Security Issues in large scale wireless and VoIP deployment Andrew Yeomans VP Global Information Security Dresdner Kleinwort Wasserstein

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Real world application Corporate Wireless Networking Andrew Yeomans DrKW & Jericho Forum Board.
Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
Singapore lah? James Norris
IT GOVERNANCE COMMITTEE MEETING February 19, 2008.
Prepare for the future  The de-perimeterised “road-warrior”  Paul Simmonds ICI Plc. & Jericho Forum Board.
Wi-Fi Security January 21, 2008 by Larry Finger. Wi-Fi Security Most laptops now come with built-in wireless capability, which can be very handy; however,
By Abdullah Al-Dossary Ahmad Al-Suhaibani
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Network Policy (slides by Jeremy, Brian, and Daniel)
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Wireless Security. Why is it important? Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Over.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Wireless Vulnerability Management  2008 AirTight Networks, Inc. Wireless Vulnerability Assessment – Airport Scanning Report Part - II A study conducted.
 2009 AirTight Networks. Financial Districts Wireless Vulnerability Study A study conducted by AirTight Networks, Inc.
By: Christopher Henderson.  What is VoIP?  How is it being used?  VoIP’s main Security Threats.  Availability of Service  Integrity of Service 
DIRECT-TO-CLOUD Issues & Implications Dale McCarty.
Cyber Security Finance Forum 2012 Michael DuBose Managing Director & Practice Leader Cyber Investigations.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Chicago’s Global Status: Is Chicago a “global city”? GaWC: rates cities’ “global” status [Globalization and World Cities Study Group & Network: Loughborough.
Hosted by IDS for WLANs The Mansfield Group, LLC Security for Enterprise Networks Wireless LAN Security Workshop Wash DC Honolulu.
New perspectives March, 2007 Agri Revolution Hans Wortelboer.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Education roaming Secure Wireless Service for Research and Education.
About Schroders At Schroders, asset management is our business and our goals are completely aligned with those of our clients - the creation of long-term.
Risk Systems Achieving a Singular View of Trading Operations Worldwide Pascal Emile Global Head of Market Risk Technology 13 July 2004.
Wikis at Dresdner Bob Coulter Alan Hurt Mike Mueller.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates.
Ch 20. Computer Network Wireless Connections. Bluetooth3G MobileWiFi Speed3Mbit/s7.2Mbit/s54Mbit/s Coverage~10MCity – wide~50M CostFree$200 - $400 /monthFree.
Quintum Confidential and Proprietary 1 Quintum Technologies, Inc. Session Border Controller and VoIP Devices Behind Firewalls Tim Thornton, CTO.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Managing World Cities World Cities: Asian Perspectives Dr. Takashi Tsukamoto University of North Carolina at Greensboro Hong Kong October 23-25, 2008.
1 December MobileMonday Global Community 36 Now playing 3 Coming attractions 15 In The Pipeline.
Managing World Cities World Cities: Asian Perspectives Dr. Takashi Tsukamoto University of North Carolina at Greensboro Hong Kong October 23-25, 2008.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
European Cities in the World City Network, 2010 Peter Taylor.
Abab The Challenges of L&D in a Global Environment 7 th Annual Corporate University Xchange Awards.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
PwC Making Wireless Networks Secure Computerworld 30 Nov 2004 Mark Vos.
Best Place in the World for Social Entrepreneurs Singapore as a Social Silicon Valley? Cross-Border Innovation & Entrepreneurship Global Symposium 4 December.
Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005.
Networking Network Classification, by there: 3 Security And Communications software.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
10 th February, 2016 Retail in the era of the connected customer Retail Leadership Summit 2016 Principal, A.T. Kearney Subhendu Roy
OIT and IT providers across campus are launching an awareness campaign to provide tips and resources to help you stay safe online and protect AU resources.
IS3220 Information Technology Infrastructure Security
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Computer Security Sample security policy Dr Alexei Vernitski.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
World cities David Redfern. World cities What this presentation covers What is a world city? Where are the world cities? How can world cities be identified?
Installation and Setting up a Wireless LAN. Why would you want a Wireless LAN? Because it would take a lot of cable to set up your Internet, and a wireless.
Direct-to-cloud Issues & Implications Dale McCarty.
(1) All flows (2) International flows
FSMA Enforcement: Focus on Inspections
RRA introduction 14th July 2016 Prepared by: Puneet Kalra.
Banking $ London New York Tokyo Hong Kong Singapore
Introduction to Networking Security
Presentation transcript:

Security Issues in large scale wireless and VoIP deployment Andrew Yeomans VP Global Information Security Dresdner Kleinwort Wasserstein Wi-Fi Summit - October 2005

2 Dresdner Kleinwort Wasserstein (DrKW) DrKW is the investment bank of Dresdner Bank AG Member of the Allianz Group Headquartered in London and Frankfurt, offices in New York, Chicago, San Francisco, Boston, Tokyo, Sao Paulo, Paris, Milan, Beijing, Shanghai, Hong Kong, Luxembourg, Kuala Lumpur, Warsaw, Moscow, St. Petersburg, Singapore, Johannesburg, Madrid, Zürich Employs approximately 6,000 people around the world More than € 2 billion operating income in 2004

3 Relocation to 30 Gresham Street, London

4 With latest technologies Voice-over-IP (fixed and mobile) Wireless Guest wireless internet access for visitors Staff access in meeting rooms

5 With latest technologies

6 Desire and lust for shiny new technology! Truly mobile computing – Work from the coffee lounge or canteen Wireless IP phone from anywhere in building Technology is cool Of course it’s secure!

7 Fear, Loathing and Rejection (Jim Herbeck) Protocol flaws Implementation flaws Usability – need another mobile? War driving, War chalking AirSnort, Kismet, WEPcrack Denial of Service … but are these real?

8 What can you do with an old laptop and a scenic view?

9 And a couple of old techies?

10 Results wireless networks seen Just using internal PCMCIA aerial Only half used WEP encryption (some are hotspots) With aerial can pick up Canary Wharf – 4 km away “The Feds can own your LAN too” – in 3 minutes Packet injection attacks

11 And that’s not all … Use in hotspots – real or fake? Home networks – set up securely? Location-sensing required – e.g. personal firewalls Insider threats – inadvertent and malicious Stolen devices (with keys) Other wireless devices

12 Floods of vulnerabilities

13 Means anticipating failure

14 But the new devices fix it, don’t they? "Those who cannot remember the past are condemned to repeat it." - George Santayana, The Life of Reason WEP -> WPA -> WPA2 (802.11i) -> ?? But devices are upgradable.. Or are they? And it takes years to flush out the old equipment So hotspots support least common denominator So have to run IPsec or SSL/TLS instead Unless you really can design from new

15 In conclusion Assess risks Confidentiality, Integrity and Availability are still key Anything can go wrong – so be prepared for failure Put appropriate policy controls in place Trust – but verify – check configurations, monitor data Work with your security people And reap the business benefits!

Questions? Andrew Yeomans VP Global Information Security Dresdner Kleinwort Wasserstein Wi-Fi Summit - October 2005