James Travis, PhD, CISM, CEH Consilier al Ministerului Apărării (Cyber) Biroul de Aparare de Cooperare, Statele Unite ale Americii
5G Security James Travis, PhD, CISM, CEH Consilier al Ministerului - - PowerPoint PPT Presentation
5G Security James Travis, PhD, CISM, CEH Consilier al Ministerului - - PowerPoint PPT Presentation
5G Security James Travis, PhD, CISM, CEH Consilier al Ministerului Aprrii (Cyber) Biroul de Aparare de Cooperare, Statele Unite ale Americii Romanias History of Military IT Romania long history of excellence in innovating, designing,
Romania’s History of Military IT
Romania long history of excellence in innovating, designing, manufacturing and employing modern information and communications technology 5G offers the opportunity for next generation capability innovation with Romania as a key industrial participant Long range success dependent on getting a secure 5G solution for Romania
Muzeul Comunicațiilor și Informaticii (Otopeni)
2
5G Opportunities
5G Networking Distributed (Fog) Cloud Distributed Applications Internet of Things
5G brings new
- pportunities for
Romania AND ... Brings new cyber security
- pportunities
3
5G Risks
Supply Chain
Can you trust your supply chain – for a generation
Deployment
The number of components in such a system increase the likelihood of configuration errors that introduce vulnerabilities
System Security
Minimizing vulnerabilities is such a diverse infrastructure will require continual expert attention to vulnerability scanning, autonomous anomalous behavior detection and response, and a management system that always makes decisions on what is best for Romania, not profits
Personal, Corporate, and Government Privacy
The provider of your 5G services controls the processes the systems that process, store, and distribute data that through analytics and machine learning, can potentially know more about that person or entity than anyone
Loss of Competition and Choice
Standards based 5G increases choice, non-standards based locks Romania in
Management plane
The vendor decides what you see, vender selection must be from the partner you trust
4
5G brings a management and orchestration system that has multiple opportunities for security risks and challenges
5
5G Security Domains
Compoun d domains
Management domain Management domain(s) IP Domain IP domain
TA
Management domain(s) Other UE domains Management domain
Core network domain Access network domain User equipment domain
Transport domain 3P domain USIM domain ME domain Serving domain Home domain Access domain RAT 2 IM domain IPSdomain
SD SD SD SD SD SD
IP domain
Tenant domain s infrastructure domains
MEHW domain IP domain
TA
IP domain
TA TA
UICC domain
TA TA
IP domain IP Do main
External network domain Operator networkdomain Network domain
SD
IP domain
TA SD SD
TA Slice Domain(s) TrustAnchor(s) Optional
Access domain RAT 1
SD TA SD
IMT-2020/5G workshop and demo day – 11th July 2017, Geneva
Maintaining consistent security across all these domains requires system
- perators, system risk
managers, and national cyber security capabilities to keep track al these domains to ensure that Romanian security and privacy is not adversely affected by the complexity of the security domain
6
5G Cyber Security Mitigation Strategies
International Security Cooperation
- Prague Proposal
Risk Based Security Acquisition Build Security Parameters into Acquisition Decision Key Consideration: Your 5G Supplier Should be From Sources You Trust
Cyber Secure = Best. Award!
7
Thank You
Questions/Open discussions
8