SlideShare a Scribd company logo
1 of 14
ESTAM FORMATION UNIVERSITY
SEME CAMPUS, COTONOU, BENIN
REPUBLIC
UCHENNA RAPHAEL
UCHECHUKWUKA
FACULTY OF ENGINEERING
DEPARTMENT OF COMPUTER
ENGINEERING
200 LEVEL
GSM BASED
SECURITY
AND ACCESS
CONTROL
SYSTEM
WHAT IS GSM?
The Global System for Mobile Communication
Communication (GSM) is a standard to describe
the protocols for second-generation (2G) digital
cellular networks used by mobile devices such
as mobile phones and tablets.
BENEFITS OF GSM
1. Emergency responses
2. Technological growth
3. Universal data transfer
4. Has international capabilities
WHAT IS GSM SECURITY
GSM security is provided for
gsm network subscribers to
communicate securely without
any intrusion. The security here
is covered for the air interface
part and not for the fixed
network part. The air interface is
considered to be weakest for
the hackers. Security for SS7
part was not provided as SS7
was used for few of the
institutions.
The GSM security mechanism is covered with following;
*Authentication (used for billing purposes)
*Confidentiality
*Anonymity(used to identify users)
*PIN lock, EIR, personalization, etc.
*Authentication process helps gsm network authenticate the right user. This
authentication procedure in gsm security mechanism is triggered due to
following;
1. On the access to the network
2. Accessing the network for the purpose of making or receiving calls
3. Location update process and the change of subscriber-related information
stored in HLR
WHAT IS ACCESS CONTROL?
Access control is a fundamental
fundamental component of data
security that dictates who’s allowed
to access and use company
information and resources.
Through authentication and
authorization, access control
policies make sure users are who
they say they are and that they
have appropriate access to
company data. Access control can
also be applied to limit physical
access to campuses, buildings,
rooms and data centers.
TYPES OF ACCESS CONTROL
There are two types of access control. They are;
1. Physical access control
2. Logical access control
1.PHYSICAL ACCESS CONTROL
Physical access control systems are used in homes or
organizations to authorise or deny entry to their premises. It
grants access to employees and contractors who work at or
visit a site by electronically authenticating their PIV
credentials. Physical access control limits access to buildings,
compounds, warehouses, rooms, etc.
2. LOGICAL ACCESS CONTROL
A logical access control system requires the validation
of an individual’s identity through some mechanism such as a
PIN, biometric or other token. It has the capability to assign
different access privileges to different individuals depending
on their roles and responsibilities in an organization.
How does access control work?
Access control identifies users by
verifying various login credentials,
which can include usernames and
passwords, PINs, biometric scans and
security tokens. Many access control
systems also include multifactor
authentication (MFA) a method that
requires multiple authentication
methods to verify a user identity.
Once a user is authenticated, access
control then authorizes the appropriate
level of access and allowed actions
associated with that user credentials
and IP address.
Why is access control important?
Access control keeps confidential information such as customer data, personally
personally identifiable information, and intellectual property from falling into the
wrong hands. It’s a key component of the modern zero trust security framework,
which uses various mechanisms to continuously verify access to the company
network. Without robust access control policies, organizations risk data leakage
from both internal and external sources.
Access control is particularly important for organizations with hybrid cloud and
and multi-cloud environments, where resources, apps, and data reside both on
premises and in the cloud. Access control can provide these environments with
more robust access security beyond single sign-on (SSO) and prevent
unauthorized access from unmanaged and BYO devices.
ACCESS CONTROL SYSTEM
CONCLUSION
In the fields of physical security
and information security, access
control is the selective
restriction of access to a place or
other resources, while access
management describes the
process. The act of accessing
may mean consuming, entering,
or using. Permission to access a
resource is called authorization.
THANK YOU

More Related Content

Similar to GSM SECURITY

Importance of Access Control Systems for Business Security.pdf
Importance of Access Control Systems for Business Security.pdfImportance of Access Control Systems for Business Security.pdf
Importance of Access Control Systems for Business Security.pdfLaurajonath
 
Access system.docx
Access system.docxAccess system.docx
Access system.docxWaseelsultan
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...IJCSIS Research Publications
 
