SlideShare a Scribd company logo
Summary of
Network Security Conference
(#NetworkSecurity)
May 2013
The only secure mobile is one that is switched
off with battery removed - Charles Brookson,
GSMA/ETSI at #NetworkSecurity
 Professor Ed Candy, Technology Strategist, 3 Group: Diversity
in devices is great. It allows no collective threats to be posed
due to their diversity of make models, OS’s, apps, etc.
Firewalls in the networks are good too but too many of them
can slow the network down. In the beginning when ‘3’ UK
rolled out 3G, 14 seconds were being lost due to them.
 Charles Brookson mentioned that he turns off 3G and uses
GSM/GPRS to save battery life
 Apps should store data on the cloud and not the device so if
the device is lost or compromised then the user data is not
lost to the third parties
 Users should be made aware of the background functions and
services on the device and also the threat/safety level of
these.
Interesting comments, questions, etc. - #1
 The operators can provide more security but it costs them to
do this. They have to work out a way to pass this on to the
users.
 Very little malware on google play. Risk is v.low. Android
malware hits countries where 3rd party appstores are the
norm
 Consumer education is key. Good to not be complacent about
malware, generally unnecessary to have mob antivirus.
 Mobile network should not be the only technology for critical
access. There should be other means as well
 A5/3 (security algorithm for GSM/GPRS) was standardised in
2001 and is more secure than the previous algorithms but
was not available widely till quite late because it was not IOT
tested and mandated by operators.
Interesting comments, questions, etc. - #2
Day 1
Day 1 began with a Panel Discussion moderated by Charles Brookson from GSMA with
some of the points I have already mentioned earlier
David Rogers from Copper Horse spoke on Incident Management for Mobile Malware and
on Responsible Disclosure. He also distributed a leaflet prepared for the UK police
regarding phone security. More details on that here.
Eric Gauthier, Head of Technical Fraud and Revenue Assurance, Orange gave an
Introduction on LTE and how Security was handled all the way from 0G (pre-cellular) to
4G/LTE.
Talal Faroug, Quality Assurance Manager, MTN, SUDAN gave a talk on Understanding the
Business Case for Network Security. His main focus was on SIM Box Fraud.
Telecom Concepts Blog has a nice write-up on this topic here -
http://telecomconcepts.wordpress.com/2010/02/01/simbox-fraud-detection-and-billing/
Another useful writeup on this topic here.
See Also GSMA press release: Raids on SIM box/GSM gateway fraudsters save mobile
operators millions
Feride Cetin, Group Strategy & Innovation Security & Intelligence, Swisscom focussed her
presentation on some of the initiatives taken by Swisscom on Apps Security and Rating
There were some good examples on how developers manage to ignore basic security
guidelines while making excellent apps. The result is they have to go back and fix the issues
at a much later stage and at the same time get a lots of negative publicity that can be
sometimes harmful for the business.
5 Rating Criteria to understand how apps behave; Permission, Privacy, Data Traffic, Data
Storage and Man in the Middle
Day 2
David Rogers from Copper Horse Solutions Limited chaired the second day proceedings. I
think his main message is as shown in the slide above and is self explanatory.
Ps: In case you are not from the UK, the above picture highlights beef (horsemeat) scandal
Dr. Christoph Peylo, VP Deutsche Telekom Innovation Laboratories started the day with an
interesting presentation on "Remote Control and Device Security: How Cyber-Attacks Can
Impact M2M"
The talk was so interesting that I should put up the slides or more detailed presentation on
this topic sometime later
Christoph showing http://www.sicherheitstacho.eu - Real time cyber-attacks.
Gert Pauwels, M2M Marketing Director, Mobistar spoke on the operator Orange’s position
on M2M. The key takeaway was the GMA Certification Program as shown in the slide
above.
Carlos Olea, Network Security Manager, Telefonica International focussed on DDoS
(distributed denial-of-service) and how Telefonica handled the Spamhaus and other Ddos
attacks and what they have learnt from this.
Adrian Drury, Lead analyst, Ovum spoke about RTB. I don’t remember him mentioning what
RTB is but my understanding it stands for Real Time Bidding -
http://en.wikipedia.org/wiki/Real-time_bidding
Raj Samani, Vice President, EMEA CTO, McAfee spoke about how connected devices have
changed our lifestle and the security issues that we are facing in this connected world.
Raj had some very interesting bits that he mentioned but the slides let him
a bit down. Here are some that were mentioned on twitter during the
event:
• In Germany, the smart meters polling interval was reduced to 2 sec and
it can tell the name of movie being watched. This is because each movie
has its own unique energy consumption pattern.
• Privacy a big issue for smart meters. Easy to analyse usage; what is being
used and when.
• In USA in some new buildings, connected devices are even being put in
the bricks to track humidity, etc.
• Everyone has a price when it comes to giving up private data
• A powergrid in US said that they face 10K cyber attacks per month as per
@Raj_Samani
Jon Howes, Technology Director, Beecham Research spoke on "M2M Solution Security“. A
whitepaper on this topic is also available on their website here.
Reinder Wolthuis, Project Manager Information Security, TNO spoke on "M2M Security"
and gave us the results of the etis M2M security survey
Personally I am a bit surprised that M2M devices would move to UMTS. The biggest issue
for M2M devices using UMTS is the battery power consumption. Its better to stay on
GSM/GPRS is the amount of data transfer is low or move to LTE if the amount of data
transfer required is high.
“Dutch research found that network operators worry about physical tampering but don't
do anything about it”
The final talk of the day was by Ravishankar Borgaonkar, Researcher, Deutsche Telekom on
the topic of “Small Cells in Hostile Environment“. I have covered earlier presentations by
Ravi on the blog here and here. One of the issue highlighted above and by others as well is
that a security feature may be asked by the operator but may not be supplied by vendor.
Hope you've enjoyed
the summary
Prepared by:
Zahid Ghadialy
eXplanoTech & 3G4G
Blog
Additional Reading
• Small Cells and the City – My presentation from Small
Cells Global Congress 2012
• Rel-11/12 3GPP Security Update – 3GPP
• Present and future Standards for mobile internet and
smart phone information security - ETSI
• Evolution of 3GPP Security
• Femto Hacking in UMTS and LTE

