Cybersecurity: The Impact Of Broadband Technology Federal Communications Commission Public Safety Workshop www.broadband.gov August 25, 2009 Marcus H. Sachs, P.E. Verizon
Feb 08, 2016
Cybersecurity: The Impact Of Broadband Technology
Federal Communications CommissionPublic Safety Workshop
www.broadband.gov
August 25, 2009Marcus H. Sachs, P.E.Verizon
Overview of Online Security RisksOverview of Online Security Risks
•Internet Fraud–Website spoofing–Link and DNS manipulation–Spam
•Infections and Malware–Viruses–Worms
•Malicious Payloads–Spyware–Bots–Keystroke Loggers–Dialers
•Concealed Intrusions–Trojan horses–Root kits–Backdoors
•Malware Objectives–Forced advertising–Distributing spam–Launching Distributed Denial-
of-Service attacks–Stealing personal data like
social security numbers
2
Emerging ThreatsEmerging Threats
•Leveraging social networks and viral applications to quickly establish botnets
•Targeting smart phones and other open devices that communicate over high-speed wireless networks
•Hijacking VOIP systems for identity fraud, toll fraud, or theft of sensitive information
•Cyber warfare targeted at the U.S. economy and infrastructure
3
Emergency ServicesCritical Infrastructure
FBI
Law Enforcement
Airport/Seaport
Homeland Security
Federal
Agencies
Corrections Court
Power/Water Treatment Plants
Private Radio Network
Wireless LAN
Network
Wire LineNetworks
2.5G, 3G, and 4G Wireless
Networks
Convergence
Protecting Networks and CustomersProtecting Networks and Customers
Public Internet
Managed IP Network
Retail
HospitalSchool
Bank
Community Networks
Keeping The Network Safe – Keeping The Network Safe – Industry ResponsibilitiesIndustry Responsibilities
5
• Identify and mitigate spam, viruses and other malware
• Analyze and help mitigate security breaches
• Conduct security audits for enterprise and government customers
• Provide testing and certification for security products and network connected devices
• Offer parental controls and security products
Smart Networks Could Improve Online Security and Smart Networks Could Improve Online Security and OpennessOpenness
6
•Identifying and intelligently mitigating malicious activity
•Prioritizing communications in support of first responders and public safety officials
•Increasing the open and competitive nature of global data networks by removing or mitigating threats and weaknesses
•Enabling new and innovative applications for the smart grid and Health IT
Next StepsNext Steps
7