Phases of Building Access Control Systems Houston, TX
Phases of Building Access Control Systems Houston, TXPhases of Building Access Control Systems Houston, TX
Phases of Building Access Control Systems Houston, TXNexlar Security
 
Intrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin AuthorizationIntrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin AuthorizationIJMTST Journal
 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptxKENNEDYDONATO1
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET Journal
 
Identity and Access Management The Key to Strong Cybersecurity.pdf
Identity and Access Management The Key to Strong Cybersecurity.pdfIdentity and Access Management The Key to Strong Cybersecurity.pdf
Identity and Access Management The Key to Strong Cybersecurity.pdfEnfology Services
 
Identity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud ComputingIdentity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud ComputingCiente
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationPeter Choi
 
Salesforce DevOps Online Training Institute
Salesforce DevOps Online Training InstituteSalesforce DevOps Online Training Institute
Salesforce DevOps Online Training Instituteeshwarvisualpath
 
Identity Security.docx
Identity Security.docxIdentity Security.docx
Identity Security.docxMohsin Abbas
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor AuthenticationPing Identity
 
Importance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityImportance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityNexlar Security
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESIRJET Journal
 

Similar to GSM SECURITY (20)

Importance of Access Control Systems for Business Security.pdf
Importance of Access Control Systems for Business Security.pdfImportance of Access Control Systems for Business Security.pdf
Importance of Access Control Systems for Business Security.pdf
 
Access system.docx
Access system.docxAccess system.docx
Access system.docx
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
 
Phases of Building Access Control Systems Houston, TX
Phases of Building Access Control Systems Houston, TXPhases of Building Access Control Systems Houston, TX
Phases of Building Access Control Systems Houston, TX
 
unit4.pptx
unit4.pptxunit4.pptx
unit4.pptx
 
Intrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin AuthorizationIntrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin Authorization
 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptx
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
Identity and Access Management The Key to Strong Cybersecurity.pdf
Identity and Access Management The Key to Strong Cybersecurity.pdfIdentity and Access Management The Key to Strong Cybersecurity.pdf
Identity and Access Management The Key to Strong Cybersecurity.pdf
 
Identity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud ComputingIdentity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud Computing
 
Audit Controls Paper
Audit Controls PaperAudit Controls Paper
Audit Controls Paper
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
Salesforce DevOps Online Training Institute
Salesforce DevOps Online Training InstituteSalesforce DevOps Online Training Institute
Salesforce DevOps Online Training Institute
 
Identity Security.docx
Identity Security.docxIdentity Security.docx
Identity Security.docx
 
13_2
13_213_2
13_2
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor Authentication
 
Importance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityImportance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization Security
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
 

More from ESTAMUNIVERSITYSEMEC1 (20)

TAPE WORM
TAPE WORMTAPE WORM
TAPE WORM
 
Mass Media
Mass MediaMass Media
Mass Media
 
Second Hand Smoking
Second Hand SmokingSecond Hand Smoking
Second Hand Smoking
 
Ebola
Ebola Ebola
Ebola
 
Infectious Diseases
Infectious Diseases Infectious Diseases
Infectious Diseases
 
RESPIRATORY D & S
RESPIRATORY D & SRESPIRATORY D & S
RESPIRATORY D & S
 
PLASMODIUM
PLASMODIUMPLASMODIUM
PLASMODIUM
 
PERSONAL HYGIENE
PERSONAL HYGIENEPERSONAL HYGIENE
PERSONAL HYGIENE
 
MUMPS
MUMPSMUMPS
MUMPS
 
MEASLES
MEASLESMEASLES
MEASLES
 
Insulin Therapy
Insulin TherapyInsulin Therapy
Insulin Therapy
 
HEPATITIS D
HEPATITIS DHEPATITIS D
HEPATITIS D
 
HEPATITIS B
HEPATITIS BHEPATITIS B
HEPATITIS B
 
HEPATITIS A.pptx
HEPATITIS A.pptxHEPATITIS A.pptx
HEPATITIS A.pptx
 
The heart, the brain and the kidney
The heart, the brain and the kidneyThe heart, the brain and the kidney
The heart, the brain and the kidney
 
