SlideShare a Scribd company logo
Cyber Securing Physical Security
May 2015
Yossi Appleboum, CTO
Cyber Security Solutions
Introduction
• A physical security system is actually a network of embedded devices that
were designed, implemented and deployed with no cyber security in-mind
• These devices has minimal (if any) security mechanisms which makes
them exposed to cyber attacks that might decrease the physical security
level in the site
• The network in exposed to threats coming from outside (connections to
other networks and remote access) and from inside (connected devices,
servers and workstations and from unsecured network equipment)
• Physical security systems are predictable in their operation which makes
the network to be predictable and this makes it easier to secured them
while relying on searching for abnormal behavior
2
Vulnerabilities – IT Aspect
• Infected devices can attack the network by a DoS attack or a stream of bad
Ethernet packets
• DHCP attack may end up with an upload of Trojan software to a valid
device or to IP misconfiguration attack
• ARP poisoning / MAC spoofing attacks may allow injection of false data to
the network or interception of data
• Forgotten remote connection might expose the network to threats from the
internet (or any remote network)
• Using default or weak passwords might expose the system to various
attacks including taking over devices
• Network connections (wired and wireless) are exposed to attacks
especially in the outdoor environment
3
Vulnerabilities – Physical Security Aspect
• DoS attack = Loss of alarms, video stream and ability to control devices
(i.e. PTZ IP cameras)
• DHCP attack = Injection of false data (alarms, video) to the security system
and/or creating network failure
• ARP poisoning / MAC spoofing attacks = Injection of false data (alarms,
video) and interception of data (viewing video stream)
• Forgotten remote access connection, Using default or weak passwords,
Network connections = All of the above…
4
The Senstar Solution
• Senstar offers a unique solution to cyber secure physical security systems
while taking advantage on the unique network behavior of such networks
• The solution focuses on sealing the network and assuring that only valid
devices and data streams will be part of the network by providing security
to each of the network layers (in the OSI 7 layers model)
• The solution does not affect the operation of the physical security system,
the structure of the network and does not add more hardware or software
components
• The solution takes the “human factor” (AKA as “layer 8” in the OSI 7 layers
model) out of the security equation and eliminates the affect of user
passwords on the security of the system and network
5
The Senstar Solution
6
Monitoring link status, mapping MAC
addresses, data flows and utilization
Monitoring the fibers, copper cables
and PoE consumption
Mapping IP addresses and sessions
Mapping TCP/UDP ports (protocols)
Monitoring application usage
(Deep Packet Inspection)
{
Tungsten, just another switch?
Slide 7
1. Tungsten is a ruggedized cyber
security appliance for the edge
of the network
2. It is not “just another switch”, it
seals the network in both physical
and logical ways
3. Since building networks require
switches, the cyber security was
embedded into a switch
Securing the Physical Layer
8
• Our patented approach offers a simple, yet powerful level of security to the
edge of the network
• The philosophy behind this unique cyber security approach is to seal the
network rather than dealing with the user settings (i.e. passwords) and
applications
• Based on the physical layer security we are offering several applications
including a robust but cost sensitive dark fiber protection (compliant with
the NERC/FERC CIP)
Closing the door!
Cyber Security in 5 Simple Steps
• Install the Tungsten switches instead of non-secured Ethernet switches
(mainly at the edge of the network)
• Turn on the Tungsten, configure the security level per each port and let it
map the network (in most cases it takes about 1 second)
• View the list of discovered connections (including the mapping of the
cables and fibers) and approve it
• View the list of discovered devices (including the mapping of the Ethernet
and IP addresses) and approve it
• View the list of discovered data streams (including the TCP/IP
characteristics) and approve it
• Done… It takes 5 minutes to secure a network.
9
Slide 10
Current Solutions
No one offers a solution to secure the edge of the network
No one offers an appliance that seals the network
No one is securing the physical layer
No one… other than Senstar!
Thank You!

More Related Content

What's hot

Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
Sabreen Irfana
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
Yovan Chandel
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
Syed Ubaid Ali Jafri
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
Nasir Bhutta
 
Firewall
FirewallFirewall
Firewall
Hasnain Ali
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
Anne Starr
 
Firewall ppt
Firewall pptFirewall ppt
Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!Teddy Reed
 
Firewalls
FirewallsFirewalls
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed FirewallsApproach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
International Journal of Science and Research (IJSR)
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
Sandeep Yadav
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
Hishan Shouketh
 
Data Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed FirewallData Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed Firewall
Manish Kumar
 
Firewalls
FirewallsFirewalls
Firewalls
Sonali Parab
 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)
JIEMS Akkalkuwa
 

What's hot (20)

Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed FirewallsApproach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
 
Data Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed FirewallData Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)
 

Similar to Cyber Securing Physical Security May 2015

Firewall
FirewallFirewall
Firewall
Tapan Khilar
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
mike parks
 
