Cyberspace - A Global Battlespace? Joel Ebrahimi Solutions Architect Bivio Networks, Inc.

Slides:



Advertisements
Similar presentations
All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
Advertisements

Microsoft Internet Security and Acceleration (ISA) Server 2004 Technical Overview
SECURITY AND INFORMATION SYSTEMS THE EVOLUTION OF SECURITY SYSTEMS Created By: Jamere Hill Instructor: Kyhia Bostic Section University of Houston.
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 5 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
© 2008 Bivio Networks, Inc. All rights reserved. Specifications subject to change without notice. Evolution & Requirements for DPI in Network Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Cyber-Warfare: The Future is Now!
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written.
Trust, Safety, & Reliability Part 2 MALICE. Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
CYBER CRIME AND SECURITY TRENDS
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Norman SecureSurf Protect your users when surfing the Internet.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008.
Securing Information Systems
Association of Communications Engineers Corralling the Broadband Stampede May 7 – 9, 2012 Fort Worth, Texas.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
What is FORENSICS? Why do we need Network Forensics?
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Monitoring for network security and management Cyber Solutions Inc.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
CS 3830 Day 5 Introduction 1-1. Announcements  Program 1 due today at 3pm  Program 2 posted by tonight (due next Friday at 3pm)  Quiz 1 at the end.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Hurdles in implementation of cyber security in India.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Sky Advanced Threat Prevention
Safe’n’Sec IT security solutions for enterprises of any size.
Security Mindset Lesson Introduction Why is cyber security important?
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
Information Systems Week 7 Securing Information Systems.
STORAGE ARCHITECTURE/ MASTER): Where IP and FC Storage Fit in Your Enterprise Randy Kerns Senior Partner The Evaluator Group.
Global Video Surveillance Market Report: 2016 Edition Tel:
Cybersecurity Test Review Introduction to Digital Technology.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Bharat Book Bureau Your One Stop Shop For Business Information Market Research Report The report on Global Video Surveillance and VSaaS Market.
October 28, 2015 Cyber Security Awareness Update.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Barracuda NG Firewall ™
Securing Information Systems
Security in Networking
File Transfer Issues with TCP Acceleration with FileCatalyst
Cyber Security Challenges
Introduction to Networking Security
Security Insights: Secure Messaging
Chapter 8 – Data switching and routing
Presentation transcript:

Cyberspace - A Global Battlespace? Joel Ebrahimi Solutions Architect Bivio Networks, Inc.

©2010 Bivio Networks, Inc. A Hacker’s Opportunity is Target Rich! Enterprise –Personal –Credit Card Government –Military secrets –Nuclear Information –Medical Records –Criminal Records –Classified Secrets and Information –Control of Physical Infrastructure Power Electrical Water 2 Joe Hacker

©2010 Bivio Networks, Inc. Exploitation Evolution While we look at the evolution trend, it should be noted that the less severe exploits have not gone away. They still exist today and have even increased in numbers. The problem is that we also have to deal with exploits that now affect our national security. Experimentation / Notoriety Hacktivism / Defacements Criminal Enterprise Espionage / Cyber Terrorism

©2010 Bivio Networks, Inc. Hacking Hotspots and Trends CHINA Targeting Japan, U.S., Taiwan and perceived allies of those countries; Falun Gong targeted also INDIA-PAKISTAN Worldwide targets, Kashmir-related and Muslim-related defacements MIDDLE EAST Palestinian hackers target Israeli websites; some pro-Israel activity WESTERN EUROPE Cyber-activists with anti-global/anti- capitalism goals; some malicious code BRAZIL Multiple hacker groups, many mercenary; random targets EASTERN EUROPE/RUSSIA Malicious code development; fraud and financial hacking U.S. Multiple hacker/cyber- activist/hacktivist groups; random targets

©2010 Bivio Networks, Inc. Is the threat real? 5

©2010 Bivio Networks, Inc. Its Real and Happening Now! Stuxnet Cyber Espionage DDOS attacks in Estonia Attacks on Booz Allen Hamilton Breach of defense contractor computers that let hackers get at information on the Joint Strike Fighter Power grid compromised Repeated attacks on.gov websites Real growing threat of cyber terrorism 6

©2010 Bivio Networks, Inc. The Threats Malware –Worms –Trojans –Rootkits –Spyware Remote of local exploitation Botnets

©2010 Bivio Networks, Inc. A Transforming Network Explosion in usage, applications, devices, protocols Basic networking problems remain –Security –Information assurance –Cyber defense –Awareness –Control Network role transition from connectivity to policy Key Enabling Technology: Deep Packet Inspection

©2010 Bivio Networks, Inc. Deep Packet Inspection (DPI) Set of technologies enabling fine-grained processing of network traffic Common analogy: processing regular mail based on letter contents vs. address Not a solution or an application! L2L3L4L5 – L7 Ethernet Internet Protocol (IP) Transport Layer (TCP/UDP) , IM Web File Transfer Peer-to-Peer (P2P) Viruses Intrusions Worms

©2010 Bivio Networks, Inc. L3/4 analysis clearly not granular enough –Source/Destination often irrelevant Most information is in the payload –Deeply embedded –Context dependent –Dynamic Tunneling makes outer protocols/headers insufficient Correlation between flows and payload often crucial Threats are real-time and dynamic; response can’t be –DPI is real-time networking analog to off-line analysis –Dramatically shortens threat identification and response Why DPI?

©2010 Bivio Networks, Inc. The Right Technology Scalability: variable throughput, computation Performance: –Computational: full packet inspection –Network: wire-speed Flexibility: software is king Customization: each mission different Adaptability: inherent in space Active/Passive: monitoring and enforcement Multi-function: parallel tasks Standardization: Avoid proprietary environments Rapid deployment

©2010 Bivio Networks, Inc. Protecting The Future Infrastructure –Focus on high-compute/high-throughput System design Semiconductors –Keep pace with networking advances 40Gb/s 100Gb/s –Storage integration Data Retention Post-processing Applications –Increased sophistication of protocol analysis –Increased cross-flow analysis –Information sharing between applications –Dynamic threat response

©2010 Bivio Networks, Inc. Summary Threats are already here Cyber Terrorism is real The network is changing and growing DPI technology underlies future networking Core technology for National Security requirements Challenges addressed in rapidly advancing market Significant innovation into the future

©2010 Bivio Networks, Inc. Not just a presenter, this is what I do Special purpose networking devices 10Gb/s+ High compute capacity Throughput and compute scaling Linux development environment Multi-application support Joel Ebrahimi Bivio Networks, Inc Thank You!