More Related Content

What's hot

Green Future Networks: Network Energy Efficiency
Green Future Networks: Network Energy EfficiencyGreen Future Networks: Network Energy Efficiency
Green Future Networks: Network Energy Efficiency
IPLOOK Networks
 
5G Technology
5G Technology5G Technology
5G Technology
RutujaShitole3
 
5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement
5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement
5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement
Yole Developpement
 
ZTE Communication - March 2015
ZTE Communication - March 2015ZTE Communication - March 2015
ZTE Communication - March 2015
Sitha Sok
 
Tcl telecom expertise v 2 00 vs 220812
Tcl telecom expertise v 2 00 vs 220812Tcl telecom expertise v 2 00 vs 220812
Tcl telecom expertise v 2 00 vs 220812
Transition Consulting Limited, India
 
Jisc's Vision for 5G - Digital Catapult Future of 5G Summit
Jisc's Vision for 5G - Digital Catapult Future of 5G SummitJisc's Vision for 5G - Digital Catapult Future of 5G Summit
Jisc's Vision for 5G - Digital Catapult Future of 5G Summit
Martin Hamilton
 
Performance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless NetworksPerformance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless Networks
University of Piraeus
 
Private 5G Seminar Brochure
Private 5G Seminar BrochurePrivate 5G Seminar Brochure
Private 5G Seminar Brochure
The Besen Group, LLC
 
Vision only 5G AnyBee (Anycasting Beyond the Edge)
Vision only 5G AnyBee (Anycasting Beyond the Edge)Vision only 5G AnyBee (Anycasting Beyond the Edge)
Vision only 5G AnyBee (Anycasting Beyond the Edge)
Thierry Lestable
 
