performance evaluation in wireless networks and ......1 ictmc 1 reda 2008 performance evaluation in...
TRANSCRIPT
![Page 1: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/1.jpg)
1
1 Reda 2008 ICTmc
Performance Evaluation in Wireless
Networks and Technologies from 2.5
G, 3G, LTE to 4G and Beyond
ICIW 2008, AICT 2008 Athens, June , 2008
Dr. Reda
Innovation Communication Technologies
Munich / Vienna
![Page 2: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/2.jpg)
2
2 Reda 2008 ICTmc
The Dilemma of Security
• The problem that we cannot get away from in computer security is that we can only have good security if everyone understands what security means, and agrees with the need for security.
• Security is a social problem, because it has no meaning until a person defines what it means to them.
• The harsh reality is the following: In practice, many users have little or no understanding of
security BIG PICTURE. This is our biggest security hole.
![Page 3: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/3.jpg)
3
3 Reda 2008 ICTmc
SECURITY ?
Do we have
![Page 4: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/4.jpg)
4
4 Reda 2008 ICTmc
Tools Available to Achieve Site Security
![Page 5: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/5.jpg)
5
5 Reda 2008 ICTmc
NASA – www.nasa.gov
![Page 6: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/6.jpg)
6
6 Reda 2008 ICTmc
CNN – www.cnn.com
![Page 7: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/7.jpg)
7
7 Reda 2008 ICTmc
NSA – www.nsa.gov
![Page 8: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/8.jpg)
8
8 Reda 2008 ICTmc
RIAA – www.riaa.com
![Page 9: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/9.jpg)
9
9 Reda 2008 ICTmc
NAVY – www.navy.mil
![Page 10: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/10.jpg)
10
10 Reda 2008 ICTmc
Samsung - www.samsung.com
![Page 11: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/11.jpg)
11
11 Reda 2008 ICTmc
Microsoft - www.microsoft.com
![Page 12: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/12.jpg)
12
12 Reda 2008 ICTmc
Sony Music www.sonymusic.com
![Page 13: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/13.jpg)
13
13 Reda 2008 ICTmc
Security Bla Bla …. Tools Available to Achieve Site Security
![Page 14: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/14.jpg)
14
14 Reda 2008 ICTmc
Cyber Security Risks
Number of Malicious Hacking Attacks Worldwide 8,000 in 2000 31,000 in 2001 60,000 in 2004 100,000in 2005 240,000 in 2006 450.000 in 2007 ??? In 2008
mi2g
![Page 15: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/15.jpg)
15
15 Reda 2008 ICTmc
Worldwide ICT Security Market
![Page 16: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/16.jpg)
16
16 Reda 2008 ICTmc
Split-Out of the ICT Security Market
![Page 17: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/17.jpg)
17
17 Reda 2008 ICTmc
Percentage of respondents deploying ICT security solutions
![Page 18: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/18.jpg)
18
18 Reda 2008 ICTmc
Balance: A and C
Security Access
![Page 19: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/19.jpg)
19
19 Reda 2008 ICTmc
SECURITY
The
R & D Trends
![Page 20: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/20.jpg)
20
20 Reda 2008 ICTmc
… or quantum, etc.
Information may take different physical forms…
There is no information without a physical carrier, and no computation without a physical process.
The laws of physics dictate what computations can be.
… mechanical,
… or bio-molecular,
… or electronic,
![Page 21: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/21.jpg)
21
21 Reda 2008 ICTmc
Introduction Security and Encryption
Encryption:
The process of transforming plain text or data into cipher text
that cannot be read by anyone other than the sender and receiver
Purpose:
Secure stored information
Secure information transmission
Provides:
Message integrity
Nonrepudiation
Authentication
Confidentiality
![Page 22: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/22.jpg)
22
22 Reda 2008 ICTmc
What is Encryption ?
Encryption is the process of converting messages, information, or data into a form unreadable by anyone except the intended recipient. As shown in the figure below, Encrypted data must be deciphered, or decrypted, before it can be read by the recipient.
The root of the word encryption—crypt—comes from the Greek word kryptos, meaning hidden or secret.
![Page 23: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/23.jpg)
23
23 Reda 2008 ICTmc
Modern Encryption Algorithms
Private Key Encryption
Public Key Encryption
Quantum Cryptography
![Page 24: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/24.jpg)
24
24 Reda 2008 ICTmc
Quantum,
from Physics to Programming
![Page 25: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/25.jpg)
25
25 Reda 2008 ICTmc
C. Physics Q. physics At any given time, a physical system is in
one state, and only one state, among a set
of possible states of that system.
At any given time, a physical system can be
in one state among a set of possible basis
states. But, in general, it is in a state which
is a superposition of several basis states.
The observation of a physical system in state S
does not modify S and it is deterministic:
it returns the same information for identical
systems in state S.
The observation of a physical system in state S
irreversibly modifies S and it is probabilistic:
it may return different information for
identical systems in state S.
The transformations of the state of a physical
system are not, in general, reversible.
The transformations of the state of an
unobserved physical system are reversible
and deterministic.
The state of a physical system composed of n
sub-systems is reducible to an n-tuple of the
states of these sub-systems.
The state of a physical system composed of n
sub-systems is not, in general, reducible to an
n-tuple of the states of these sub-systems.
The state of a physical system A can be copied
into another physical system B, if both systems
have the same set of possible states.