DISEASES ASSOCIATED WITH THE LUNGS.pptx
DISEASES ASSOCIATED WITH THE LUNGS.pptxDISEASES ASSOCIATED WITH THE LUNGS.pptx
DISEASES ASSOCIATED WITH THE LUNGS.pptx
 
Erectile Dysfunction
Erectile DysfunctionErectile Dysfunction
Erectile Dysfunction
 
Blue Eyes Technology.pptx
Blue Eyes Technology.pptxBlue Eyes Technology.pptx
Blue Eyes Technology.pptx
 
Thrombosis
ThrombosisThrombosis
Thrombosis
 
Breast Cancer
Breast CancerBreast Cancer
Breast Cancer
 

GSM SECURITY

  • 1. ESTAM FORMATION UNIVERSITY SEME CAMPUS, COTONOU, BENIN REPUBLIC
  • 2. UCHENNA RAPHAEL UCHECHUKWUKA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER ENGINEERING 200 LEVEL
  • 4. WHAT IS GSM? The Global System for Mobile Communication Communication (GSM) is a standard to describe the protocols for second-generation (2G) digital cellular networks used by mobile devices such as mobile phones and tablets. BENEFITS OF GSM 1. Emergency responses 2. Technological growth 3. Universal data transfer 4. Has international capabilities
  • 5. WHAT IS GSM SECURITY GSM security is provided for gsm network subscribers to communicate securely without any intrusion. The security here is covered for the air interface part and not for the fixed network part. The air interface is considered to be weakest for the hackers. Security for SS7 part was not provided as SS7 was used for few of the institutions.
  • 6. The GSM security mechanism is covered with following; *Authentication (used for billing purposes) *Confidentiality *Anonymity(used to identify users) *PIN lock, EIR, personalization, etc. *Authentication process helps gsm network authenticate the right user. This authentication procedure in gsm security mechanism is triggered due to following; 1. On the access to the network 2. Accessing the network for the purpose of making or receiving calls 3. Location update process and the change of subscriber-related information stored in HLR
  • 7. WHAT IS ACCESS CONTROL? Access control is a fundamental fundamental component of data security that dictates who’s allowed to access and use company information and resources. Through authentication and authorization, access control policies make sure users are who they say they are and that they have appropriate access to company data. Access control can also be applied to limit physical access to campuses, buildings, rooms and data centers.
  • 8. TYPES OF ACCESS CONTROL There are two types of access control. They are; 1. Physical access control 2. Logical access control 1.PHYSICAL ACCESS CONTROL Physical access control systems are used in homes or organizations to authorise or deny entry to their premises. It grants access to employees and contractors who work at or visit a site by electronically authenticating their PIV credentials. Physical access control limits access to buildings, compounds, warehouses, rooms, etc. 2. LOGICAL ACCESS CONTROL A logical access control system requires the validation of an individual’s identity through some mechanism such as a PIN, biometric or other token. It has the capability to assign different access privileges to different individuals depending on their roles and responsibilities in an organization.
  • 9. How does access control work? Access control identifies users by verifying various login credentials, which can include usernames and passwords, PINs, biometric scans and security tokens. Many access control systems also include multifactor authentication (MFA) a method that requires multiple authentication methods to verify a user identity. Once a user is authenticated, access control then authorizes the appropriate level of access and allowed actions associated with that user credentials and IP address.
  • 10. Why is access control important? Access control keeps confidential information such as customer data, personally personally identifiable information, and intellectual property from falling into the wrong hands. It’s a key component of the modern zero trust security framework, which uses various mechanisms to continuously verify access to the company network. Without robust access control policies, organizations risk data leakage from both internal and external sources. Access control is particularly important for organizations with hybrid cloud and and multi-cloud environments, where resources, apps, and data reside both on premises and in the cloud. Access control can provide these environments with more robust access security beyond single sign-on (SSO) and prevent unauthorized access from unmanaged and BYO devices.
  • 11.
  • 13. CONCLUSION In the fields of physical security and information security, access control is the selective restriction of access to a place or other resources, while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.