SlideShare a Scribd company logo
1 of 25
Security Briefing
Prof. David Rogers, Copper Horse
@drogersuk
1st March 2017
Mobile World Congress 2017
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 1
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved.
Introduction
2
• What are the existing threats in the small cells world
• Why?
• What do you need to look for?
• Who is targeting small cells?
• The user as an enemy
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved.
Security Threats and Risks
3
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved.
Physical and Environment Security
4
• How easy is it to target infrastructure?
• Physical attacks on small cells
• Constrained environments
• Remote installations and satellite considerations
• Measures you can take
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved.
Device and Hardware Security
5
• Getting the foundations right
• Building for failure
• Advanced defensive techniques
• Moving functionality off the device
• How attackers approach hardware hacks and why they do it
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved.
Virtualisation
6
• NFV and SDN
• Sandboxing and containerisation
• Cloud processing and attacks
• Resilience
• Randomness and non-randomness
• Where is my data?
• X86, what?
• Attacks
Image source: ETSI
• Different networks, different security
• Accepting risk
• Untrusted backhaul
• Gateway security and traffic monitoring
• Jamming
• Don’t be flooded
• Points of security failure
• Self-Organising Networks (SON)
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved.
Protecting the Network
7
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved.
Who is Connected to the Future Internet?
8
Source:
http://cheezburger.com/8068370944
Source:
http://spectrum.ieee.org/computing/em
bedded-systems/on-the-internet-of-
things-nobody-knows-youre-a-dog
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved.
5G
9
• Considering how to design 5G for multiple needs
• Safety and privacy
• Appropriate security at nodes
• Network density security aspects
• The potential of downgrade attacks
• Masquerading
• 5G security planning
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved.
Security Contexts
10
• Appropriate security, deployed correctly
Natural Disasters & Critical Infrastructure
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 11
Image source: https://nayabchohan.com/author/nayabchohan786/
Wireless from Above
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 12
http://www.mobilephonesecurity.org
Can You Trust the Data?
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 13
Source: “Worldwide Threat Assessment of the US Intelligence Community, February 2015 and 2016”
http://www.dni.gov/files/documents/Unclassified_2015_ATA_SFR_-_SASC_FINAL.pdf
http://www.dni.gov/files/documents/SASC_Unclassified_2016_ATA_SFR_FINAL.pdf
James Clapper, US Director of National Intelligence:
“we might also see more cyber operations that will change
or manipulate electronic information in order to
compromise its integrity (i.e. accuracy and reliability)
instead of deleting it or disrupting access to it.” (2015)
“cyber actors will seek to exploit the integrity of networked
and online information. This runs the gamut from modifying
and transmitting false data to public utilities and market
firms, to implanting false information on online media. ”
(2016)
Data Manipulation (1)
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 14
Data Manipulation (2)
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 15
Resilience
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 16
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved.
Compromised Connected Pets and Toys
17
Legacy?
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved.
Servants’ Bells Copyright Adam Tinworth
https://www.flickr.com/photos/adders/6
041931491
CC BY-ND 2.0
18
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved.
Mr Robot
19
Images: fair use, Amazon
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved.
Existing and Upcoming Security Research
20
 DEF CON 24, 2016
 Largest DDoS recorded
 Scans the whole internet
 Brute-forces telnet and infects
 Uses default passwords
– Admin / admin etc.
 Mostly CCTV cameras / routers
– Major network operator hit badly
– Also cars, trucks, laptops, M2M…
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved.
IoT botnet: Mirai
21
Image: www.malwaretech.com
Further reading: http://blog.mobilephonesecurity.org/2016/10/dead-on-arrival-
whats-next-for-iot.html
https://www.malwaretech.com/2016/10/mapping-mirai-a-botnet-case-study.html
 Open source
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved.
IoT botnet: Mirai (2)
22
Image: https://github.com/jgamblin/Mirai-Source-Code/issues/8
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved.
SHA-1
23
SCF Release 9
Small Cell Forum Release 9, security:
http://www.scf.io/en/documents/171_Comprehensive_overview
_of_small_cell_security.php
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 24
Thanks!
david.rogers [@] copperhorse.co.uk
@drogersuk
@copperhorseuk
Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 25

More Related Content

What's hot

Level Setting the Road to HetNet
Level Setting the Road to HetNetLevel Setting the Road to HetNet
Level Setting the Road to HetNetSmall Cell Forum
 
ThinkSmallCell Analyst Spotlight December 2016
ThinkSmallCell Analyst Spotlight December 2016ThinkSmallCell Analyst Spotlight December 2016
ThinkSmallCell Analyst Spotlight December 2016David Chambers
 
