Security WG Areas of Interest FYI - Strawman Vancouver June 2001 Sprint PCS ®

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
Lecture 1: Overview modified from slides of Lawrie Brown.
Myagmar, Gupta UIUC G Security Principles Build on GSM security Correct problems with GSM security Add new security features Source: 3GPP.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
An Introduction to Information Assurance COEN 150 Spring 2007.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Lecture 1: Overview modified from slides of Lawrie Brown.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
ECT 582 Secure Electronic Commerce Professor Robin Burke.
Network security Network security. Look at the surroundings before you leap.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
ACM 511 Introduction to Computer Networks. Computer Networks.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Information Security in Distributed Systems Distributed Systems1.
Chap1: Is there a Security Problem in Computing?.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
Cryptography and Network Security Sixth Edition by William Stallings.
Ch 13 Trustworthiness Myungchul Kim
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
McLean HIGHER COMPUTER NETWORKING Lesson 12 Network Security Requirements Description of computer and network security requirements (confidentiality,
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Peer-to-Peer Solutions Between Service Providers David A. Bryan CTO, Jasomi Networks October 10, 2002 – Fall VON, Atlanta, GA.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
CS 395: Topics in Computer Security
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Information System and Network Security
COMPUTER SECURITY CONCEPTS
Security Shmuel Wimer prepared and instructed by
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Information Security: Terminology
Computer Security Introduction
Security network management
Security in SDR & cognitive radio
Introduction to Cryptography
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

Security WG Areas of Interest FYI - Strawman Vancouver June 2001 Sprint PCS ®

Page 1 3GPP2-S A Secrecy and Integrity Control Security (Secrecy/Privacy) of Users’ Information u Any information generated by or for a user, for any IP multimedia application, shall be provided with strong privacy and secrecy Security against modifying Users’ Messages (Integrity) u Any information generated by or for a user for any IP multimedia application, shall be provided with integrity and be protected from any unauthorized modification Security of Users’ Profile u Users’ Profile, Identity, Location & Signaling shall not be leaked out at any cost both, by visiting or home network to unauthorized agency. It demands security algorithms to be interoperable and compatible worldwide and yet to be trustworthy.

Page 2 3GPP2-S A Security against Misusing Services Authentication at the Start of Session u Security algorithm shall authenticate the users right at the start of the session and immediately terminate the unauthorized users to prevent network resources from being unnecessarily engaged Secured QoS u Security algorithm shall refrain the users to steal QoS of contemporary users Protection against Malicious Adversary for Misusing Services u Network shall be robust & shall not allow any false & unregistered user to have fraudulent access to services and cheat the network operator Protection against Customer Fraud u Network shall be robust & shall not allow fraudulent impersonation to steal services and cheat the other users

Page 3 3GPP2-S A Security against sabotaging Network Performance Protection against Attacks u viral attacks that may lead to impair/corrupt database or ruin operator’s reputation u All infrastructure equipment shall be protected from any sort of attacks that may corrupt the database or impair Network performance Protection against unauthorised modifications in network database u unauthorised modification of database u unauthorised modification that registered user may do while downloading services like OTASPA or SAT.

Page 4 3GPP2-S A Security against sabotaging Network Infrastructure Secure Infrastructure between Network Operators u There shall be a secure infrastructure between network operators. Secure Infrastructure against All Users u There shall be a secure infrastructure against users SIM/RUIM Safety u SIM/RUIM be protected against any unauthorized modification of user-related data which is stored or processed by a provider. Protection against Theft u Network shall determine the stolen terminals and bar them from accessing 3G services.

Page 5 3GPP2-S A Security of User Information Confidentiality u Any information related to users - protection against any unauthorized disclosure Integrity u Any information related to users shall be protected against any unauthorized modification Security of Users’ Profile u Users’ Profile, Identity, Location & Signaling shall be protected by Visiting and Home network from unauthorized agency

Page 6 3GPP2-S A Security of Message Traversed Across Network Confidentiality u Any information traveled over the network (RAN and Core) shall be protected against any unauthorized disclosure Integrity u Any information traveled over the network (RAN and Core) shall be protected against any unauthorized modification Peer-to-peer Authentication u Network must be capable of authenticating the sender of the packets

Page 7 3GPP2-S A Security of Network Infrastructure Secure Infrastructure between Network Operators Secure Infrastructure against Malicious Users SIM/RUIM Safety u SIM/RUIM be protected against any unauthorized modification of user-related data which is stored or processed by a provider.

Page 8 3GPP2-S A Security of Network Database Protection against Attacks u protect against viral attacks that may lead to impair/corrupt database or ruin operator’s reputation u All infrastructure equipment - protection from any sort of attacks that may corrupt network databases Protection against unauthorised modifications in network database u protection from any unauthorised modification of database by intruders u unauthorised modification that registered user may do while downloading services like OTASPA or SAT.

Page 9 3GPP2-S A Security of Services User Authentication u security mechanism to authenticate the users right at the start of the session and immediately terminate the unauthorized users from being engaged network network resources and services Protection of QoS Services u protection to prevent misuse of QoS Services (e.g., steal QoS from others, etc.) Protection against Malicious Adversary of Misusing Services u protection from any false & unregistered user from using network

Page 10 3GPP2-S A Security of Services (cont.) Protection against Customer Fraud u fraudulent impersonation of stealing services from other users Protection against Theft u guarding access of 3G services Protection of Denial of Services u attacks (e.g., viral attack) that may lead to impair network from providing services or to totally disable services

Page 11 3GPP2-S A Detection Of Security Breaches Intelligent Security Algorithm and Audit Data u detecting security breaches through monitoring/recording subscribers usage pattern and their traffic details in the event when security violation incident had occurred u trace the origin of unauthorized user, keep record (Audit Data) Protection of Audit Data

Page 12 3GPP2-S A Other Considerations Transparent Legal Intercept u Secured tracking of possibly fair subscribers, but legal culprits shall be possible and shall be transparent to user for the purpose of Lawful Interception User’s Confidence u To enhance users' confidence on operator, they may be made able to counter check whether or not their call related information is secure. However legal intercept shall still be transparent Service Interruption for Defaulter u Barring services for defaulters shall also be possible

Page 13 3GPP2-S A Other Considerations (2/2) Location/Push Services be Discretionary u Disclosure of location information of a user to the 3rd party shall be on user's discretion u Disclosure of user profile to the 3rd party for offering him push services shall be on user's discretion Future-Proof Network against Unforeseen Threats u Analyse architecture for future-proof allowing security features enhancements as demanded by new services or unforeseen threats