SlideShare a Scribd company logo
Strong Security
for Microwave
Radio
April 2013
AVIAT NETWORKS
WHY IS SECURITY BECOMING A GROWING CONCERN?
AVIAT NETWORKS
DRASTIC CONTEXT EVOLUTION
AVIAT NETWORKS
YOU THINK SECURITY IS IMPROVING IN KEY
NETWORKS? THINK AGAIN!
Extract from McAfee Avert Labs researcher Francois Paget's blog:
"…Modern SCADA networks are more vulnerable
than ever because they use open networking standards
(such as TCP/IP), are now deployed under less secure
operating systems (Windows), are connected to other
networks (including Internet), and cannot be easily
updated and rebooted."
AVIAT NETWORKS
WHY IS STRONGER SECURITY BECOMING A MUST?!
For example,
The U.S. State Dept. detects in a typical week over
a million external probes to their primary
non-classified network
• 340,000 computers are hijacked every day
Cybercrime economy was estimated at over
$1 trillion in 2010
Number of attacks are growing exponentially
AVIAT NETWORKS
YOU THINK STRONG SECURITY IS JUST FOR MILITARY?
THINK AGAIN!
Extract from Backbone magazine reporting on a McAfee survey of 600 IT executives:
AVIAT NETWORKS
FEELING SAFE BECAUSE YOU ARE NOT CONNECTED TO
INTERNET?
AVIAT NETWORKS
INSIDERS ARE THE #1 SOURCE OF HACKING/SECURITY
PROBLEMS
AVIAT NETWORKS
WHAT IS YOUR INFORMATION A WORTH?
AVIAT NETWORKS
SO FAR WE HAVE SEEN THAT…
AVIAT NETWORKS
NOW LET’S…
AVIAT NETWORKS
A FEW GENERAL SECURITY PRINCIPLES
AVIAT NETWORKS
A FEW GENERAL SECURITY PRINCIPLES
AVIAT NETWORKS
LET’S FACE IT…
You need the most complete solution possible!
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
AVIAT NETWORKS
THREATS AND SOLUTIONS
W W W . AV I AT N E T W O R K S . C O M

More Related Content

What's hot

FTTX with Passive Optical Networks
FTTX with Passive Optical NetworksFTTX with Passive Optical Networks
FTTX with Passive Optical Networks
Anuradha Udunuwara
 

What's hot (20)

5G Network Architecture, Design and Optimisation
5G Network Architecture, Design and Optimisation5G Network Architecture, Design and Optimisation
5G Network Architecture, Design and Optimisation
 
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
 
IECEP AGM 2018: Wireless Mesh Technology by Kristian Anquillano
IECEP AGM 2018: Wireless Mesh Technology by Kristian AnquillanoIECEP AGM 2018: Wireless Mesh Technology by Kristian Anquillano
IECEP AGM 2018: Wireless Mesh Technology by Kristian Anquillano
 
Module 5 Wireless Network Design Considerations
Module 5   Wireless Network Design ConsiderationsModule 5   Wireless Network Design Considerations
Module 5 Wireless Network Design Considerations
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernet
 
Voice in 4G: CSFB, VoIP & VoLTE
Voice in 4G: CSFB, VoIP & VoLTEVoice in 4G: CSFB, VoIP & VoLTE
Voice in 4G: CSFB, VoIP & VoLTE
 
5gc call flow
5gc call flow5gc call flow
5gc call flow
 
Mobile network structure
Mobile network structure Mobile network structure
Mobile network structure
 
5G Huawei BTS5900
5G Huawei BTS5900 5G Huawei BTS5900
5G Huawei BTS5900
 
IEEE 802.11ax
IEEE 802.11axIEEE 802.11ax
IEEE 802.11ax
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack Explained
 
Nokia FLexi Edge BTS Installation Cabling and Checks
Nokia FLexi Edge BTS Installation Cabling and ChecksNokia FLexi Edge BTS Installation Cabling and Checks
Nokia FLexi Edge BTS Installation Cabling and Checks
 
Nokia LTE IP Planning Guide
Nokia LTE IP Planning GuideNokia LTE IP Planning Guide
Nokia LTE IP Planning Guide
 
FTTX with Passive Optical Networks
FTTX with Passive Optical NetworksFTTX with Passive Optical Networks
FTTX with Passive Optical Networks
 
Wireless communication ppt by dinesh
Wireless communication ppt by dineshWireless communication ppt by dinesh
Wireless communication ppt by dinesh
 
Alcatel Lucent 9500 mpr user manual
Alcatel Lucent 9500 mpr user manualAlcatel Lucent 9500 mpr user manual
Alcatel Lucent 9500 mpr user manual
 
Nokia engineer basic_training_session_v1
Nokia engineer basic_training_session_v1Nokia engineer basic_training_session_v1
Nokia engineer basic_training_session_v1
 