Cyber security Chapter 05 Network Defenses
Cyber security Chapter 05 Network DefensesCyber security Chapter 05 Network Defenses
Cyber security Chapter 05 Network Defenses
AzarHamid
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
AuliaArifWardana
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
Radhika Talaviya
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
Waqas Ahmed Nawaz
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
ZahidHussainqaisar
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
ParasPatel967737
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
KalsoomTahir2
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
ParvezAhmed59842
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
Andy Shutka
 
network security / information security
network security / information securitynetwork security / information security
network security / information security
Rohan Choudhari
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
cmstiernberg
 
Major presentation
Major presentationMajor presentation
Major presentation
ashishg251
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureFiras Alsayied
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
ThangDang53
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applications
cmstiernberg
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
Uditha Bandara Wijerathna
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
Raja Waseem Akhtar
 
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
LakshayYadav46
 

Similar to Cyber Securing Physical Security May 2015 (20)

Firewall
FirewallFirewall
Firewall
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
 
Cyber security Chapter 05 Network Defenses
Cyber security Chapter 05 Network DefensesCyber security Chapter 05 Network Defenses
Cyber security Chapter 05 Network Defenses
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
network security / information security
network security / information securitynetwork security / information security
network security / information security
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
Major presentation
Major presentationMajor presentation
Major presentation
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applications
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
 
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
 

Cyber Securing Physical Security May 2015

  • 1. Cyber Securing Physical Security May 2015 Yossi Appleboum, CTO Cyber Security Solutions
  • 2. Introduction • A physical security system is actually a network of embedded devices that were designed, implemented and deployed with no cyber security in-mind • These devices has minimal (if any) security mechanisms which makes them exposed to cyber attacks that might decrease the physical security level in the site • The network in exposed to threats coming from outside (connections to other networks and remote access) and from inside (connected devices, servers and workstations and from unsecured network equipment) • Physical security systems are predictable in their operation which makes the network to be predictable and this makes it easier to secured them while relying on searching for abnormal behavior 2
  • 3. Vulnerabilities – IT Aspect • Infected devices can attack the network by a DoS attack or a stream of bad Ethernet packets • DHCP attack may end up with an upload of Trojan software to a valid device or to IP misconfiguration attack • ARP poisoning / MAC spoofing attacks may allow injection of false data to the network or interception of data • Forgotten remote connection might expose the network to threats from the internet (or any remote network) • Using default or weak passwords might expose the system to various attacks including taking over devices • Network connections (wired and wireless) are exposed to attacks especially in the outdoor environment 3
  • 4. Vulnerabilities – Physical Security Aspect • DoS attack = Loss of alarms, video stream and ability to control devices (i.e. PTZ IP cameras) • DHCP attack = Injection of false data (alarms, video) to the security system and/or creating network failure • ARP poisoning / MAC spoofing attacks = Injection of false data (alarms, video) and interception of data (viewing video stream) • Forgotten remote access connection, Using default or weak passwords, Network connections = All of the above… 4
  • 5. The Senstar Solution • Senstar offers a unique solution to cyber secure physical security systems while taking advantage on the unique network behavior of such networks • The solution focuses on sealing the network and assuring that only valid devices and data streams will be part of the network by providing security to each of the network layers (in the OSI 7 layers model) • The solution does not affect the operation of the physical security system, the structure of the network and does not add more hardware or software components • The solution takes the “human factor” (AKA as “layer 8” in the OSI 7 layers model) out of the security equation and eliminates the affect of user passwords on the security of the system and network 5
  • 6. The Senstar Solution 6 Monitoring link status, mapping MAC addresses, data flows and utilization Monitoring the fibers, copper cables and PoE consumption Mapping IP addresses and sessions Mapping TCP/UDP ports (protocols) Monitoring application usage (Deep Packet Inspection) {
  • 7. Tungsten, just another switch? Slide 7 1. Tungsten is a ruggedized cyber security appliance for the edge of the network 2. It is not “just another switch”, it seals the network in both physical and logical ways 3. Since building networks require switches, the cyber security was embedded into a switch
  • 8. Securing the Physical Layer 8 • Our patented approach offers a simple, yet powerful level of security to the edge of the network • The philosophy behind this unique cyber security approach is to seal the network rather than dealing with the user settings (i.e. passwords) and applications • Based on the physical layer security we are offering several applications including a robust but cost sensitive dark fiber protection (compliant with the NERC/FERC CIP) Closing the door!
  • 9. Cyber Security in 5 Simple Steps • Install the Tungsten switches instead of non-secured Ethernet switches (mainly at the edge of the network) • Turn on the Tungsten, configure the security level per each port and let it map the network (in most cases it takes about 1 second) • View the list of discovered connections (including the mapping of the cables and fibers) and approve it • View the list of discovered devices (including the mapping of the Ethernet and IP addresses) and approve it • View the list of discovered data streams (including the TCP/IP characteristics) and approve it • Done… It takes 5 minutes to secure a network. 9
  • 10. Slide 10 Current Solutions No one offers a solution to secure the edge of the network No one offers an appliance that seals the network No one is securing the physical layer No one… other than Senstar!