NB-IoT and 5G
NB-IoT and 5GNB-IoT and 5G
5G technology
5G technology5G technology
5G technology
MostafaAliAbbas
 
Economics of 4G Introduction in Growth Markets
Economics of 4G Introduction in Growth MarketsEconomics of 4G Introduction in Growth Markets
Economics of 4G Introduction in Growth Markets
Dr. Kim (Kyllesbech Larsen)
 
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-20215G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
IPLOOK Networks
 
Reporte a cerca de 6G
Reporte a cerca de 6GReporte a cerca de 6G
Reporte a cerca de 6G
Miguel Mora
 
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
Antenna Manufacturer Coco
 
Private 5G Networks and Vendor Diversification
Private 5G Networks and Vendor DiversificationPrivate 5G Networks and Vendor Diversification
Private 5G Networks and Vendor Diversification
Dean Bubley
 
An Introduction to IoT: Connectivity & Case Studies
An Introduction to IoT: Connectivity & Case StudiesAn Introduction to IoT: Connectivity & Case Studies
An Introduction to IoT: Connectivity & Case Studies
3G4G
 
Aviation 5G/5G in Aviation
Aviation 5G/5G in AviationAviation 5G/5G in Aviation
Aviation 5G/5G in Aviation
Assem mousa
 
5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networking5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networking
venkada ramanujam
 
Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129Mohammad Khatib
 

What's hot (20)

Green Future Networks: Network Energy Efficiency
Green Future Networks: Network Energy EfficiencyGreen Future Networks: Network Energy Efficiency
Green Future Networks: Network Energy Efficiency
 
5G Technology
5G Technology5G Technology
5G Technology
 
5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement
5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement
5G’s Impact on Telecom Infrastructure 2019 report by Yole Développement
 
ZTE Communication - March 2015
ZTE Communication - March 2015ZTE Communication - March 2015
ZTE Communication - March 2015
 
Tcl telecom expertise v 2 00 vs 220812
Tcl telecom expertise v 2 00 vs 220812Tcl telecom expertise v 2 00 vs 220812
Tcl telecom expertise v 2 00 vs 220812
 
Jisc's Vision for 5G - Digital Catapult Future of 5G Summit
Jisc's Vision for 5G - Digital Catapult Future of 5G SummitJisc's Vision for 5G - Digital Catapult Future of 5G Summit
Jisc's Vision for 5G - Digital Catapult Future of 5G Summit
 
Performance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless NetworksPerformance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless Networks
 
Private 5G Seminar Brochure
Private 5G Seminar BrochurePrivate 5G Seminar Brochure
Private 5G Seminar Brochure
 
Vision only 5G AnyBee (Anycasting Beyond the Edge)
Vision only 5G AnyBee (Anycasting Beyond the Edge)Vision only 5G AnyBee (Anycasting Beyond the Edge)
Vision only 5G AnyBee (Anycasting Beyond the Edge)
 
NB-IoT and 5G
NB-IoT and 5GNB-IoT and 5G
NB-IoT and 5G
 
5G technology
5G technology5G technology
5G technology
 
Economics of 4G Introduction in Growth Markets
Economics of 4G Introduction in Growth MarketsEconomics of 4G Introduction in Growth Markets
Economics of 4G Introduction in Growth Markets
 
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-20215G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
5G-Advanced-Technology-Evolution-from-a-Network-Perspective-2021
 
Reporte a cerca de 6G
Reporte a cerca de 6GReporte a cerca de 6G
Reporte a cerca de 6G
 
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
 
Private 5G Networks and Vendor Diversification
Private 5G Networks and Vendor DiversificationPrivate 5G Networks and Vendor Diversification
Private 5G Networks and Vendor Diversification
 
An Introduction to IoT: Connectivity & Case Studies
An Introduction to IoT: Connectivity & Case StudiesAn Introduction to IoT: Connectivity & Case Studies
An Introduction to IoT: Connectivity & Case Studies
 