Core Network Optimization: The Control Plane, Data Plane & Beyond
Core Network Optimization: The Control Plane, Data Plane & BeyondCore Network Optimization: The Control Plane, Data Plane & Beyond
Core Network Optimization: The Control Plane, Data Plane & Beyond
 
Meet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingMeet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networking
 
WiFi Technology & IEEE
WiFi Technology & IEEEWiFi Technology & IEEE
WiFi Technology & IEEE
 

Similar to Strong Security for Microwave Radio

Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
Samuel Kamuli
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
mahendrarm2112
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
MeshDynamics
 
Topic #17 IT Security ITSecurityIncidentsA.docx
Topic #17   IT Security ITSecurityIncidentsA.docxTopic #17   IT Security ITSecurityIncidentsA.docx
Topic #17 IT Security ITSecurityIncidentsA.docx
juliennehar
 

Similar to Strong Security for Microwave Radio (20)

Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
The application security controller
The application security controllerThe application security controller
The application security controller
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Internet(2)
Internet(2)Internet(2)
Internet(2)
 
INSECURE Magazine - 39
INSECURE Magazine - 39INSECURE Magazine - 39
INSECURE Magazine - 39
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
SCADA White Paper March2012
SCADA White Paper March2012SCADA White Paper March2012
SCADA White Paper March2012
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
 
pptt.pptx
pptt.pptxpptt.pptx
pptt.pptx
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
 
Topic #17 IT Security ITSecurityIncidentsA.docx
Topic #17   IT Security ITSecurityIncidentsA.docxTopic #17   IT Security ITSecurityIncidentsA.docx
Topic #17 IT Security ITSecurityIncidentsA.docx
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Port security
Port securityPort security
Port security
 
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Cyber security and Industry.pptx
Cyber security and Industry.pptxCyber security and Industry.pptx
Cyber security and Industry.pptx
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 

More from Aviat Networks

More from Aviat Networks (15)

Case for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell SiteCase for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell Site
 
Innovations for Better Performing Networks
Innovations for Better Performing NetworksInnovations for Better Performing Networks
Innovations for Better Performing Networks
 
Small Cell Backhaul Technology
Small Cell Backhaul TechnologySmall Cell Backhaul Technology
Small Cell Backhaul Technology
 
Low latency Microwave: Fact, Fiction & Future
Low latency Microwave: Fact, Fiction & FutureLow latency Microwave: Fact, Fiction & Future
Low latency Microwave: Fact, Fiction & Future
 
5 Things You Should Know About Fronthaul
5 Things You Should Know About Fronthaul5 Things You Should Know About Fronthaul
5 Things You Should Know About Fronthaul
 
LONG HAUL MULTI-GIGABIT MICROWAVE: A NEW APPROACH
LONG HAUL MULTI-GIGABIT MICROWAVE: A NEW APPROACHLONG HAUL MULTI-GIGABIT MICROWAVE: A NEW APPROACH
LONG HAUL MULTI-GIGABIT MICROWAVE: A NEW APPROACH
 
Microwave Technology Options
Microwave Technology OptionsMicrowave Technology Options
Microwave Technology Options
 
Building the FirstNet Nationwide Network: Architecture Solutions
Building the FirstNet Nationwide Network: Architecture SolutionsBuilding the FirstNet Nationwide Network: Architecture Solutions
Building the FirstNet Nationwide Network: Architecture Solutions
 
LTE Backhaul Challenges, Small Cells and the Critical Role of Microwave
LTE Backhaul Challenges, Small Cells and the Critical Role of MicrowaveLTE Backhaul Challenges, Small Cells and the Critical Role of Microwave
LTE Backhaul Challenges, Small Cells and the Critical Role of Microwave
 
Best Practices for Building Ultra-Low Latency Microwave Networks
Best Practices for Building Ultra-Low Latency Microwave NetworksBest Practices for Building Ultra-Low Latency Microwave Networks
Best Practices for Building Ultra-Low Latency Microwave Networks
 
The Evolution of Microwave Communications
The Evolution of Microwave CommunicationsThe Evolution of Microwave Communications
The Evolution of Microwave Communications
 
Eclipse IDU GE3 for Mobile Backhaul
Eclipse IDU GE3 for Mobile BackhaulEclipse IDU GE3 for Mobile Backhaul
Eclipse IDU GE3 for Mobile Backhaul
 
Microwave Solutions for LTE Networks
Microwave Solutions for LTE NetworksMicrowave Solutions for LTE Networks
Microwave Solutions for LTE Networks
 
Turnkey Network Services - Aviat Networks
Turnkey Network Services - Aviat NetworksTurnkey Network Services - Aviat Networks
Turnkey Network Services - Aviat Networks
 
IP Mobile Backhaul Presentation
IP Mobile Backhaul PresentationIP Mobile Backhaul Presentation
IP Mobile Backhaul Presentation
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Strong Security for Microwave Radio