Nokia: HetNet Deployments: Are we there yet?
Nokia: HetNet Deployments: Are we there yet?Nokia: HetNet Deployments: Are we there yet?
Nokia: HetNet Deployments: Are we there yet?Small Cell Forum
 
Neutral Host, Small Networks
Neutral Host, Small NetworksNeutral Host, Small Networks
Neutral Host, Small NetworksSmall Cell Forum
 
Small Cell Deployment Stories - How small cells are bringing value to operato...
Small Cell Deployment Stories - How small cells are bringing value to operato...Small Cell Deployment Stories - How small cells are bringing value to operato...
Small Cell Deployment Stories - How small cells are bringing value to operato...Small Cell Forum
 
Urban Case Studies Invisible Sites: Ericsson
Urban Case Studies Invisible Sites: EricssonUrban Case Studies Invisible Sites: Ericsson
Urban Case Studies Invisible Sites: EricssonSmall Cell Forum
 
Small Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work itemSmall Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work itemSmall Cell Forum
 
Simpler & Faster Deployment of Small Cell Networks 2
Simpler & Faster Deployment of Small Cell Networks 2Simpler & Faster Deployment of Small Cell Networks 2
Simpler & Faster Deployment of Small Cell Networks 2Small Cell Forum
 
iBwave: High level deployment process for enterprise small cells
iBwave: High level deployment process for enterprise small cellsiBwave: High level deployment process for enterprise small cells
iBwave: High level deployment process for enterprise small cellsSmall Cell Forum
 
Utilizing sdn and nfv for the small cell mobile backhauling v1
Utilizing sdn and nfv for the small cell mobile backhauling v1Utilizing sdn and nfv for the small cell mobile backhauling v1
Utilizing sdn and nfv for the small cell mobile backhauling v1Nir Halachmi
 
Virtual small cells set the stage for 5G
Virtual small cells set the stage for 5GVirtual small cells set the stage for 5G
Virtual small cells set the stage for 5GSmall Cell Forum
 
Mavenir: Linking IoT, 5G, and Analytics in Smarter Enterprise
Mavenir: Linking IoT, 5G, and Analytics in Smarter EnterpriseMavenir: Linking IoT, 5G, and Analytics in Smarter Enterprise
Mavenir: Linking IoT, 5G, and Analytics in Smarter EnterpriseMavenir
 
Small Cells, State of the Nation
Small Cells, State of the NationSmall Cells, State of the Nation
Small Cells, State of the NationSmall Cell Forum
 
Small cell Evolution final
Small cell Evolution finalSmall cell Evolution final
Small cell Evolution finalXian Sun-Ilmonen
 
Alcatel Lucent Deployment Innovation
Alcatel Lucent Deployment Innovation Alcatel Lucent Deployment Innovation
Alcatel Lucent Deployment Innovation Small Cell Forum
 
5G: The Coming Business Transformation
5G: The Coming Business Transformation 5G: The Coming Business Transformation
5G: The Coming Business Transformation Peter Jarich
 
5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspectiveRichard Scott
 
Ericsson Radio DOT System Success
Ericsson Radio DOT System SuccessEricsson Radio DOT System Success
Ericsson Radio DOT System SuccessSmall Cell Forum
 
TADSummit Closing Keynote: BYOSpectrum – Why private cellular is a game-changer
TADSummit Closing Keynote: BYOSpectrum – Why private cellular is a game-changerTADSummit Closing Keynote: BYOSpectrum – Why private cellular is a game-changer
TADSummit Closing Keynote: BYOSpectrum – Why private cellular is a game-changerAlan Quayle
 

What's hot (20)

Level Setting the Road to HetNet
Level Setting the Road to HetNetLevel Setting the Road to HetNet
Level Setting the Road to HetNet
 
HetNet and SON
HetNet and SONHetNet and SON
HetNet and SON
 
ThinkSmallCell Analyst Spotlight December 2016
ThinkSmallCell Analyst Spotlight December 2016ThinkSmallCell Analyst Spotlight December 2016
ThinkSmallCell Analyst Spotlight December 2016
 
Nokia: HetNet Deployments: Are we there yet?
Nokia: HetNet Deployments: Are we there yet?Nokia: HetNet Deployments: Are we there yet?
Nokia: HetNet Deployments: Are we there yet?
 
Neutral Host, Small Networks
Neutral Host, Small NetworksNeutral Host, Small Networks
Neutral Host, Small Networks
 
Small Cell Deployment Stories - How small cells are bringing value to operato...
Small Cell Deployment Stories - How small cells are bringing value to operato...Small Cell Deployment Stories - How small cells are bringing value to operato...
Small Cell Deployment Stories - How small cells are bringing value to operato...
 
