E-mail: office@securegsm.bg Web Site: www.securegsm.bg Secure GSM Ltd. Manager: Dipl. Eng. Ventsislav Dyakov Phone: +359 898 778 128 E-mail: office@securegsm.bg.

Slides:



Advertisements
Similar presentations
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Advertisements

Mobile of world business standards BLACKBERRY® FROM MTS.
GSM Security Threats and Countermeasures Saravanan Bala Tanvir Ahmed Samuel Solomon Travis Atkison.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Methods of communication
THREATS TO MOBILE NETWORK SECURITY
Overview of cellular system
SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
SPK – 4 Golomazov Artem in my life. Hello! My name is Artem and I’d like to tell you about Information Technology by using Information Technology! It.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
TECHNOLOGY IN ACTION. Chapter 8 Digital Devices and Media: Managing a Digital Lifestyle.
IP Security
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
5G Wireless Technology.
Wi-Fi Technology.
Security Issues in Information Technology
Web Applications Security Cryptography 1
Outline The basic authentication problem
Security of Digital Signatures
Wireless Network PMIT- By-
EMBEDDED SYSTEMS.
TRUSTED | PROTECTED | SECURED
Wireless Communication and Networks
Brazil VPS Onlive Server Technology LLP offers you Brazil VPS Hosting Server at an affordable price with lots of feature.
GSM SECURITY AND ENCRYPTION
Ping™ 6.
Secure Sockets Layer (SSL)
Personal Digital Devices Lesson 1
UNIT 19 Data Security 2.
STEGANOGRAPHY.
MOBILE COMPUTING Jitendra Patel ROLL NO :- 38 TY MSC(CA & IT)
Seminar on…. 5G Wireless Technology By: Niki Upadhyay
Submitted by imtiaz hussain BBE/785.
GCSE ICT Revision Topic 2: Connectivity.
Mobile Phone Techniques
Introduction to Networking
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
McGraw-Hill Technology Education
CORPORATE PROFILE JUNE 2016
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Mobile Devices: How they Operate
Progress leisure OCR GCSE ICT.
Secrets Between Just You and Me
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
برنامج أمن أنظمة الحاسب
Ian Ramsey C of E School GCSE ICT Smart working Any time, anywhere.
NSK 200 GSM Secure Telephone, NSK 201 DECT Single Base Station and
Connectivity methods. Connectivity methods Exam Answer WAN/LAN  Each office will have its own Local Area Network or LAN.  But the company also wants.
Switching Techniques.
The Secure Sockets Layer (SSL) Protocol
McGraw-Hill Technology Education
Module 2 OBJECTIVE 14: Compare various security mechanisms.
ONLINE SECURE DATA SERVICE
Public-Key, Digital Signatures, Management, Security
Security in SDR & cognitive radio
Dept. of Business Administration
Security in Wide Area Networks
Cellular Telephone Networks
Lecture 36.
Lecture 36.
Presentation transcript:

E-mail: office@securegsm.bg Web Site: www.securegsm.bg Secure GSM Ltd. Manager: Dipl. Eng. Ventsislav Dyakov Phone: +359 898 778 128 E-mail: office@securegsm.bg Web Site: www.securegsm.bg

10 “Panagyurishte” Str., BC-BI, office 6 7700 Targovishte, Bulgaria «Secure GSM» Ltd. is a rapidly developing Bulgarian company in hardware and software technology of guaranteed voice ciphering in mobile networks of GSM standard «Secure GSM» Ltd. was established in 2015. The main areas of company’s activity are development, production and introduction of encryption (cryptographic) devices and systems for protection of the information.

Secure GSM Ltd. Range of products GSM phones for encrypted phone calls. Encrypted USB and hard drives with keypad. Data destruction equipment. Mini GSM/GPRS/GPS trackers.

Threats and attacks using GSM phones Mobile phones and smartphones may unexpectedly turn from helpers into “enemies” The GSM standard is vulnerable to interception of the radio signal and its decryption in real time. There is special equipment that, located up to several kilometers away of you , can intercept your particular phone call, decipher and record it on a digital data carrier. Such interception equipment is available on the spy ware market and its low cost allows its presence not only with the special services, but also with various groups of people and organizations. You may even not suspect that your smartphone eavesdrops you and films, fixes and transmits imperceptibly all your personal information to malevolent persons.

Threats and attacks using GSM phones Your phone call or the conversation in the room where you are (audio monitoring) can be saved in the memory of your phone and upon the termination of the communication an Internet connection can be activated but go unnoticed by you and the recorded conversation can be sent to a particular server. It is entirely understandable that using such popular programs for data encryption as WhatsApp, Skype, Viber and other creates the illusion of correspondence safety, but cannot protect us from spyware attacks and ignoring these facts definitely pose a threat to the confidential information shared via them.

