5g security

5G Security James Travis, PhD, CISM, CEH Consilier al Ministerului - PowerPoint PPT Presentation

5G Security James Travis, PhD, CISM, CEH Consilier al Ministerului Aprrii (Cyber) Biroul de Aparare de Cooperare, Statele Unite ale Americii Romanias History of Military IT Romania long history of excellence in innovating, designing,


  1. 5G Security James Travis, PhD, CISM, CEH Consilier al Ministerului Apărării (Cyber) Biroul de Aparare de Cooperare, Statele Unite ale Americii

  2. Romania’s History of Military IT Romania long history of excellence in innovating, designing, manufacturing and employing modern information and communications technology 5G offers the opportunity for next generation capability innovation with Romania as a key industrial participant Long range success dependent on getting a secure 5G solution for Romania Muzeul Comunicațiilor și Informaticii (Otopeni) 2

  3. 5G Opportunities 5G 5G brings new Networking opportunities for Romania Internet of Distributed Things (Fog) Cloud AND ... Brings new cyber Distributed security Applications opportunities 3

  4. 5G Risks Supply Chain Can you trust your supply chain – for a generation Deployment The number of components in such a system increase the likelihood of configuration errors that introduce vulnerabilities System Security Minimizing vulnerabilities is such a diverse infrastructure will require continual expert attention to vulnerability scanning, autonomous anomalous behavior detection and response, and a management system that always makes decisions on what is best for Romania, not profits Personal, Corporate, The provider of your 5G services controls the processes the systems that process, store, and distribute and Government data that through analytics and machine learning, can potentially know more about that person or entity than anyone Privacy Loss of Competition Standards based 5G increases choice, non-standards based locks Romania in and Choice Management plane The vendor decides what you see, vender selection must be from the partner you trust 4

  5. 5G brings a management and orchestration system that has multiple opportunities for security risks and challenges 5

  6. 5G Security Domains SD Maintaining consistent Slice Domain(s) SD security across all Management domain(s) Management TrustAnchor(s) domain TA these domains 3P domain Home domain Optional requires system SD operators, system risk domain Tenant Management domain(s) managers, and Management s Other UE ME domain Access domain Serving domain USIM domain domain domains RAT 1 national cyber security Transport IPSdomain SD SD SD SD domain capabilities to keep SD SD IM domain Access domain RAT 2 track al these domains SD SD to ensure that infrastructure IP domain IP domain IP Domain IP domain UICC domain MEHW domain domains IP domain IP domain IP domain Romanian security and TA IP Do main TA TA TA TA TA TA TA privacy is not adversely affected by Access network Core network Compoun External network domains User equipment domain the complexity of the domain domain domain d Operator networkdomain IMT-2020/5G workshop and demo day security domain – 11 th July 2017, Geneva Network domain 6

  7. 5G Cyber Security Mitigation Strategies International Security Cooperation • Prague Proposal Risk Based Security Acquisition Cyber Build Security Parameters into Acquisition Secure = Best. Decision Award! Key Consideration: Your 5G Supplier Should be From Sources You Trust 7

  8. Thank You Questions/Open discussions 8

Recommend


More recommend