Urban Case Studies Invisible Sites: Ericsson
Urban Case Studies Invisible Sites: EricssonUrban Case Studies Invisible Sites: Ericsson
Urban Case Studies Invisible Sites: Ericsson
 
Small Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work itemSmall Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work item
 
Simpler & Faster Deployment of Small Cell Networks 2
Simpler & Faster Deployment of Small Cell Networks 2Simpler & Faster Deployment of Small Cell Networks 2
Simpler & Faster Deployment of Small Cell Networks 2
 
iBwave: High level deployment process for enterprise small cells
iBwave: High level deployment process for enterprise small cellsiBwave: High level deployment process for enterprise small cells
iBwave: High level deployment process for enterprise small cells
 
Utilizing sdn and nfv for the small cell mobile backhauling v1
Utilizing sdn and nfv for the small cell mobile backhauling v1Utilizing sdn and nfv for the small cell mobile backhauling v1
Utilizing sdn and nfv for the small cell mobile backhauling v1
 
Virtual small cells set the stage for 5G
Virtual small cells set the stage for 5GVirtual small cells set the stage for 5G
Virtual small cells set the stage for 5G
 
Mavenir: Linking IoT, 5G, and Analytics in Smarter Enterprise
Mavenir: Linking IoT, 5G, and Analytics in Smarter EnterpriseMavenir: Linking IoT, 5G, and Analytics in Smarter Enterprise
Mavenir: Linking IoT, 5G, and Analytics in Smarter Enterprise
 
Small Cells, State of the Nation
Small Cells, State of the NationSmall Cells, State of the Nation
Small Cells, State of the Nation
 
Small cell Evolution final
Small cell Evolution finalSmall cell Evolution final
Small cell Evolution final
 
Alcatel Lucent Deployment Innovation
Alcatel Lucent Deployment Innovation Alcatel Lucent Deployment Innovation
Alcatel Lucent Deployment Innovation
 
5G: The Coming Business Transformation
5G: The Coming Business Transformation 5G: The Coming Business Transformation
5G: The Coming Business Transformation
 
5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective
 
Ericsson Radio DOT System Success
Ericsson Radio DOT System SuccessEricsson Radio DOT System Success
Ericsson Radio DOT System Success
 
TADSummit Closing Keynote: BYOSpectrum – Why private cellular is a game-changer
TADSummit Closing Keynote: BYOSpectrum – Why private cellular is a game-changerTADSummit Closing Keynote: BYOSpectrum – Why private cellular is a game-changer
TADSummit Closing Keynote: BYOSpectrum – Why private cellular is a game-changer
 

Viewers also liked

Small Cells: the bridge between 4G and 5G
Small Cells: the bridge between 4G and 5GSmall Cells: the bridge between 4G and 5G
Small Cells: the bridge between 4G and 5GSmall Cell Forum
 
When LAN meets WAN ensuring carrier-grade quality into any enterprise venue
When LAN meets WAN ensuring carrier-grade quality into any enterprise venueWhen LAN meets WAN ensuring carrier-grade quality into any enterprise venue
When LAN meets WAN ensuring carrier-grade quality into any enterprise venueSmall Cell Forum
 
Small Cells in the U.S. Mobile Ecosystem: The Tower View
Small Cells in the U.S. Mobile Ecosystem: The Tower ViewSmall Cells in the U.S. Mobile Ecosystem: The Tower View
Small Cells in the U.S. Mobile Ecosystem: The Tower ViewSmall Cell Forum
 
Looking under the hood of various RAN Access Deployment Technologies: 4G, LTE...
Looking under the hood of various RAN Access Deployment Technologies: 4G, LTE...Looking under the hood of various RAN Access Deployment Technologies: 4G, LTE...
Looking under the hood of various RAN Access Deployment Technologies: 4G, LTE...Small Cell Forum
 
Cellular Backhauling over Satellite: The Other Side of the Coin
Cellular Backhauling over Satellite: The Other Side of the CoinCellular Backhauling over Satellite: The Other Side of the Coin
Cellular Backhauling over Satellite: The Other Side of the CoinSmall Cell Forum
 
Small Cell State of the Nation 2017
Small Cell State of the Nation 2017Small Cell State of the Nation 2017
Small Cell State of the Nation 2017David Chambers
 
Alternative ownership and operations models: Hospitality
Alternative ownership and operations models: HospitalityAlternative ownership and operations models: Hospitality
Alternative ownership and operations models: HospitalitySmall Cell Forum
 
Small Cell Forum: Lighting the path to 5G
Small Cell Forum: Lighting the path to 5GSmall Cell Forum: Lighting the path to 5G
Small Cell Forum: Lighting the path to 5GSmall Cell Forum
 
