40
1 1 Reda 2008 ICTmc Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008, AICT 2008 Athens, June , 2008 Dr. Reda Innovation Communication Technologies Munich / Vienna

Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

1

1 Reda 2008 ICTmc

Performance Evaluation in Wireless

Networks and Technologies from 2.5

G, 3G, LTE to 4G and Beyond

ICIW 2008, AICT 2008 Athens, June , 2008

Dr. Reda

Innovation Communication Technologies

Munich / Vienna

Page 2: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

2

2 Reda 2008 ICTmc

The Dilemma of Security

• The problem that we cannot get away from in computer security is that we can only have good security if everyone understands what security means, and agrees with the need for security.

• Security is a social problem, because it has no meaning until a person defines what it means to them.

• The harsh reality is the following: In practice, many users have little or no understanding of

security BIG PICTURE. This is our biggest security hole.

Page 3: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

3

3 Reda 2008 ICTmc

SECURITY ?

Do we have

Page 4: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

4

4 Reda 2008 ICTmc

Tools Available to Achieve Site Security

Page 5: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

5

5 Reda 2008 ICTmc

NASA – www.nasa.gov

Page 6: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

6

6 Reda 2008 ICTmc

CNN – www.cnn.com

Page 7: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

7

7 Reda 2008 ICTmc

NSA – www.nsa.gov

Page 8: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

8

8 Reda 2008 ICTmc

RIAA – www.riaa.com

Page 9: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

9

9 Reda 2008 ICTmc

NAVY – www.navy.mil

Page 10: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

10

10 Reda 2008 ICTmc

Samsung - www.samsung.com

Page 11: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

11

11 Reda 2008 ICTmc

Microsoft - www.microsoft.com

Page 12: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

12

12 Reda 2008 ICTmc

Sony Music www.sonymusic.com

Page 13: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

13

13 Reda 2008 ICTmc

Security Bla Bla …. Tools Available to Achieve Site Security

Page 14: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

14

14 Reda 2008 ICTmc

Cyber Security Risks

Number of Malicious Hacking Attacks Worldwide 8,000 in 2000 31,000 in 2001 60,000 in 2004 100,000in 2005 240,000 in 2006 450.000 in 2007 ??? In 2008

mi2g

Page 15: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

15

15 Reda 2008 ICTmc

Worldwide ICT Security Market

Page 16: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

16

16 Reda 2008 ICTmc

Split-Out of the ICT Security Market

Page 17: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

17

17 Reda 2008 ICTmc

Percentage of respondents deploying ICT security solutions

Page 18: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

18

18 Reda 2008 ICTmc

Balance: A and C

Security Access

Page 19: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

19

19 Reda 2008 ICTmc

SECURITY

The

R & D Trends

Page 20: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

20

20 Reda 2008 ICTmc

… or quantum, etc.

Information may take different physical forms…

There is no information without a physical carrier, and no computation without a physical process.

The laws of physics dictate what computations can be.

… mechanical,

… or bio-molecular,

… or electronic,

Page 21: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

21

21 Reda 2008 ICTmc

Introduction Security and Encryption

Encryption:

The process of transforming plain text or data into cipher text

that cannot be read by anyone other than the sender and receiver

Purpose:

Secure stored information

Secure information transmission

Provides:

Message integrity

Nonrepudiation

Authentication

Confidentiality

Page 22: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

22

22 Reda 2008 ICTmc

What is Encryption ?

Encryption is the process of converting messages, information, or data into a form unreadable by anyone except the intended recipient. As shown in the figure below, Encrypted data must be deciphered, or decrypted, before it can be read by the recipient.

The root of the word encryption—crypt—comes from the Greek word kryptos, meaning hidden or secret.

Page 23: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

23

23 Reda 2008 ICTmc

Modern Encryption Algorithms

Private Key Encryption

Public Key Encryption

Quantum Cryptography

Page 24: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

24

24 Reda 2008 ICTmc

Quantum,

from Physics to Programming

Page 25: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

25

25 Reda 2008 ICTmc

C. Physics Q. physics At any given time, a physical system is in

one state, and only one state, among a set

of possible states of that system.

At any given time, a physical system can be

in one state among a set of possible basis

states. But, in general, it is in a state which

is a superposition of several basis states.

The observation of a physical system in state S

does not modify S and it is deterministic:

it returns the same information for identical

systems in state S.

The observation of a physical system in state S

irreversibly modifies S and it is probabilistic:

it may return different information for

identical systems in state S.

The transformations of the state of a physical

system are not, in general, reversible.

The transformations of the state of an

unobserved physical system are reversible

and deterministic.

The state of a physical system composed of n

sub-systems is reducible to an n-tuple of the

states of these sub-systems.

The state of a physical system composed of n

sub-systems is not, in general, reducible to an

n-tuple of the states of these sub-systems.

