An Analysis of 3G Phone Security Emily Maples & Evan Nakano CMPE 209.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

BY, ARITRA GAUTAM (05-275) & G.PAVANI (05-272).. OVERVIEW OF GSM GSM (group special mobile or general system for mobile communications) is the Pan-European.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Security+ Guide to Network Security Fundamentals
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 Network Security Derived from original slides by Henric Johnson Blekinge Institute of Technology, Sweden From the book by William Stallings.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
High Speed Internet Access At Home Broadband Technologies Security Concerns Hardware/Software Solutions William Kramp 4/12/2001.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Factors to be taken into account when designing ICT Security Policies
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
How to Integrate a WiFi Network for Mobile Devices
Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 張耕瑋 黃峻亨 楊銘鴻 李昌諭 吳政穎 陳建廷.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
Computer Security, Ethics and Privacy Chapter 11.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
NETWORKS.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Michael McDonnell GIAC Certified Intrusion Analyst Creative Commons License: You are free to share and remix but you must provide.
PC Security: Antivirus Presentation done by Ming-Li Emily Chang (A2980) Raymond Chok (A2419)
NETWORKS Year 12 Unit 1. Lesson objectives To understand and define What is a network? LANs and WANs The Internet, Intranet and Extranet Network Hardware.
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 4 Application Level Security in Cellular Networks.
Android Mobile Security Krystal Salerno. Introductions.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Topic 5: Basic Security.
Module 11: Designing Security for Network Perimeters.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Chapter 1: Explore the Network
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
MIS323 – Business Telecommunications Chapter 10 Security.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
WIRELESS FRAUD Detection & Prevention. Method of Fraud CLONING of SIM Card.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Securing Interconnect Networks By: Bryan Roberts.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Securing Information Systems
Security in Networking
Present By:- Company Name: Global Market Forecastes Tel: / Web:
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Forensics Week 12.
Another perspective on Network Security
Network Hardware and Protocols
Networking for Home and Small Businesses – Chapter 8
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

An Analysis of 3G Phone Security Emily Maples & Evan Nakano CMPE 209

Agenda  3G Definition  Purpose of 3G Security  Types of 3G Security Attacks  3G Security Vulnerability Points  Types of Protection  Business Implication  Conclusions

3G Definition  “Third generation of telecommunication hardware standards and general technology for mobile networking, superseding 2.5H”  Based on the International Telecommunication Union (ITU) family of standards  Offers data, voice, and video services over a wide-area wireless network

Purpose of 3G Security  Initially, mobile operators only provided cellular voice service  Had limited security concerns  With 3G mobile networks, mobile operators are offering data services  Requires opening up once restricted networks to a wider range of networks  3G mobile operators must now address an entirely new set of hazards  Including viruses, Trojans, and denial of service attacks

Types of 3G Security Attacks  Viruses  Denial of service  Overbilling  Spoofed PDP context  Signaling-level attacks which involve modification

3G Security Vulnerability Points  The mobile equipment (ME) itself (i.e. personal computers, smart phones, etc)  The wireless link between the ME and the cellular base station (BS)  Interfaces to other mobile or data networks

Types of Protection  Device and network anti-virus scanning  Firewalls and VPNs  Intrusion detection and prevention (IDP)  Signaling firewalls

Business Implication  Interrupted service  Lost billable minutes  Increased customer dissatisfaction  Increase number of support calls  Legal ramifications

Conclusions  Security is a significant factor to a mobile network operator as well as the subscribers  There will always be attackers that find new ways of compromising data being sent across the network  As long as networks vulnerability points are well understood, software mechanisms can be employed to protect the network against possible threats