The state of a physical system A cannot,
in general, be copied into another physical
system B.
![Page 26: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/26.jpg)
26
26 Reda 2008 ICTmc
A classical bit is, at every pointin time:
- either in state 1:
- or in state 0:
State of a classical bit: b {0,1}B ist ein element aus dem wertbereich 0 or 1
Classical Bit
A quantum bit (« qubit ») is, at everypoint in time:
- either in basis state |1 :
- or in basis state |0 :
Quantum Bit
- or in a superposition state, i.e. at the same time |1 and |0 :
State of a qubit: | where E is a 2-dimensional
vector space
![Page 27: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/27.jpg)
27
27 Reda 2008 ICTmc
Quantum Cryptography
Method of secure key exchange over an insecure channel based on the nature of photons
Polarized photons are transmitted between sender and
receiver to create a random string of numbers, the quantum cryptographic key
Perfect encryption for the 21st century
Experimental stages
Very secure
![Page 28: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/28.jpg)
28
28 Reda 2008 ICTmc
What Does it Mean- “Security”?
• Communications security - concerned with the protection of an organization’s communications media, technology, and content.
• Network security is the protection of networking components, connections, and contents.
• Information Security – protection of information and its critical elements, including the systems and hardware that use, store, or transmit that information.
![Page 29: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/29.jpg)
29
29 Reda 2008 ICTmc
Information Security Threats
• Act of Human Error or Failure (accidents, mistakes)
•Compromises to Intellectual Property (piracy, copyright infringement)
• Acts of Espionage or Trespass (unauthorized access and/or data collection)
• Acts of Information Extortion (blackmail of information disclosure)
• Acts of Sabotage or Vandalism (destruction of systems or information)
• Software Attacks (viruses, worms, macros, denial of service)
![Page 30: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/30.jpg)
30
30 Reda 2008 ICTmc
What Does it Mean- “Security”?
• Communications security
• Network security
• Information Security
•..
•…
Society Security
![Page 31: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/31.jpg)
31
31 Reda 2008 ICTmc
Meaning of Security Lies in Trust
• Every security problem has this question it needs to
answer first: Whom or what do we trust?
• On our daily lives, we placed some sort of technology between us and the “things” we don’t trust. For example lock the car, set the house alarm, give Credit Card number only to the cashier, etc.
• So we decided to trust somebody/something to have some sort of security (trust the lock, trust the police, trust the cashier).
• We have to have the same scenario for computer & network systems we use today.
![Page 32: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/32.jpg)
32
32 Reda 2008 ICTmc
State of the Industry
•According to the 2007 Computer Security Institute and FBI annual study on security, 95% of respondents detected computer security breaches in the last 12 months.
•Companies will spend nearly $96 Billion on network security in 2008 and it is expected this amount could triple in the next two years.
![Page 33: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/33.jpg)
33
33 Reda 2008 ICTmc
Information Security Threats
• Forces of Nature (fire, flood, earthquake, lightning)
• Quality of Service Deviations from Service Providers (power & WAN service issues)
• Technical Hardware Failures or Errors (equipment failure)
• Technical Software Failures or Errors (bugs, code problems, unknown loopholes)
• Technological Obsolescence (antiquated or outdated technologies)
•TERROR
![Page 34: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/34.jpg)
34
34 Reda 2008 ICTmc
The CISSP
What is it ?
Why is it important to you ?
How do you prepare ?
![Page 35: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/35.jpg)
35
35 Reda 2008 ICTmc
CISSP Overview
Certified Information System Security Professional
Intended for those who make descisions about information
security risks and the protection of that information
Most common certifications sought by employer looking for
Chief Security Officers and Consultants
8000+ worldwide
![Page 36: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/36.jpg)
36
36 Reda 2008 ICTmc
It‘s not VoIP, it‘s not QoS, it‘s all about Security
First competence centre for Information Security
and trust ( 3Q 2008)
Benefits to vs. costs
![Page 37: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/37.jpg)
37
37 Reda 2008 ICTmc
Requirements
3 Years
Relevant Experience
Agree to Follow
Code of ethics
Passing Grade on
Comprehensive Exam
Continued Annual Development
![Page 38: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/38.jpg)
38
38 Reda 2008 ICTmc
Advantages of CISSP
To the employer and customer
Reduced risk
In a field that has grown so rapidly, it is difficult to evaluate qualifications
Encourages employee growth
To the professional
Exposure to complete body of infosec knowledge
Increased employment opportunities
More status
![Page 39: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/39.jpg)
39
39 Reda 2008 ICTmc
Benefits of (ISC) Certification
Establishes best practices
Provides a solutions-orientation, not specialization,
particularly with the broader understanding of the IS
Access to a network of global industry and subject
matter/domain experts
Resource for broad-based security information
Adds to credibility with the rigor and regimen of the
certification examinations
Provides a business and technology orientation to risk
management
![Page 40: Performance Evaluation in Wireless Networks and ......1 ICTmc 1 Reda 2008 Performance Evaluation in Wireless Networks and Technologies from 2.5 G, 3G, LTE to 4G and Beyond ICIW 2008,](https://reader035.vdocuments.us/reader035/viewer/2022071008/5fc5957bce18b376a8637f1b/html5/thumbnails/40.jpg)
40
40 Reda 2008 ICTmc
The BIG Disadvantage