SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
IP Telephony Security Issues NIPT/Ithaca - November 1999 Tom Parker (NVO/Ithaca)
NOTE: Help stamp out busted PowerPoint presentations. This presentation requires the Nokia font:  Rotis Sans Serif for Nokia . Please run  NokiaFonts_v3.EXE . It’s on the Nokia VPN and only takes a few seconds!
NIPT: Our Market ,[object Object],[object Object],[object Object],[object Object],[object Object]
Simplified  PSTN Network Diagram The Ideal   Tom Parker
Simplified   PSTN  Network Diagram The Ideal   Tom Parker The Ideal  (  )
Simplified   PSTN  Network Diagram The REAL   Tom Parker Infrastructure dedicated  to delivering voice 100 years of experience catching crooks Common Channel Signaling Hardwired  connections
Simplified   VoIP  Network Diagram Tom Parker Packet based Multiple, emerging  (and submerging) protocols All sorts  of traffic HACKER INFESTED
The security requirements cloud Firewalls/NAT Standards compliance Encrypted signaling Regulatory compliance Protected databases Intrusion detection Non-repudiation Management framework Transparency Multi-tenanting Toll fraud AAA Tom Parker
Firewalls and NAT ,[object Object],[object Object],[object Object],[object Object],[object Object]
The trouble with H.323 ,[object Object],[object Object],[object Object],[object Object]
Firewall solutions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Standards Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Checkbox Checkers”
Working within the standards bodies ,[object Object],[object Object],[object Object],[object Object],[object Object]
Toll Fraud ,[object Object],[object Object],[object Object],[object Object],[object Object]
Non-repudiation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],GEMPLUS Public Key Card
Signaling privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transparency ,[object Object],[object Object],[object Object],[object Object],Interesting PSTN Security Metaphor: In the early days of telephony, a number of large cattle ranches in the western United States were reputed to have used their many miles of barbed-wire fencing (three strands per post) to deliver telephone signals from ranch to ranch. S  I  D  E  B  A  R
Regulatory compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Multi-tenanting Service Provider Call Processing Server Gateway BES IP PSTN Customer 1 Customer 2 Customer 3 Customer 4 Customer 5 50-500 clients . . . .
Intrusion detection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The infamous Trojan horse
Protected databases-backend services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Integrated management framework ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Issues at-a-glance Security is a complex topic with many open issues. Customers will partner with  vendors who can offer them both comprehensive solutions and peace-of-mind.
Lots of Issues = Lots of Opportunities   Secure   High performance   Robust   Easy to use   Easy to maintain   Interoperable   Cost effective   Tom Parker

Mais conteúdo relacionado

Mais procurados

Module 2 (footprinting)
Module 2 (footprinting)Module 2 (footprinting)
Module 2 (footprinting)Wail Hassan
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)Wail Hassan
 
Case study about voip
Case study about voipCase study about voip
Case study about voipelmudthir
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networksPositiveTechnologies
 
Module 4 (enumeration)
Module 4 (enumeration)Module 4 (enumeration)
Module 4 (enumeration)Wail Hassan
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin RodillasTI Safe
 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)JIEMS Akkalkuwa
 
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...IJECEIAES
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsAhmad Sharifi
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprisesshrutisreddy
 
Ravi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesRavi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesskumartarget
 
Threats In Vo Ip
Threats In Vo IpThreats In Vo Ip
Threats In Vo Ipguest209a2c
 
Module 18 (linux hacking)
Module 18 (linux hacking)Module 18 (linux hacking)
Module 18 (linux hacking)Wail Hassan
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
Module 20 (buffer overflows)
Module 20 (buffer overflows)Module 20 (buffer overflows)
Module 20 (buffer overflows)Wail Hassan
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Wail Hassan
 

Mais procurados (18)

Module 2 (footprinting)
Module 2 (footprinting)Module 2 (footprinting)
Module 2 (footprinting)
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
 
Case study about voip
Case study about voipCase study about voip
Case study about voip
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networks
 
Module 4 (enumeration)
Module 4 (enumeration)Module 4 (enumeration)
Module 4 (enumeration)
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)
 
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
12 wireless ips-ss_12-17-10_a
12 wireless ips-ss_12-17-10_a12 wireless ips-ss_12-17-10_a
12 wireless ips-ss_12-17-10_a
 
Ravi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesRavi i ot-enablingtechnologies
Ravi i ot-enablingtechnologies
 