Aviation 5G/5G in Aviation
Aviation 5G/5G in AviationAviation 5G/5G in Aviation
Aviation 5G/5G in Aviation
 
5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networking5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networking
 
Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129
 

Similar to Summary of Network Security Conference (#NetworkSecurity)

J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseDroidcon Berlin
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
SecurityGen1
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdf
SecurityGen1
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGen
SecurityGen1
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
Cigdem Sengul
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksWilliam Chipman
 
B010331019
B010331019B010331019
B010331019
IOSR Journals
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communicationardhita banu adji
 
Public safety is reshaped with 5G
Public safety is reshaped with 5GPublic safety is reshaped with 5G
Public safety is reshaped with 5G
aNumak & Company
 
Security model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentationSecurity model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentation
Rotract CLUB of BSAU
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417IJRAT
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Peter Wood
 
1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-maindsfsadfas
 
M2M Journal - 22nd edition
M2M Journal - 22nd editionM2M Journal - 22nd edition
M2M Journal - 22nd edition
Martin Gutberlet
 
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Security Issues and challenges with Wireless M2Mutilising Cloud infrastructureSecurity Issues and challenges with Wireless M2Mutilising Cloud infrastructure
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Stuart Bennett
 
Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
Prof. Dr. K. Adisesha
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
GaytriDhingra1
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trendsKen Huang
 
The 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problemThe 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problemSherry Jones
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possible
IJNSA Journal
 

Similar to Summary of Network Security Conference (#NetworkSecurity) (20)

J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdf
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGen
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
 
B010331019
B010331019B010331019
B010331019
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communication
 
Public safety is reshaped with 5G
Public safety is reshaped with 5GPublic safety is reshaped with 5G
Public safety is reshaped with 5G
 
Security model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentationSecurity model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentation
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main1 s2.0-s014036641000085 x-main
1 s2.0-s014036641000085 x-main
 
M2M Journal - 22nd edition
M2M Journal - 22nd editionM2M Journal - 22nd edition
M2M Journal - 22nd edition
 
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Security Issues and challenges with Wireless M2Mutilising Cloud infrastructureSecurity Issues and challenges with Wireless M2Mutilising Cloud infrastructure
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
 
Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trends
 
The 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problemThe 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problem
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possible
 

More from 3G4G

TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...
TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...
TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...
3G4G
 
Misc: What are No Mobile Coverage Zones called?
Misc: What are No Mobile Coverage Zones called?Misc: What are No Mobile Coverage Zones called?
Misc: What are No Mobile Coverage Zones called?
3G4G
 
TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…
TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…
TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…
3G4G
 
TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…
TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…
TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…
3G4G
 
Beginners: An Quick Introduction to 3GPP
Beginners: An Quick Introduction to 3GPPBeginners: An Quick Introduction to 3GPP
Beginners: An Quick Introduction to 3GPP
3G4G
 
Misc: Mobile Technology and Healthcare
Misc: Mobile Technology and HealthcareMisc: Mobile Technology and Healthcare
Misc: Mobile Technology and Healthcare
3G4G
 
Should we stop the shutdown of 2G/3G to save lives??
Should we stop the shutdown of 2G/3G to save lives??Should we stop the shutdown of 2G/3G to save lives??
Should we stop the shutdown of 2G/3G to save lives??
3G4G
 
Opinion – 5G Reality Check: Speeds
Opinion – 5G Reality Check: SpeedsOpinion – 5G Reality Check: Speeds
Opinion – 5G Reality Check: Speeds
3G4G
 
Technology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdfTechnology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdf
3G4G
 
6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies
3G4G
 
3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)
3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)
3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)
3G4G
 
3GPP SON Series: Energy Savings (ES)
3GPP SON Series: Energy Savings (ES)3GPP SON Series: Energy Savings (ES)
3GPP SON Series: Energy Savings (ES)
3G4G
 
