slide1 l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Information Security Challenges in Telecom Michael T. Clark, Ph.D. CEO 13 October 2004 PowerPoint Presentation
Download Presentation
Information Security Challenges in Telecom Michael T. Clark, Ph.D. CEO 13 October 2004

Loading in 2 Seconds...

play fullscreen
1 / 13

Information Security Challenges in Telecom Michael T. Clark, Ph.D. CEO 13 October 2004 - PowerPoint PPT Presentation


  • 1037 Views
  • Uploaded on

Information Security Challenges in Telecom Michael T. Clark, Ph.D. CEO 13 October 2004 Safe Harbor

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Information Security Challenges in Telecom Michael T. Clark, Ph.D. CEO 13 October 2004' - Audrey


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1

Information Security Challenges in Telecom

Michael T. Clark, Ph.D.

CEO

13 October 2004

Safe Harbor

  • Neither the information nor any opinion expressed in this presentation constitutes an offer, or invitation to make an offer, or to buy any security issued by the company. This presentation contains predictions, estimates or other information regarding the Company's operations which are forward looking in nature. While these forward looking statements represent our best current judgment on what the future holds, they are subject to risks and uncertainties that could cause actual results to differ materially and may involve risk and uncertainty. This presentation is prepared for general purposes only and does not have any regard to the specific investment objectives, financial situation and particular needs of any specific person. No liability for any loss will arise with the company as a result of the action taken on the basis of information contained herein.
  • For a discussion of the risks and uncertainties that may cause results to differ, you should review GTL’s filings with stock exchanges, including the annual report and quarterly disclosures.

www.gtllimited.com

the telecom networking environment
The telecom networking environment
  • Explosion in the sector with advancements in cellular, wireless and satellite technologies.
  • Emerging markets race to bridge digital divide.
  • Proliferation of IT and telecom technologies; integrated networks replacing dual systems.
  • All critical infrastructure in a country – power, government, finance, healthcare and education – depends heavily on converged telecom and IT.
transformation of business process
Transformation of business process

Source: Businessworld, 4th Oct 2004

e enabled business environment

APPLICATION

CONTENT

COMMERCE

e-enabled business environment

The security framework and tools to organize, manage and deliver content, services and process

  • Support
  • Infrastructure
  • CRM
  • Financials
  • Logistics- SCM, B2B, Extranet
    • Operation/Program Head
  • DSS–SLA compliances
  • Information support
  • Resource management
  • B2C Portal
  • Visitors/Clients
  • View information
  • Access B2C services
  • Compliance
  • Network
  • Data storage
  • Log analysis
  • Physical security
  • Knowledge transfer
  • Application
  • security
  • Data security

Visitor

Billing

Value add services

Workflow

current india scenario
Current India scenario
  • 5th largest network in the world, second largest among emerging economies (after China).
  • Annual growth rate of 20% in basic telephone service and over 100% for cellular service.
  • Increase in teledensity from 7.8% (June 2004) to 15% by 2010.
  • Investment requirement at least US $70 billion by 2010 with the current CAGR.

Source: TRAI

key is challenges
SIM card vulnerability – even encrypted SIM cards susceptible to

duplication.

Jamming in cellular frequencies.

SMS vulnerability – corrupt messages transmitted to handset and

gateways crash software and corrupt SMS packets.

Traffic interruption and monitoring in WI-FI network leads to

unauthorized access of signals.

Hacks get access to credit card transactional information – a vulnerability in General Packet Radio Service (GPRS).

Abuse of database by third party service bureaus.

Key IS challenges 
key is challenges continued
Lack of secured Storage Area Networks leads to data loss and unauthorized disclosure of sensitive data.

System dependency on internet technologies results in illegal intrusions, disruption, disablement and corruption of critical infrastructure.

Open architecture challenges privacy, safety, integrity and processes.

Vulnerabilities in wireless networks…microwave systems; TDM/GSM/CDMA cellular; WLANS.

Key IS challenges - continued
is support layer
IS support layer

Management and third party

  • Audits
  • Compliances

Decision

support

  • Encryption
  • Messaging solutions
  • Authentication solutions
  • Content security
  • Transaction security
  • IS policy enforcements

Application support

Internal security

  • Secure VPN
  • Anti- virus solutions
  • Firewalls
  • IDS
  • Vulnerability assessment
  • IS planning

Network

support

External security

assigning responsibilities service partner
Securing open networks – primary responsibility.

Framework for success:

Manage security threats

ISMS implementation

Recognizes IS as a major part of Information framework

Evolve with changing environment

Vigilant about change

Assigning responsibilities: service partner
assigning responsibilities regulator
Foster effective legal, regulatory and enforcement framework to stimulate business.

World Bank’s four pillars of public policy for electronic security:

Legal and regulatory framework; electronic transactions; laws governing legal validity; security of payment systems; data privacy and its impact; money laundering

External monitoring of e-security practices

Managing digital identities

Precautions in network, applications and process compliances

Indian telecom laws and regulation.

Assigning responsibilities: regulator
assigning responsibilities industry
Strengthen best practice regimes:Indian security standard.

Public private partnership.

Engage international agencies and institutions on IS.

Develop Indian brand-identity at highest level of IS.

Assigning responsibilities: industry
is business drivers ahead
Telecom players will focus more on embedded security – integration becomes easier.

Transactional security will be the key offer in the full-fledged security solution market bundled with security point-products.

Telecom (bandwidth) service providers will implement full-fledged IS management system.

Security outsourcing would enable service providers to focus on their core-competencies.

Uniform regulations for converged environments; harmonized international IS regimes.

IS business drivers ahead…
slide13

THANK YOU

www.gtllimited.com