Threats In Vo Ip
Threats In Vo IpThreats In Vo Ip
Threats In Vo Ip
 
Module 18 (linux hacking)
Module 18 (linux hacking)Module 18 (linux hacking)
Module 18 (linux hacking)
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Module 20 (buffer overflows)
Module 20 (buffer overflows)Module 20 (buffer overflows)
Module 20 (buffer overflows)
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
 

Destaque

Wearable computing
Wearable computing Wearable computing
Wearable computing kdore
 
Wearable Computing - Part I: What is Wearable Computing?
Wearable Computing - Part I: What is Wearable Computing?Wearable Computing - Part I: What is Wearable Computing?
Wearable Computing - Part I: What is Wearable Computing?Daniel Roggen
 
Conditional Access Systems
Conditional Access SystemsConditional Access Systems
Conditional Access SystemsNamith CM
 
What if Wearable Tech was like Press-on Nails?
What if Wearable Tech was like Press-on Nails?What if Wearable Tech was like Press-on Nails?
What if Wearable Tech was like Press-on Nails?ctorgan
 
Eliminate Ridges in Fingernails Now!
Eliminate Ridges in Fingernails Now!Eliminate Ridges in Fingernails Now!
Eliminate Ridges in Fingernails Now!RNAdvisor
 
holographic memory
holographic memoryholographic memory
holographic memorybhavithd
 
COMP 4026 Lecture 6 Wearable Computing
COMP 4026 Lecture 6 Wearable ComputingCOMP 4026 Lecture 6 Wearable Computing
COMP 4026 Lecture 6 Wearable ComputingMark Billinghurst
 
Wearable Computing - Part II: Sensors
Wearable Computing - Part II: SensorsWearable Computing - Part II: Sensors
Wearable Computing - Part II: SensorsDaniel Roggen
 
Zigbee technology [autosaved]
Zigbee technology [autosaved]Zigbee technology [autosaved]
Zigbee technology [autosaved]vandjadhav
 
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
Wearable Computing:  A 2014 HorizonWatching Trend Summary ReportWearable Computing:  A 2014 HorizonWatching Trend Summary Report
Wearable Computing: A 2014 HorizonWatching Trend Summary ReportBill Chamberlin
 
Fingernails And What They Reveal 1
Fingernails And What They Reveal 1Fingernails And What They Reveal 1
Fingernails And What They Reveal 1Prabhat Tandon
 
Deepak's green computing
Deepak's green computingDeepak's green computing
Deepak's green computingDeepak Sharma
 
Wearable Computing and Human Computer Interfaces
Wearable Computing and Human Computer InterfacesWearable Computing and Human Computer Interfaces
Wearable Computing and Human Computer InterfacesJeffrey Funk
 

Destaque (20)

Wearable computing
Wearable computing Wearable computing
Wearable computing
 
Wearable Computing - Part I: What is Wearable Computing?
Wearable Computing - Part I: What is Wearable Computing?Wearable Computing - Part I: What is Wearable Computing?
Wearable Computing - Part I: What is Wearable Computing?
 
Conditional Access Systems
Conditional Access SystemsConditional Access Systems
Conditional Access Systems
 
What if Wearable Tech was like Press-on Nails?
What if Wearable Tech was like Press-on Nails?What if Wearable Tech was like Press-on Nails?
What if Wearable Tech was like Press-on Nails?
 
Eliminate Ridges in Fingernails Now!
Eliminate Ridges in Fingernails Now!Eliminate Ridges in Fingernails Now!
Eliminate Ridges in Fingernails Now!
 
Zigbee technology
Zigbee technology Zigbee technology
Zigbee technology
 
Zigbee ppt
Zigbee pptZigbee ppt
Zigbee ppt
 
holographic memory
holographic memoryholographic memory
holographic memory
 
COMP 4026 Lecture 6 Wearable Computing
COMP 4026 Lecture 6 Wearable ComputingCOMP 4026 Lecture 6 Wearable Computing
COMP 4026 Lecture 6 Wearable Computing
 
Wearable computing
Wearable computingWearable computing
Wearable computing
 
Holographic Memory
Holographic MemoryHolographic Memory
Holographic Memory
 
Green Computing
Green ComputingGreen Computing
Green Computing
 
Wearable Computing - Part II: Sensors
Wearable Computing - Part II: SensorsWearable Computing - Part II: Sensors
Wearable Computing - Part II: Sensors
 
Holographic memory
Holographic memoryHolographic memory
Holographic memory
 
Zigbee technology [autosaved]
Zigbee technology [autosaved]Zigbee technology [autosaved]
Zigbee technology [autosaved]
 
