S1 5 VNCS

Download as pdf or txt
Download as pdf or txt
You are on page 1of 30

Hiệp hội An toàn thông tin Việt Nam

GIÁM SÁT VẬN HÀNH VÀ BẢO MẬT


CHO IOT & 4G

Nguyen Thanh Dat


Deputy CEO, Vietnam Cyberspace Security Technology (VNCS)
Internet of Thing
Internet of Thing
Internet of Thing
Benefits

Source : Vouchercloud
Security ?
Smart Home giving away the keys to your kingdom?
Medical Devices Are Vulnerable to Life-Threatening Hacks
Chrysler recalls 1.4 million cars at risk of being remotely
hijacked
Smart TV got infected with ransomware
4G LTE
Security risks

UE Access Core Service


 Physical attacks  Physical attacks  Unauthorised access  Unauthorised access
 Lack of security  Eavesdropping,  DoS and DDoS  Service abuse attacks,
standards & controls Redirection, MitM attacks Theft of service
on UEs attacks, DoS
 Risk of data loss,  Overbilling attacks  Network snoop,
privacy  Rogue eNodeBs (IP address hijacking, session hijacking
 Application layer: virus,  Privacy IP spoofing)
malware, phishing

Source: www.csiac.org
Liệu các công nghệ hiện tại có giải
quyết được những thách thức mới ?
Thách thức

Reporting &
Scalability
Visualization

Big data Information


storage Context

Breadth of
functions
Lợi ích trong việc ứng dụng Big Data

Different
Fast data
types of
insert
data

Fast &
Cost Parallel
Scalable
effective task
processing

Persistent
Large scale
Big data
analytics
storage
Nền tảng Big Data cho vận hành và bảo mật
Data: Any Location, Type, Volume Answer Any Question

Online
Services Web
On- Ad hoc Monitor Report Custom
Services Developer
Premises search and alert and dashboards Platform
Servers
Security GPS analyze
Location
Packaged
Applications
Networks

Private Storage
Desktops Big data Platform
Custom
Cloud Messaging Applications
RFID
Telecoms
Online Energy
Shopping Meters
Cart Databases Platform Support (Apps / API / SDKs)
Web Call Detail
Public Enterprise Scalability
Clickstreams Records
Cloud Smartphones
and Devices
Universal Indexing
For Telco

Big data Platform


Operational Intelligence
High-level view of services and composite health scores

18
Deep Dives

19
Security Posture

1
Risk-based
security
Risk-Based Analytics

1
Risk-based
security

21
Fast Incident Review and Investigation

1
Risk-based
security

22
Visual Investigations for All Assets and Users

23
DETECT MALICIOUS INSIDER THREATS

DETECT ADVANCED CYBERATTACKS


User Behavior Analytics - APT & Insider Threat

UBA

Big Data Platform


Demo
Demo
Demo
Leading Telcos Drive Results with Big Data Platform

Troubleshoot and monitor Apple iPhone network services across four load balanced data
centers.
Vodafone has reduced support escalations by 90% and time to resolve services issues by
67%.
Troubleshoot service delivery problems with video content delivered to mobile devices as part
3G offerings.
Meet PCI requirements by tracking and monitoring access to network resources /
cardholder data
Mitigated fraud by using combination Firewall IDP logs and cross referencing to subscriber IP
Addresses.

Proactively manage operations and respond before an outage occurs or service erodes

Increased margins by gaining insight into Call Detail Records (CDRs) and partner tariff
databases.
Thank you

Nguyen Thanh Dat


[email protected] / 0924298686
Viet Nam Cyberspace Security Technology

You might also like