Small Cell Industry Insight & Experience Sharing
Small Cell Industry Insight & Experience SharingSmall Cell Industry Insight & Experience Sharing
Small Cell Industry Insight & Experience SharingSmall Cell Forum
 
Parallel Wireless: Removing Deployment Constraints of Small Cell vRAN and 5G ...
Parallel Wireless: Removing Deployment Constraints of Small Cell vRAN and 5G ...Parallel Wireless: Removing Deployment Constraints of Small Cell vRAN and 5G ...
Parallel Wireless: Removing Deployment Constraints of Small Cell vRAN and 5G ...Small Cell Forum
 
HetNets and Wi-Fi Offload – Finding the appropriate venues for small cells in...
HetNets and Wi-Fi Offload – Finding the appropriate venues for small cells in...HetNets and Wi-Fi Offload – Finding the appropriate venues for small cells in...
HetNets and Wi-Fi Offload – Finding the appropriate venues for small cells in...Small Cell Forum
 
Antenna Evolution: From 4G to 5G
Antenna Evolution: From 4G to 5GAntenna Evolution: From 4G to 5G
Antenna Evolution: From 4G to 5GKarva Carbi
 
Driving Connectivity in the Scottish Islands: Droneways and Airmasts
Driving Connectivity in the Scottish Islands: Droneways and AirmastsDriving Connectivity in the Scottish Islands: Droneways and Airmasts
Driving Connectivity in the Scottish Islands: Droneways and Airmasts3G4G
 
5G Network Architecture and Design
5G Network Architecture and Design5G Network Architecture and Design
5G Network Architecture and Design3G4G
 
Small Cells Asia 2016: Sue Monahan keynote
Small Cells Asia 2016: Sue Monahan keynoteSmall Cells Asia 2016: Sue Monahan keynote
Small Cells Asia 2016: Sue Monahan keynoteElizabeth Carter
 
SCF announcements from MWC16
SCF announcements from MWC16SCF announcements from MWC16
SCF announcements from MWC16Small Cell Forum
 
Virtualisation - A new workstream for the SCF from Mark Grayson (Cisco)
Virtualisation - A new workstream for the SCF from Mark Grayson (Cisco)Virtualisation - A new workstream for the SCF from Mark Grayson (Cisco)
Virtualisation - A new workstream for the SCF from Mark Grayson (Cisco)Small Cell Forum
 
Julius Robson: Small Cell Backhaul
Julius Robson: Small Cell BackhaulJulius Robson: Small Cell Backhaul
Julius Robson: Small Cell BackhaulSmall Cell Forum
 

Viewers also liked (20)

Small Cells: the bridge between 4G and 5G
Small Cells: the bridge between 4G and 5GSmall Cells: the bridge between 4G and 5G
Small Cells: the bridge between 4G and 5G
 
Rural 5G Small Cells
Rural 5G Small CellsRural 5G Small Cells
Rural 5G Small Cells
 
When LAN meets WAN ensuring carrier-grade quality into any enterprise venue
When LAN meets WAN ensuring carrier-grade quality into any enterprise venueWhen LAN meets WAN ensuring carrier-grade quality into any enterprise venue
When LAN meets WAN ensuring carrier-grade quality into any enterprise venue
 
Small Cells in the U.S. Mobile Ecosystem: The Tower View
Small Cells in the U.S. Mobile Ecosystem: The Tower ViewSmall Cells in the U.S. Mobile Ecosystem: The Tower View
Small Cells in the U.S. Mobile Ecosystem: The Tower View
 
Looking under the hood of various RAN Access Deployment Technologies: 4G, LTE...
Looking under the hood of various RAN Access Deployment Technologies: 4G, LTE...Looking under the hood of various RAN Access Deployment Technologies: 4G, LTE...
Looking under the hood of various RAN Access Deployment Technologies: 4G, LTE...
 
Cellular Backhauling over Satellite: The Other Side of the Coin
Cellular Backhauling over Satellite: The Other Side of the CoinCellular Backhauling over Satellite: The Other Side of the Coin
Cellular Backhauling over Satellite: The Other Side of the Coin
 
Small Cell State of the Nation 2017
Small Cell State of the Nation 2017Small Cell State of the Nation 2017
Small Cell State of the Nation 2017
 
Alternative ownership and operations models: Hospitality
Alternative ownership and operations models: HospitalityAlternative ownership and operations models: Hospitality
Alternative ownership and operations models: Hospitality
 
Small Cell Forum: Lighting the path to 5G
Small Cell Forum: Lighting the path to 5GSmall Cell Forum: Lighting the path to 5G
Small Cell Forum: Lighting the path to 5G
 
Small Cell Industry Insight & Experience Sharing
Small Cell Industry Insight & Experience SharingSmall Cell Industry Insight & Experience Sharing
Small Cell Industry Insight & Experience Sharing
 
Parallel Wireless: Removing Deployment Constraints of Small Cell vRAN and 5G ...
Parallel Wireless: Removing Deployment Constraints of Small Cell vRAN and 5G ...Parallel Wireless: Removing Deployment Constraints of Small Cell vRAN and 5G ...
Parallel Wireless: Removing Deployment Constraints of Small Cell vRAN and 5G ...
 