The state of a physical system A can be copied

into another physical system B, if both systems

have the same set of possible states.

The state of a physical system A cannot,

in general, be copied into another physical

system B.

Page 26: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

26

26 Reda 2008 ICTmc

A classical bit is, at every pointin time:

- either in state 1:

- or in state 0:

State of a classical bit: b {0,1}B ist ein element aus dem wertbereich 0 or 1

Classical Bit

A quantum bit (« qubit ») is, at everypoint in time:

- either in basis state |1 :

- or in basis state |0 :

Quantum Bit

- or in a superposition state, i.e. at the same time |1 and |0 :

State of a qubit: | where E is a 2-dimensional

vector space

Page 27: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

27

27 Reda 2008 ICTmc

Quantum Cryptography

Method of secure key exchange over an insecure channel based on the nature of photons

Polarized photons are transmitted between sender and

receiver to create a random string of numbers, the quantum cryptographic key

Perfect encryption for the 21st century

Experimental stages

Very secure

Page 28: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

28

28 Reda 2008 ICTmc

What Does it Mean- “Security”?

• Communications security - concerned with the protection of an organization’s communications media, technology, and content.

• Network security is the protection of networking components, connections, and contents.

• Information Security – protection of information and its critical elements, including the systems and hardware that use, store, or transmit that information.

Page 29: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

29

29 Reda 2008 ICTmc

Information Security Threats

• Act of Human Error or Failure (accidents, mistakes)

•Compromises to Intellectual Property (piracy, copyright infringement)

• Acts of Espionage or Trespass (unauthorized access and/or data collection)

• Acts of Information Extortion (blackmail of information disclosure)

• Acts of Sabotage or Vandalism (destruction of systems or information)

• Software Attacks (viruses, worms, macros, denial of service)

Page 30: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

30

30 Reda 2008 ICTmc

What Does it Mean- “Security”?

• Communications security

• Network security

• Information Security

•..

•…

Society Security

Page 31: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

31

31 Reda 2008 ICTmc

Meaning of Security Lies in Trust

• Every security problem has this question it needs to

answer first: Whom or what do we trust?

• On our daily lives, we placed some sort of technology between us and the “things” we don’t trust. For example lock the car, set the house alarm, give Credit Card number only to the cashier, etc.

• So we decided to trust somebody/something to have some sort of security (trust the lock, trust the police, trust the cashier).

• We have to have the same scenario for computer & network systems we use today.

Page 32: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

32

32 Reda 2008 ICTmc

State of the Industry

•According to the 2007 Computer Security Institute and FBI annual study on security, 95% of respondents detected computer security breaches in the last 12 months.

•Companies will spend nearly $96 Billion on network security in 2008 and it is expected this amount could triple in the next two years.

Page 33: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

33

33 Reda 2008 ICTmc

Information Security Threats

• Forces of Nature (fire, flood, earthquake, lightning)

• Quality of Service Deviations from Service Providers (power & WAN service issues)

• Technical Hardware Failures or Errors (equipment failure)

• Technical Software Failures or Errors (bugs, code problems, unknown loopholes)

• Technological Obsolescence (antiquated or outdated technologies)

•TERROR

Page 34: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

34

34 Reda 2008 ICTmc

The CISSP

What is it ?

Why is it important to you ?

How do you prepare ?

Page 35: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

35

35 Reda 2008 ICTmc

CISSP Overview

Certified Information System Security Professional

Intended for those who make descisions about information

security risks and the protection of that information

Most common certifications sought by employer looking for

Chief Security Officers and Consultants

8000+ worldwide

Page 36: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

36

36 Reda 2008 ICTmc

It‘s not VoIP, it‘s not QoS, it‘s all about Security

First competence centre for Information Security

and trust ( 3Q 2008)

Benefits to vs. costs

Page 37: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

37

37 Reda 2008 ICTmc

Requirements

3 Years

Relevant Experience

Agree to Follow

Code of ethics

Passing Grade on

Comprehensive Exam

Continued Annual Development

Page 38: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

38

38 Reda 2008 ICTmc

Advantages of CISSP

To the employer and customer

Reduced risk

In a field that has grown so rapidly, it is difficult to evaluate qualifications

Encourages employee growth

To the professional

Exposure to complete body of infosec knowledge

Increased employment opportunities

More status

Page 39: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

39

39 Reda 2008 ICTmc

Benefits of (ISC) Certification

Establishes best practices

Provides a solutions-orientation, not specialization,

particularly with the broader understanding of the IS

Access to a network of global industry and subject

matter/domain experts

Resource for broad-based security information

Adds to credibility with the rigor and regimen of the

certification examinations

Provides a business and technology orientation to risk

management

Page 40: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,

40

40 Reda 2008 ICTmc

The BIG Disadvantage