5G Security James Travis, PhD, CISM, CEH Consilier al Ministerului - - PowerPoint PPT Presentation

5g security
SMART_READER_LITE
LIVE PREVIEW

5G Security James Travis, PhD, CISM, CEH Consilier al Ministerului - - PowerPoint PPT Presentation

5G Security James Travis, PhD, CISM, CEH Consilier al Ministerului Aprrii (Cyber) Biroul de Aparare de Cooperare, Statele Unite ale Americii Romanias History of Military IT Romania long history of excellence in innovating, designing,


slide-1
SLIDE 1

James Travis, PhD, CISM, CEH Consilier al Ministerului Apărării (Cyber) Biroul de Aparare de Cooperare, Statele Unite ale Americii

5G Security

slide-2
SLIDE 2

Romania’s History of Military IT

Romania long history of excellence in innovating, designing, manufacturing and employing modern information and communications technology 5G offers the opportunity for next generation capability innovation with Romania as a key industrial participant Long range success dependent on getting a secure 5G solution for Romania

Muzeul Comunicațiilor și Informaticii (Otopeni)

2

slide-3
SLIDE 3

5G Opportunities

5G Networking Distributed (Fog) Cloud Distributed Applications Internet of Things

5G brings new

  • pportunities for

Romania AND ... Brings new cyber security

  • pportunities

3

slide-4
SLIDE 4

5G Risks

Supply Chain

Can you trust your supply chain – for a generation

Deployment

The number of components in such a system increase the likelihood of configuration errors that introduce vulnerabilities

System Security

Minimizing vulnerabilities is such a diverse infrastructure will require continual expert attention to vulnerability scanning, autonomous anomalous behavior detection and response, and a management system that always makes decisions on what is best for Romania, not profits

Personal, Corporate, and Government Privacy

The provider of your 5G services controls the processes the systems that process, store, and distribute data that through analytics and machine learning, can potentially know more about that person or entity than anyone

Loss of Competition and Choice

Standards based 5G increases choice, non-standards based locks Romania in

Management plane

The vendor decides what you see, vender selection must be from the partner you trust

4

slide-5
SLIDE 5

5G brings a management and orchestration system that has multiple opportunities for security risks and challenges

5

slide-6
SLIDE 6

5G Security Domains

Compoun d domains

Management domain Management domain(s) IP Domain IP domain

TA

Management domain(s) Other UE domains Management domain

Core network domain Access network domain User equipment domain

Transport domain 3P domain USIM domain ME domain Serving domain Home domain Access domain RAT 2 IM domain IPSdomain

SD SD SD SD SD SD

IP domain

Tenant domain s infrastructure domains

MEHW domain IP domain

TA

IP domain

TA TA

UICC domain

TA TA

IP domain IP Do main

External network domain Operator networkdomain Network domain

SD

IP domain

TA SD SD

TA Slice Domain(s) TrustAnchor(s) Optional

Access domain RAT 1

SD TA SD

IMT-2020/5G workshop and demo day – 11th July 2017, Geneva

Maintaining consistent security across all these domains requires system

  • perators, system risk

managers, and national cyber security capabilities to keep track al these domains to ensure that Romanian security and privacy is not adversely affected by the complexity of the security domain

6

slide-7
SLIDE 7

5G Cyber Security Mitigation Strategies

International Security Cooperation

  • Prague Proposal

Risk Based Security Acquisition Build Security Parameters into Acquisition Decision Key Consideration: Your 5G Supplier Should be From Sources You Trust

Cyber Secure = Best. Award!

7

slide-8
SLIDE 8

Thank You

Questions/Open discussions

8