Threats and attacks using GSM phones You will fail to notice that the camera of your phone is activated by a special command and you are not only tapped, but also monitored what happens with you and around you. The GPS receiver of your phone can be activated and the coordinates of your location and your route of travel can be recorded. A snapshot of your screen can be activated as well as many other things. Both smartphones with the widespread operating systems and the phones with attackable versions of the operating systems are subject to such attacks by “infecting” them with malicious (virus) programs.

How to protect ourselves? It is the sort of phones our company offers What should we do? How to protect ourselves? All you need is a phone with special engineering solutions and additional cryptoprocessor. To be your phone protected: It must have special cryptoprocessors that not only encrypt phone calls, but also protect from audio monitoring; It must not use popular operating systems for which there is a large amount of virus programs developed; A cryptoscheme must be used with a session key length at least 128 bit for «SECRET» and 256 bit for «TOP SECRET»; The encryption keys must be created by the phone owner or his/her trustee. It is the sort of phones our company offers

Special encrypted cell phone SP-7 Features: Special cell phone SP-7 Provides guaranteed protection against wiretapping of phone calls in GSM mobile phones network. GSM ranges: 850, 900, 1800, 1900 MHz Symmetric encryption algorithm 256 bits key length The public 256 bit key is newly generated for every communication session by calculating the elliptic curves parameters 254 bits long according to Diffie-Hellman Public Key scheme Speech compression algorithm: 4800 bit/s ACELP Protection from audio monitoring Weight: 140 g Dimensions: 110х40х20mm Available on the market today

Special encrypted cell phone SP-7 Cryptoscheme: Communication session key is a combination of the public key and the secret key created by users themselves by means of “key generation center” application. Personal secret key generation – by you in person (your security service) and this is particularly important! No one will know your encryption key and therefore no one can decipher your phone calls.

Special encrypted cell phone SP-7 Connection scheme: Guaranteed protection of telephone calls can only be achieved when “point-to-point” connection scheme is used. GSM network does not allow implementation of “point-to-point” encryption in the voice channel. For this reason the phone SP-7 uses the data transmission channel CSD 9600 bit/s in the mode of encrypted (ciphered) phone calls. This requires a basic service BS-26T in GSM network (data transmission at 9600 bit / s, switching of channels). GSM mobile operators in Bulgaria and Europe maintain and offer above-mentioned service for use. In case of doubt on the existence or provision of the mentioned service for use we provide a pair of phones for testing GSM networks.

Special encrypted cell phone TB-7 Connection scheme : If, for any reason, none of GSM operators in your country supports or offers the basic service BS-26T, then it is necessary to use a phone working in 3G GSM and using VoIP technology (Voice over IP). The completion of the development and placing on the market of such type of GSM phone is expected in 2017.

Special encrypted cell phone TB-7 Features: Special GSM phone TB-7. Symmetric encryption algorithm 256 bits key length The public key 256 bits is newly generated for every communication session calculating elliptic curves parameters 254 bits long according Diffie-Hellman Public Key scheme Communication session key is a combination of public key and secret key created by user (by means of “key generation center” application) and installed into the phone Compatible with Special phone SP-7 Supports Wi-Fi Supports VoIP 2G range: 850, 900, 1800, 1900 MHz 3G range: 900, 2100 MHz Weight: 150 g Dimensions: 112х44х18 mm Will be available on the market in 2017

Special encrypted cell phones SP-7, TB-7 Certificates: The Special GSM phones SP-7 and TB-7 are entered in Register of radio and / or electronic communication devices of the State Agency for National Security  in accordance with Art. 274, para. 1 of the Electronic Communications Act (ECA)

Encrypted USB and hard drives with keypads : In order to ensure the safety of the confidential data in personal and business communication we offer a range of encrypted USB drives with keypads with AES-256 real time hardware encryption of Guard’Do and Netac trade marks: USB 2.0 and USB 3.0 encrypted flash drives with a keypad and built-in Li-Ion battery. Storage capacity: 16GB, 32GB, 64GB.

Encrypted USB and hard drives with keypads : 1.8” USB 3.0 encrypted SSD with a keypad. Storage capacity : 64GB, 128GB, 256GB, 512GB.

Encrypted USB and hard drives with keypads : 2.5” USB 3.0 encrypted HDD with a keypad. Storage capacity: 500GB, 1TB, 2TB.

Mini GSM/GPRS/GPS Tracker Mini GSM/GPRS/GPS tracker offered will make your life more secure and safer! You will always know where your children, elderly parents, pets, cars, boats, etc. are. You will be able to monitor their location and motion directly on your mobile phone screen.

Thank you for your attention! Secure GSM Ltd 10 “Panagyurishte” Str., BC-BI, office 6 7700 Targovishte, Bulgaria Phone: +359 898 778 128 E-mail: office@securegsm.bg Web Site: www.securegsm.bg