3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)
3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)
3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)
3G4G
 
3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)
3G4G
 
3GPP SON Series: Coverage and Capacity Optimization (CCO)
3GPP SON Series: Coverage and Capacity Optimization (CCO)3GPP SON Series: Coverage and Capacity Optimization (CCO)
3GPP SON Series: Coverage and Capacity Optimization (CCO)
3G4G
 
3GPP SON Series: SON in 3GPP Release-10 – Self-healing
3GPP SON Series: SON in 3GPP Release-10 – Self-healing3GPP SON Series: SON in 3GPP Release-10 – Self-healing
3GPP SON Series: SON in 3GPP Release-10 – Self-healing
3G4G
 
3GPP SON Series: RACH Optimization
3GPP SON Series: RACH Optimization3GPP SON Series: RACH Optimization
3GPP SON Series: RACH Optimization
3G4G
 
3GPP SON Series: Mobility Robustness Optimization (MRO)
3GPP SON Series: Mobility Robustness Optimization (MRO)3GPP SON Series: Mobility Robustness Optimization (MRO)
3GPP SON Series: Mobility Robustness Optimization (MRO)
3G4G
 
3GPP SON Series: SON in 3GPP Release-9 – Self-optimization
3GPP SON Series: SON in 3GPP Release-9 – Self-optimization3GPP SON Series: SON in 3GPP Release-9 – Self-optimization
3GPP SON Series: SON in 3GPP Release-9 – Self-optimization
3G4G
 
Beginners: Energy Consumption in Mobile Networks - RAN Power Saving Schemes
Beginners: Energy Consumption in Mobile Networks - RAN Power Saving SchemesBeginners: Energy Consumption in Mobile Networks - RAN Power Saving Schemes
Beginners: Energy Consumption in Mobile Networks - RAN Power Saving Schemes
3G4G
 

More from 3G4G (20)

TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...
TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...
TechKnowledge Technology Stories - Part 3: Satellites - Our Friends In The Sk...
 
Misc: What are No Mobile Coverage Zones called?
Misc: What are No Mobile Coverage Zones called?Misc: What are No Mobile Coverage Zones called?
Misc: What are No Mobile Coverage Zones called?
 
TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…
TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…
TechKnowledge Technology Stories - Part 2: Connecting Everything Everywhere…
 
TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…
TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…
TechKnowledge Technology Stories - Part 1: Smaller, Faster, Cheaper and More…
 
Beginners: An Quick Introduction to 3GPP
Beginners: An Quick Introduction to 3GPPBeginners: An Quick Introduction to 3GPP
Beginners: An Quick Introduction to 3GPP
 
Misc: Mobile Technology and Healthcare
Misc: Mobile Technology and HealthcareMisc: Mobile Technology and Healthcare
Misc: Mobile Technology and Healthcare
 
Should we stop the shutdown of 2G/3G to save lives??
Should we stop the shutdown of 2G/3G to save lives??Should we stop the shutdown of 2G/3G to save lives??
Should we stop the shutdown of 2G/3G to save lives??
 
Opinion – 5G Reality Check: Speeds
Opinion – 5G Reality Check: SpeedsOpinion – 5G Reality Check: Speeds
Opinion – 5G Reality Check: Speeds
 
Technology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdfTechnology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdf
 
6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies
 
3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)
3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)
3GPP SON Series: SON Management in HetNets and Enhanced ICIC (eICIC)
 
3GPP SON Series: Energy Savings (ES)
3GPP SON Series: Energy Savings (ES)3GPP SON Series: Energy Savings (ES)
3GPP SON Series: Energy Savings (ES)
 
3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)
3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)
3GPP SON Series: Cell Outage Detection and Compensation (COD & COC)
 
3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)
 
3GPP SON Series: Coverage and Capacity Optimization (CCO)
3GPP SON Series: Coverage and Capacity Optimization (CCO)3GPP SON Series: Coverage and Capacity Optimization (CCO)
3GPP SON Series: Coverage and Capacity Optimization (CCO)
 