HetNets and Wi-Fi Offload – Finding the appropriate venues for small cells in...
HetNets and Wi-Fi Offload – Finding the appropriate venues for small cells in...HetNets and Wi-Fi Offload – Finding the appropriate venues for small cells in...
HetNets and Wi-Fi Offload – Finding the appropriate venues for small cells in...
 
Antenna Evolution: From 4G to 5G
Antenna Evolution: From 4G to 5GAntenna Evolution: From 4G to 5G
Antenna Evolution: From 4G to 5G
 
Driving Connectivity in the Scottish Islands: Droneways and Airmasts
Driving Connectivity in the Scottish Islands: Droneways and AirmastsDriving Connectivity in the Scottish Islands: Droneways and Airmasts
Driving Connectivity in the Scottish Islands: Droneways and Airmasts
 
5G Network Architecture and Design
5G Network Architecture and Design5G Network Architecture and Design
5G Network Architecture and Design
 
Small Cells Asia 2016: Sue Monahan keynote
Small Cells Asia 2016: Sue Monahan keynoteSmall Cells Asia 2016: Sue Monahan keynote
Small Cells Asia 2016: Sue Monahan keynote
 
SCF announcements from MWC16
SCF announcements from MWC16SCF announcements from MWC16
SCF announcements from MWC16
 
Virtualisation - A new workstream for the SCF from Mark Grayson (Cisco)
Virtualisation - A new workstream for the SCF from Mark Grayson (Cisco)Virtualisation - A new workstream for the SCF from Mark Grayson (Cisco)
Virtualisation - A new workstream for the SCF from Mark Grayson (Cisco)
 
Julius Robson: Small Cell Backhaul
Julius Robson: Small Cell BackhaulJulius Robson: Small Cell Backhaul
Julius Robson: Small Cell Backhaul
 
Small Cells Service
Small Cells ServiceSmall Cells Service
Small Cells Service
 

Similar to Securing Small Cells Mobile Networks

Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityForcepoint LLC
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, EverywhereLINE Corporation
 
Application security as crucial to the modern distributed trust model
Application security as crucial to   the modern distributed trust modelApplication security as crucial to   the modern distributed trust model
Application security as crucial to the modern distributed trust modelLINE Corporation
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetWatcher
 
Bridgera enterprise IoT security
Bridgera enterprise IoT securityBridgera enterprise IoT security
Bridgera enterprise IoT securityRon Pascuzzi
 
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?lorzinian
 
AI saturdays Nigeria
AI saturdays Nigeria AI saturdays Nigeria
AI saturdays Nigeria Damon Civin
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)BeyondTrust
 
Today's Predictions for Tomorrow's Connected World
 Today's Predictions for Tomorrow's Connected World  Today's Predictions for Tomorrow's Connected World
Today's Predictions for Tomorrow's Connected World Symantec
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsJoshua Berman
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSolarWinds
 
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...NowSecure
 
Cyber Resilency VANCOUVER, BC Nov 2017
Cyber Resilency VANCOUVER, BC  Nov 2017  Cyber Resilency VANCOUVER, BC  Nov 2017
Cyber Resilency VANCOUVER, BC Nov 2017 Kevin Murphy
 
The Open Sourcing of Infrastructure
The Open Sourcing of InfrastructureThe Open Sourcing of Infrastructure
The Open Sourcing of InfrastructureAll Things Open
 
Engineering the IoT at AWS - IOT402 - re:Invent 2017
Engineering the IoT at AWS - IOT402 - re:Invent 2017Engineering the IoT at AWS - IOT402 - re:Invent 2017
Engineering the IoT at AWS - IOT402 - re:Invent 2017Amazon Web Services
 
Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet   Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet Bill Harpley
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?Zscaler
 

Similar to Securing Small Cells Mobile Networks (20)

Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
 
Application security as crucial to the modern distributed trust model
Application security as crucial to   the modern distributed trust modelApplication security as crucial to   the modern distributed trust model
Application security as crucial to the modern distributed trust model
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
Bridgera enterprise IoT security
Bridgera enterprise IoT securityBridgera enterprise IoT security
Bridgera enterprise IoT security
 
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?
 
