radware物联网和5G时代移动网络安全需求的演进英文版20181236页

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

SHARETHISBROCHUREEvolvingMobileNetworkSecurityNeedsintheAgeofIoTand5G00Introduction01HowDidWeGetHere?02ANewAtmosphereofMobileNetworkAttacks035G:NewCapabilities,NewSecurityConcerns04TheRiseofIoTand5GDevices05TheRoleofSecurityAutomationandArtificialIntelligence065GSecurityUseSolutions07SummaryContentsCreatingaSecureClimateforYourCustomersPeoplesimplyhatetobedisconnected.Theywant24x7accesstohigh-speedinterneteverywherefromanydevice.Allthattweeting,textingandtelecommutingtranslatesintodramaticgrowthinmobiletraffic.Globalmobiledatausageispredictedtogrowatacompoundannualgrowthrate(CAGR)of47%,reaching49.0exabytespermonthby2021.Everhavethatpanickyfeelingwhenyou’renotsurewhereyouleftyourmobiledevice?It’sasignofthetimesthatthesensationhasaname:nomophobia.Thenfactorintheinternetofthings(IoT),whichincludesbillionsofmachinesaroundtheworldconnectedtotheinternet.Everysmartrefrigera-tor,thermometerandprinter,tonameafew,requireanalways-onnetworkconnectionforremotemonitoringanddatasharing.Whilemostserviceprovidersarejustnowgettingahandleon4Gnetworks,5GnetworktrialsaresettodebutinmajormetropolitanareasintheUnitedStatesbytheendof2018.TheGSMApredictsAsia(ChinaandJapan),EuropeandtheU.S.willbeleadingthe5Gmarketby2025.2020isthebeginningofamassrolloutof5Gnetworks.Serviceprovidershaveashortrunwaytofigureoutsecurityissues.00INTRODUCTIONEVOLVINGMOBILENETWORKSECURITYNEEDSINTHEAGEOFIOTAND5G|3Thesedevelopmentscombinetocreateacomplexmobileecosystemwithmultipleentrypointsforattacks.Everydeviceconnectedtoyournetworkisapotentialsecurityweakness.Hackerscantargetyourcustomerstostealdataorusetheirdevicestogenerateattacksonyournetworkorothercompanies’networksandapplicationswithouttheusers’knowledge.IoTdevicesareespeciallyvulnerablebecausemanufacturersaremoreconcernedwithkeepingpriceslowthanaddingsecurityfeatures.Thatmeanstherearepotentiallymillionsofunprotectedendpointsonyourmobilenetwork.THECHALLENGEISANOPPORTUNITY.Mobileserviceproviderscanestablishacompetitiveadvantagebycreatingasecureenvironmentthatprotectscustomers’dataanddevices,buildingsuperiortrustwiththeirusersincomparisontootherserviceproviders.ACASINOFOUNDOUTthehardwaythattheinternetofthingsisajackpotforattackers.Bytappingintothesmartthermometerthatcontrolsthetemperatureofthewaterinthelobbyaquarium,hackerswentonafishingexpeditioninthecasino’snetworkandlandeditsdatabaseofhigh-endclients.SOMETHING’SFISHYHERE00INTRODUCTIONEVOLVINGMOBILENETWORKSECURITYNEEDSINTHEAGEOFIOTAND5G|401HowDidWeGetHere?TheEvolvingNetworkSecurityEnvironment01HOWDIDWEGETHERE?ThesmartphoneswetakeforgrantedhavemorecomputingpowerthanthecomputersthatguidedtheApollo11moonlanding.Inthealmostquartercenturysincemobiledevicestransitionedfromaluxurytoamust-have,theseverityofnetworksecurityissueshaskeptpace.Networktechnologiestendtolast10to15yearsbeforealluserscanbetransitionedtothenewnetwork.Thatmeansmanaging—andprotecting—morenetworkelementsthatarerequiredasoverlaysandgatewaystoconnectmultiplegenerationsofwirelessdevices.Eachgenerationofnetworktechnologyintroducesanewsetofsecuritychallenges.MobileStandardPrimaryFocusTypicalDLSpeed(Mbps)TypicalLatency(milliseconds)SecurityFocusSecurityProvisions2GVoice0.1629StealingvoicecallsOTAencryptionSIMcards3GVoice/data8212StealingdatapayloadRoguenetworksPacketencryptionMutualauthentication4GData1596StealingdatapayloadEnhancedkeymanagement5GData~100~1MobileinstantiatedattacksMobilesecurityservicesCloudperimeterprotectionSecurenetworkslicesEVOLVINGSECURITYCHALLENGESAsmobilenetworktechnologiesprogress,newandmorecomplexsecurityissuesareintroduced.Serviceprovidersmustadapttoprotecttheirnetworksandcreateasecureonlineenvironmentforcustomers.5Gconnectionspeedsandlatencyareonparwithwirelinenetworks.Thebadactorsthatthreatenwirelinenetworkswilllaunchsimilarlarge-scale,complexattacks,whichhavebeensuccessfulinwireline,onthe5Gnetworksofunpreparedserviceproviders.EVOLVINGMOBILENETWORKSECURITYNEEDSINTHEAGEOFIOTAND5G|601HOWDIDWEGETHERE?THEINCREASINGINTENSITYOFTHREATSTheseverityandfrequencyofnetworkattackscontinuestoevolveatanalarmingrate.Source:InfoSecInstituteandRadwareîMaliciouscodesîTrojanîAdvancedwormsîCybercrimeandvirusesinitiated—MorriswormandothersîIdentitytheftîPhishingîDNSattacksîRiseofbotnetsîSQLattacksîAnto-spamsitesîCompetitivesabotageescalationîSocialengineeringîDoSîBotnetsîMaliciousemailsîRansomwareattacksîPoScomprisedîBankingmalwareîKeyloggerîBitcoinwalletstealerîIdentitytheftîPhonehijackingîRansomwareattacksîPoSattacksîCyberwarfareîAndroidhacksîCryptojackingîCryptominingPRESENT20132010200720041997EVOLVINGMOBILENETWORKSECURITYNEEDSINTHEAGEOFIOTAND5G|701HOWDIDWEGETHERE?2GWiththeintroductionof2Ginthe1990s,serviceproviders’onlyconcernisprotectingvoicecalls.Securitymeasuresfocusonauthenticatingandencryptingcallsontheradioaccesslink.Callsarenotsecuredonthefixednetworkportionofthetransmission.3GFasterspeedsandaccesstothemobileinternetarethehallmarksof3Gnetworktech-nologies.Thenextgenerationofmobilenetworksoffersmuchbettersecuritythan2Ginthewayitencryptsvoiceanddatatraffic.Themainconcernisnotatta

1 / 36
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功