24
Wireless Systems’ Security EGYPT National Telecom Regulatory Authority 1

EGYPT - EG-CERT

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Wireless Systems’ Security

EGYPTNational Telecom Regulatory Authority

1

Vision

2

Wireless Systems

3

WWAN (3G,4G, 5G?)

Low throughput, short range

WLAN (Wi-Fi)

WPAN

WMAN (Wi-Max)

BluetoothRFID

High throughput, short range

Low throughput, Long range

3

New Generation - 5G wireless Networks

In Sharm el-Sheikh, Egypt , the World Radiocommunication

Conference (WRC-19) - 28 Oct. to 22 Nov 2019. launched the

5G to work alongside existing 3G and 4G technology.

This satisfy the requirements of Internet of Things (IoT)

Massive connectivity

Coverage

Ultra-low latency

Throughput

Ultra-reliability, etc.

National Telecom Regulatory Authority - EGYPT4

4

IoT

National Telecom Regulatory Authority - EGYPT

5

National Telecom Regulatory Authority - EGYPT

6

National Telecom Regulatory Authority - EGYPT

7

Wireless Threats – Wi-Fi

8

Encryption type used in public Wi-Fi

hotspots across the world

9

https://securelist.com/research-on-unsecured-wi-fi-networks-across-the-world/76733/

Wi-Fi Attack Statistics

10

Source: https://www.passcape.com/windows_password_recovery_attack_reports

When you find free public Wi-Fi

National Telecom Regulatory Authority - EGYPT

11

Public Wi-Fi – a threat to enterprise!

Source: https://www.networkcomputing.com/wireless-infrastructure/public-wifi-risks-worry-it-pros

Employee Use of Public WiFi Networks 12

Wireless Threats – RFID

13

RFID

Source: https://www.techsciresearch.com/report/radio-frequency-identification-rfid-

market/3660.html

14

15

Sources of Threats in IoT

02-12-2019 National Telecom Regulatory Authority - EGYPT

16

IoT Architecture Layers

National Telecom Regulatory Authority - EGYPT17

Application Layer

Middleware Layer

Network Layer

Sensing Layer

17

Sources of Threats in IoT

National Telecom Regulatory Authority - EGYPT18

18

•Node Capturing

•Malicious Code Injection Attack

•Sleep Deprivation Attacks

•Eavesdropping

•False Data Injection Attack

•Booting Attacks

Phishing Site Attack

Access Attack

DDoS Attack

Routing Attack

•Man-in-the-Middle Attack

•SQL Injection Attack

•Cloud Malware Injection

•Flooding Attack in the cloud

• Data Thefts

• Sniffing Attacks

• Reprogram Attacks

Application Layer

Sensing Layer Network Layer

Middleware Layer

Wi-Fi & IoT Attacks Cost

19

Erdal Ozkaya and Milad Aslaner, Hands-on Cybersecurity for Finance,

Packt Publishing, Jan 2019.

Wireless Threats – Satellite

20

Satellite Communication

National Telecom Regulatory Authority - EGYPT

21Source: https://www.everythingrf.com/news/details/8553-SATCOM-Equipment-Market-for-Space-to-be-

Worth-7-0-Billion-by-2025

Satellite Attack - Jamming

22

GPS Hacking

23

THANK YOU

24