AI saturdays Nigeria
AI saturdays Nigeria AI saturdays Nigeria
AI saturdays Nigeria
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
 
Today's Predictions for Tomorrow's Connected World
 Today's Predictions for Tomorrow's Connected World  Today's Predictions for Tomorrow's Connected World
Today's Predictions for Tomorrow's Connected World
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
 
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
 
Cyber Resilency VANCOUVER, BC Nov 2017
Cyber Resilency VANCOUVER, BC  Nov 2017  Cyber Resilency VANCOUVER, BC  Nov 2017
Cyber Resilency VANCOUVER, BC Nov 2017
 
The Open Sourcing of Infrastructure
The Open Sourcing of InfrastructureThe Open Sourcing of Infrastructure
The Open Sourcing of Infrastructure
 
Engineering the IoT at AWS - IOT402 - re:Invent 2017
Engineering the IoT at AWS - IOT402 - re:Invent 2017Engineering the IoT at AWS - IOT402 - re:Invent 2017
Engineering the IoT at AWS - IOT402 - re:Invent 2017
 
Serguei Beloussov - Future of computing
Serguei Beloussov - Future of computingSerguei Beloussov - Future of computing
Serguei Beloussov - Future of computing
 
Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet   Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 

More from Small Cell Forum

SCF - Accelerating Densification Worldwide
SCF - Accelerating Densification WorldwideSCF - Accelerating Densification Worldwide
SCF - Accelerating Densification WorldwideSmall Cell Forum
 
American Tower small cell solutions
American Tower small cell solutionsAmerican Tower small cell solutions
American Tower small cell solutionsSmall Cell Forum
 
Parallel Wireless - Making carrier-grade cellular network deployments as easy...
Parallel Wireless - Making carrier-grade cellular network deployments as easy...Parallel Wireless - Making carrier-grade cellular network deployments as easy...
Parallel Wireless - Making carrier-grade cellular network deployments as easy...Small Cell Forum
 
SCF's Vision for the 5G Era
SCF's Vision for the 5G Era SCF's Vision for the 5G Era
SCF's Vision for the 5G Era Small Cell Forum
 
MWC 2018 sponsorship options for SCF members
MWC 2018 sponsorship options for SCF membersMWC 2018 sponsorship options for SCF members
MWC 2018 sponsorship options for SCF membersSmall Cell Forum
 
Small cell innovations 2017
Small cell innovations 2017Small cell innovations 2017
Small cell innovations 2017Small Cell Forum
 
Maximising ROI and User Experience with Outdoor Small Cells: Airspan
Maximising ROI and User Experience with Outdoor Small Cells: AirspanMaximising ROI and User Experience with Outdoor Small Cells: Airspan
Maximising ROI and User Experience with Outdoor Small Cells: AirspanSmall Cell Forum
 
SCF Urban Densification Introduction
SCF Urban Densification IntroductionSCF Urban Densification Introduction
SCF Urban Densification IntroductionSmall Cell Forum
 
Small Cell Mass Deployment, What is Really Needed? Node-H
Small Cell Mass Deployment, What is Really Needed? Node-HSmall Cell Mass Deployment, What is Really Needed? Node-H
Small Cell Mass Deployment, What is Really Needed? Node-HSmall Cell Forum
 
How Small Cells Resolve the Design Challenges in a Dense Venue: iBwave
How Small Cells Resolve the Design Challenges in a Dense Venue: iBwave How Small Cells Resolve the Design Challenges in a Dense Venue: iBwave
How Small Cells Resolve the Design Challenges in a Dense Venue: iBwave Small Cell Forum
 
American Tower: In-building Wireless Connectivity
American Tower: In-building Wireless ConnectivityAmerican Tower: In-building Wireless Connectivity
American Tower: In-building Wireless ConnectivitySmall Cell Forum
 
SCF Enteprise Private Indoor Introduction
SCF Enteprise Private Indoor IntroductionSCF Enteprise Private Indoor Introduction
SCF Enteprise Private Indoor IntroductionSmall Cell Forum
 
Parallel Wireless Rural and Remote Case Studies
Parallel Wireless Rural and Remote Case StudiesParallel Wireless Rural and Remote Case Studies
Parallel Wireless Rural and Remote Case StudiesSmall Cell Forum
 
Facebook Open Cellular Overview
Facebook Open Cellular OverviewFacebook Open Cellular Overview
Facebook Open Cellular OverviewSmall Cell Forum
 
