESS OPERATORS Vulnerabilities & Issues Quantity Varies with Size of Network From 200 to over 1000 issues identified High + Medium Risk = 30% to 70% of issues Multiple Sources of Issues Policy – Few Policies, Low/No Framework or Policy Management Process – Security updates, monitoring of network Operations – Lack of metrics and vulnerability data or remediation programs Password Management – Easily cracked passwords, shared or no passwords Funding – Prioritization, requisite skills or resource investment But…. Operational Awareness of Need Small contingent usually working to improve Project based, slow evolution of management support, want ability to focus
  • 20. THE CHALLENGE – WIRELESS OPERATORS Examples Charging Gateway Vulnerabilities High + Medium Risk = up to 53% of issues on these elements DNS Servers vulnerabilities High + Medium Risk = up to 32% of issues on these elements DNS Cache poisoning, flooding from mobile devices Firewall Vulnerabilities High + Medium Risk = up to 65% of issues on these elements GTP-aware capability available but not configured FTP Servers Known vulnerabilities with potential for DoS attacks; establish Superuser permissions; control FTP sites Lack of Defense-in-Depth Internal network with unrestricted protocol and service access Spoofed source address from GRX into network, Remove GTP tunnels Inject routing changes, Ability to leverage access across network Undocumented Network Elements Not documented = not managed. Unrestricted access, potential impact to availability
  • 21. THE CHALLENGE – WIRELESS OPERATORS Examples Test Systems: Higher level of vulnerabilities But unrestricted access to production network Additional threat vector; Ability to bypass firewall protection Network Management Systems Access to broad range of network elements Comprehensive policy for access and management not evident Secure communication not addressed Policy – Passwords, Access controls Managing, changing, logging, distribution & storage procedures required Incomplete password management policy and/or not enforced Easily cracked passwords Access rights - Lack consistent procedure to update, review as roles/personnel change Policy – Audits Baseline vulnerability data unavailable, lack of remediation plan or process
  • 22. Bapinger Solution: Wireless Security 22 BAPINGER NETWORK SECURITY LECTURE CONCLUSION Bapinger Solution, Djadja Achmad S 7-Dec-09
  • 23. CONCLUSION : Bapinger Solution: Wireless Security 23 1. The successful operation of today’s communications networks demands that many disparate systems and applications can talk to each other. It’s no wonder there are a few loopholes that make vulnerability on the networks. 2. In recent years the most obvious threat to computer systems has come from viruses. These attacks can usually be traced to exploitation of one of a small number of security flaws. 3. Insider attacks are almost certainly more common and have the potential to be much more damaging. 4. A simple policy of ensuring that all systems are kept up to date with the latest security patches and users are aware of some simple security rules will thwart the majority of these attacks. 7-Dec-09
  • 24. Bapinger Solution: Wireless Security 24 THANK YOU Bapinger Solution, Djadja Achmad S 7-Dec-09