3GPP SON Series: SON in 3GPP Release-10 – Self-healing
3GPP SON Series: SON in 3GPP Release-10 – Self-healing3GPP SON Series: SON in 3GPP Release-10 – Self-healing
3GPP SON Series: SON in 3GPP Release-10 – Self-healing
 
3GPP SON Series: RACH Optimization
3GPP SON Series: RACH Optimization3GPP SON Series: RACH Optimization
3GPP SON Series: RACH Optimization
 
3GPP SON Series: Mobility Robustness Optimization (MRO)
3GPP SON Series: Mobility Robustness Optimization (MRO)3GPP SON Series: Mobility Robustness Optimization (MRO)
3GPP SON Series: Mobility Robustness Optimization (MRO)
 
3GPP SON Series: SON in 3GPP Release-9 – Self-optimization
3GPP SON Series: SON in 3GPP Release-9 – Self-optimization3GPP SON Series: SON in 3GPP Release-9 – Self-optimization
3GPP SON Series: SON in 3GPP Release-9 – Self-optimization
 
Beginners: Energy Consumption in Mobile Networks - RAN Power Saving Schemes
Beginners: Energy Consumption in Mobile Networks - RAN Power Saving SchemesBeginners: Energy Consumption in Mobile Networks - RAN Power Saving Schemes
Beginners: Energy Consumption in Mobile Networks - RAN Power Saving Schemes
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

Summary of Network Security Conference (#NetworkSecurity)