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
Wearable Computing:  A 2014 HorizonWatching Trend Summary ReportWearable Computing:  A 2014 HorizonWatching Trend Summary Report
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
 
Fingernails And What They Reveal 1
Fingernails And What They Reveal 1Fingernails And What They Reveal 1
Fingernails And What They Reveal 1
 
Ip telephony
Ip telephonyIp telephony
Ip telephony
 
Deepak's green computing
Deepak's green computingDeepak's green computing
Deepak's green computing
 
Wearable Computing and Human Computer Interfaces
Wearable Computing and Human Computer InterfacesWearable Computing and Human Computer Interfaces
Wearable Computing and Human Computer Interfaces
 

Semelhante a Securty Issues from 1999

Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056mashiur
 
Network Discovery Protocol ( Ndp )
Network Discovery Protocol ( Ndp )Network Discovery Protocol ( Ndp )
Network Discovery Protocol ( Ndp )Sara Reed
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxronak56
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxdaniahendric
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to knowEric Klein
 
Threats Of Bgp Protocol, Security And Experiment By Using...
Threats Of Bgp Protocol, Security And Experiment By Using...Threats Of Bgp Protocol, Security And Experiment By Using...
Threats Of Bgp Protocol, Security And Experiment By Using...Dawn Jones
 
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesE Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesDan York
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Jiunn-Jer Sun
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchIJMER
 
Internet protocol telephony
Internet protocol telephonyInternet protocol telephony
Internet protocol telephonySajan Sahu
 
Wireless Technology Is Not Just For The Home And Office
Wireless Technology Is Not Just For The Home And OfficeWireless Technology Is Not Just For The Home And Office
Wireless Technology Is Not Just For The Home And OfficeLynn Holkesvik
 
Generic Voice Security Issues
Generic Voice Security IssuesGeneric Voice Security Issues
Generic Voice Security Issuesjasondewar
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications TechnologiesSarah Jimenez
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deckRichard Blech
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyChristopher Duffy
 

Semelhante a Securty Issues from 1999 (20)

Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
Network Discovery Protocol ( Ndp )
Network Discovery Protocol ( Ndp )Network Discovery Protocol ( Ndp )
Network Discovery Protocol ( Ndp )
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
Threats Of Bgp Protocol, Security And Experiment By Using...
Threats Of Bgp Protocol, Security And Experiment By Using...Threats Of Bgp Protocol, Security And Experiment By Using...
Threats Of Bgp Protocol, Security And Experiment By Using...
 
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesE Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A Research
 
Internet protocol telephony
Internet protocol telephonyInternet protocol telephony
Internet protocol telephony
 
Wireless Technology Is Not Just For The Home And Office
Wireless Technology Is Not Just For The Home And OfficeWireless Technology Is Not Just For The Home And Office
Wireless Technology Is Not Just For The Home And Office
 
Core Values Decision Sept
Core Values Decision SeptCore Values Decision Sept
Core Values Decision Sept
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Generic Voice Security Issues
Generic Voice Security IssuesGeneric Voice Security Issues
Generic Voice Security Issues
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
 

Último

Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.francesco barbera
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 

Último (20)

Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 

Securty Issues from 1999

  • 1. IP Telephony Security Issues NIPT/Ithaca - November 1999 Tom Parker (NVO/Ithaca)
  • 2. NOTE: Help stamp out busted PowerPoint presentations. This presentation requires the Nokia font: Rotis Sans Serif for Nokia . Please run NokiaFonts_v3.EXE . It’s on the Nokia VPN and only takes a few seconds!
  • 3.
  • 4. Simplified PSTN Network Diagram The Ideal Tom Parker
  • 5. Simplified PSTN Network Diagram The Ideal Tom Parker The Ideal ( )
  • 6. Simplified PSTN Network Diagram The REAL Tom Parker Infrastructure dedicated to delivering voice 100 years of experience catching crooks Common Channel Signaling Hardwired connections
  • 7. Simplified VoIP Network Diagram Tom Parker Packet based Multiple, emerging (and submerging) protocols All sorts of traffic HACKER INFESTED
  • 8. The security requirements cloud Firewalls/NAT Standards compliance Encrypted signaling Regulatory compliance Protected databases Intrusion detection Non-repudiation Management framework Transparency Multi-tenanting Toll fraud AAA Tom Parker
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Issues at-a-glance Security is a complex topic with many open issues. Customers will partner with vendors who can offer them both comprehensive solutions and peace-of-mind.
  • 24. Lots of Issues = Lots of Opportunities Secure High performance Robust Easy to use Easy to maintain Interoperable Cost effective Tom Parker