SCF Small Cells for Rural and Remote Introduction
SCF Small Cells for Rural and Remote IntroductionSCF Small Cells for Rural and Remote Introduction
SCF Small Cells for Rural and Remote IntroductionSmall Cell Forum
 
Real World Orchestration & Automation
Real World Orchestration & AutomationReal World Orchestration & Automation
Real World Orchestration & AutomationSmall Cell Forum
 
Multi-access Edge Computing (MEC), Nokia
Multi-access Edge Computing (MEC), NokiaMulti-access Edge Computing (MEC), Nokia
Multi-access Edge Computing (MEC), NokiaSmall Cell Forum
 
Radisys Virtualized RAN using the Mobile-CORD platform
Radisys Virtualized RAN using the Mobile-CORD platformRadisys Virtualized RAN using the Mobile-CORD platform
Radisys Virtualized RAN using the Mobile-CORD platformSmall Cell Forum
 
Cloud RAN and Evolution to 5G
Cloud RAN and Evolution to 5GCloud RAN and Evolution to 5G
Cloud RAN and Evolution to 5GSmall Cell Forum
 

More from Small Cell Forum (20)

SCF - Accelerating Densification Worldwide
SCF - Accelerating Densification WorldwideSCF - Accelerating Densification Worldwide
SCF - Accelerating Densification Worldwide
 
American Tower small cell solutions
American Tower small cell solutionsAmerican Tower small cell solutions
American Tower small cell solutions
 
Parallel Wireless - Making carrier-grade cellular network deployments as easy...
Parallel Wireless - Making carrier-grade cellular network deployments as easy...Parallel Wireless - Making carrier-grade cellular network deployments as easy...
Parallel Wireless - Making carrier-grade cellular network deployments as easy...
 
SCF's Vision for the 5G Era
SCF's Vision for the 5G Era SCF's Vision for the 5G Era
SCF's Vision for the 5G Era
 
MWC 2018 sponsorship options for SCF members
MWC 2018 sponsorship options for SCF membersMWC 2018 sponsorship options for SCF members
MWC 2018 sponsorship options for SCF members
 
Small cell innovations 2017
Small cell innovations 2017Small cell innovations 2017
Small cell innovations 2017
 
Maximising ROI and User Experience with Outdoor Small Cells: Airspan
Maximising ROI and User Experience with Outdoor Small Cells: AirspanMaximising ROI and User Experience with Outdoor Small Cells: Airspan
Maximising ROI and User Experience with Outdoor Small Cells: Airspan
 
SCF Urban Densification Introduction
SCF Urban Densification IntroductionSCF Urban Densification Introduction
SCF Urban Densification Introduction
 
Small Cell Mass Deployment, What is Really Needed? Node-H
Small Cell Mass Deployment, What is Really Needed? Node-HSmall Cell Mass Deployment, What is Really Needed? Node-H
Small Cell Mass Deployment, What is Really Needed? Node-H
 
How Small Cells Resolve the Design Challenges in a Dense Venue: iBwave
How Small Cells Resolve the Design Challenges in a Dense Venue: iBwave How Small Cells Resolve the Design Challenges in a Dense Venue: iBwave
How Small Cells Resolve the Design Challenges in a Dense Venue: iBwave
 
American Tower: In-building Wireless Connectivity
American Tower: In-building Wireless ConnectivityAmerican Tower: In-building Wireless Connectivity
American Tower: In-building Wireless Connectivity
 
SCF Enteprise Private Indoor Introduction
SCF Enteprise Private Indoor IntroductionSCF Enteprise Private Indoor Introduction
SCF Enteprise Private Indoor Introduction
 
Parallel Wireless Rural and Remote Case Studies
Parallel Wireless Rural and Remote Case StudiesParallel Wireless Rural and Remote Case Studies
Parallel Wireless Rural and Remote Case Studies
 
Facebook Open Cellular Overview
Facebook Open Cellular OverviewFacebook Open Cellular Overview
Facebook Open Cellular Overview
 
SCF Small Cells for Rural and Remote Introduction
SCF Small Cells for Rural and Remote IntroductionSCF Small Cells for Rural and Remote Introduction
SCF Small Cells for Rural and Remote Introduction
 
Real World Orchestration & Automation
Real World Orchestration & AutomationReal World Orchestration & Automation
Real World Orchestration & Automation
 
Multi-access Edge Computing (MEC), Nokia
Multi-access Edge Computing (MEC), NokiaMulti-access Edge Computing (MEC), Nokia
Multi-access Edge Computing (MEC), Nokia
 
Quortus Edge Computing
Quortus Edge ComputingQuortus Edge Computing
Quortus Edge Computing
 