  • 1. Summary of Network Security Conference (#NetworkSecurity) May 2013
  • 2. The only secure mobile is one that is switched off with battery removed - Charles Brookson, GSMA/ETSI at #NetworkSecurity
  • 3.  Professor Ed Candy, Technology Strategist, 3 Group: Diversity in devices is great. It allows no collective threats to be posed due to their diversity of make models, OS’s, apps, etc. Firewalls in the networks are good too but too many of them can slow the network down. In the beginning when ‘3’ UK rolled out 3G, 14 seconds were being lost due to them.  Charles Brookson mentioned that he turns off 3G and uses GSM/GPRS to save battery life  Apps should store data on the cloud and not the device so if the device is lost or compromised then the user data is not lost to the third parties  Users should be made aware of the background functions and services on the device and also the threat/safety level of these. Interesting comments, questions, etc. - #1
  • 4.  The operators can provide more security but it costs them to do this. They have to work out a way to pass this on to the users.  Very little malware on google play. Risk is v.low. Android malware hits countries where 3rd party appstores are the norm  Consumer education is key. Good to not be complacent about malware, generally unnecessary to have mob antivirus.  Mobile network should not be the only technology for critical access. There should be other means as well  A5/3 (security algorithm for GSM/GPRS) was standardised in 2001 and is more secure than the previous algorithms but was not available widely till quite late because it was not IOT tested and mandated by operators. Interesting comments, questions, etc. - #2
  • 6. Day 1 began with a Panel Discussion moderated by Charles Brookson from GSMA with some of the points I have already mentioned earlier
  • 7. David Rogers from Copper Horse spoke on Incident Management for Mobile Malware and on Responsible Disclosure. He also distributed a leaflet prepared for the UK police regarding phone security. More details on that here.
  • 8. Eric Gauthier, Head of Technical Fraud and Revenue Assurance, Orange gave an Introduction on LTE and how Security was handled all the way from 0G (pre-cellular) to 4G/LTE.
  • 9. Talal Faroug, Quality Assurance Manager, MTN, SUDAN gave a talk on Understanding the Business Case for Network Security. His main focus was on SIM Box Fraud.
  • 10. Telecom Concepts Blog has a nice write-up on this topic here - http://telecomconcepts.wordpress.com/2010/02/01/simbox-fraud-detection-and-billing/ Another useful writeup on this topic here.
  • 11. See Also GSMA press release: Raids on SIM box/GSM gateway fraudsters save mobile operators millions
  • 12. Feride Cetin, Group Strategy & Innovation Security & Intelligence, Swisscom focussed her presentation on some of the initiatives taken by Swisscom on Apps Security and Rating
  • 13. There were some good examples on how developers manage to ignore basic security guidelines while making excellent apps. The result is they have to go back and fix the issues at a much later stage and at the same time get a lots of negative publicity that can be sometimes harmful for the business.
  • 14. 5 Rating Criteria to understand how apps behave; Permission, Privacy, Data Traffic, Data Storage and Man in the Middle
  • 15. Day 2
  • 16. David Rogers from Copper Horse Solutions Limited chaired the second day proceedings. I think his main message is as shown in the slide above and is self explanatory. Ps: In case you are not from the UK, the above picture highlights beef (horsemeat) scandal
  • 17. Dr. Christoph Peylo, VP Deutsche Telekom Innovation Laboratories started the day with an interesting presentation on "Remote Control and Device Security: How Cyber-Attacks Can Impact M2M"
  • 18. The talk was so interesting that I should put up the slides or more detailed presentation on this topic sometime later
  • 20. Gert Pauwels, M2M Marketing Director, Mobistar spoke on the operator Orange’s position on M2M. The key takeaway was the GMA Certification Program as shown in the slide above.
  • 21. Carlos Olea, Network Security Manager, Telefonica International focussed on DDoS (distributed denial-of-service) and how Telefonica handled the Spamhaus and other Ddos attacks and what they have learnt from this.
  • 22.
  • 23. Adrian Drury, Lead analyst, Ovum spoke about RTB. I don’t remember him mentioning what RTB is but my understanding it stands for Real Time Bidding - http://en.wikipedia.org/wiki/Real-time_bidding
  • 24.
  • 25. Raj Samani, Vice President, EMEA CTO, McAfee spoke about how connected devices have changed our lifestle and the security issues that we are facing in this connected world.
  • 26. Raj had some very interesting bits that he mentioned but the slides let him a bit down. Here are some that were mentioned on twitter during the event: • In Germany, the smart meters polling interval was reduced to 2 sec and it can tell the name of movie being watched. This is because each movie has its own unique energy consumption pattern. • Privacy a big issue for smart meters. Easy to analyse usage; what is being used and when. • In USA in some new buildings, connected devices are even being put in the bricks to track humidity, etc. • Everyone has a price when it comes to giving up private data • A powergrid in US said that they face 10K cyber attacks per month as per @Raj_Samani
  • 27. Jon Howes, Technology Director, Beecham Research spoke on "M2M Solution Security“. A whitepaper on this topic is also available on their website here.
  • 28. Reinder Wolthuis, Project Manager Information Security, TNO spoke on "M2M Security" and gave us the results of the etis M2M security survey
  • 29. Personally I am a bit surprised that M2M devices would move to UMTS. The biggest issue for M2M devices using UMTS is the battery power consumption. Its better to stay on GSM/GPRS is the amount of data transfer is low or move to LTE if the amount of data transfer required is high.
  • 30. “Dutch research found that network operators worry about physical tampering but don't do anything about it”
  • 31.
  • 32.
  • 33. The final talk of the day was by Ravishankar Borgaonkar, Researcher, Deutsche Telekom on the topic of “Small Cells in Hostile Environment“. I have covered earlier presentations by Ravi on the blog here and here. One of the issue highlighted above and by others as well is that a security feature may be asked by the operator but may not be supplied by vendor.
  • 34. Hope you've enjoyed the summary Prepared by: Zahid Ghadialy eXplanoTech & 3G4G Blog
  • 35. Additional Reading • Small Cells and the City – My presentation from Small Cells Global Congress 2012 • Rel-11/12 3GPP Security Update – 3GPP • Present and future Standards for mobile internet and smart phone information security - ETSI • Evolution of 3GPP Security • Femto Hacking in UMTS and LTE