Radisys Virtualized RAN using the Mobile-CORD platform
Radisys Virtualized RAN using the Mobile-CORD platformRadisys Virtualized RAN using the Mobile-CORD platform
Radisys Virtualized RAN using the Mobile-CORD platform
 
Cloud RAN and Evolution to 5G
Cloud RAN and Evolution to 5GCloud RAN and Evolution to 5G
Cloud RAN and Evolution to 5G
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Securing Small Cells Mobile Networks

  • 1. Security Briefing Prof. David Rogers, Copper Horse @drogersuk 1st March 2017 Mobile World Congress 2017 Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 1
  • 2. Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. Introduction 2
  • 3. • What are the existing threats in the small cells world • Why? • What do you need to look for? • Who is targeting small cells? • The user as an enemy Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. Security Threats and Risks 3
  • 4. Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. Physical and Environment Security 4 • How easy is it to target infrastructure? • Physical attacks on small cells • Constrained environments • Remote installations and satellite considerations • Measures you can take
  • 5. Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. Device and Hardware Security 5 • Getting the foundations right • Building for failure • Advanced defensive techniques • Moving functionality off the device • How attackers approach hardware hacks and why they do it
  • 6. Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. Virtualisation 6 • NFV and SDN • Sandboxing and containerisation • Cloud processing and attacks • Resilience • Randomness and non-randomness • Where is my data? • X86, what? • Attacks Image source: ETSI
  • 7. • Different networks, different security • Accepting risk • Untrusted backhaul • Gateway security and traffic monitoring • Jamming • Don’t be flooded • Points of security failure • Self-Organising Networks (SON) Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. Protecting the Network 7
  • 8. Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. Who is Connected to the Future Internet? 8 Source: http://cheezburger.com/8068370944 Source: http://spectrum.ieee.org/computing/em bedded-systems/on-the-internet-of- things-nobody-knows-youre-a-dog
  • 9. Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 5G 9 • Considering how to design 5G for multiple needs • Safety and privacy • Appropriate security at nodes • Network density security aspects • The potential of downgrade attacks • Masquerading • 5G security planning
  • 10. Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. Security Contexts 10 • Appropriate security, deployed correctly
  • 11. Natural Disasters & Critical Infrastructure Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 11 Image source: https://nayabchohan.com/author/nayabchohan786/
  • 12. Wireless from Above Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 12 http://www.mobilephonesecurity.org
  • 13. Can You Trust the Data? Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 13 Source: “Worldwide Threat Assessment of the US Intelligence Community, February 2015 and 2016” http://www.dni.gov/files/documents/Unclassified_2015_ATA_SFR_-_SASC_FINAL.pdf http://www.dni.gov/files/documents/SASC_Unclassified_2016_ATA_SFR_FINAL.pdf James Clapper, US Director of National Intelligence: “we might also see more cyber operations that will change or manipulate electronic information in order to compromise its integrity (i.e. accuracy and reliability) instead of deleting it or disrupting access to it.” (2015) “cyber actors will seek to exploit the integrity of networked and online information. This runs the gamut from modifying and transmitting false data to public utilities and market firms, to implanting false information on online media. ” (2016)
  • 14. Data Manipulation (1) Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 14
  • 15. Data Manipulation (2) Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 15
  • 16. Resilience Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 16
  • 17. Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. Compromised Connected Pets and Toys 17
  • 18. Legacy? Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. Servants’ Bells Copyright Adam Tinworth https://www.flickr.com/photos/adders/6 041931491 CC BY-ND 2.0 18
  • 19. Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. Mr Robot 19 Images: fair use, Amazon
  • 20. Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. Existing and Upcoming Security Research 20  DEF CON 24, 2016
  • 21.  Largest DDoS recorded  Scans the whole internet  Brute-forces telnet and infects  Uses default passwords – Admin / admin etc.  Mostly CCTV cameras / routers – Major network operator hit badly – Also cars, trucks, laptops, M2M… Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. IoT botnet: Mirai 21 Image: www.malwaretech.com Further reading: http://blog.mobilephonesecurity.org/2016/10/dead-on-arrival- whats-next-for-iot.html https://www.malwaretech.com/2016/10/mapping-mirai-a-botnet-case-study.html
  • 22.  Open source Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. IoT botnet: Mirai (2) 22 Image: https://github.com/jgamblin/Mirai-Source-Code/issues/8
  • 23. Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. SHA-1 23
  • 24. SCF Release 9 Small Cell Forum Release 9, security: http://www.scf.io/en/documents/171_Comprehensive_overview _of_small_cell_security.php Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 24
  • 25. Thanks! david.rogers [@] copperhorse.co.uk @drogersuk @copperhorseuk Copyright © 2017 Copper Horse Solutions Ltd. All rights reserved. 25