securing the telecommunications network · the dark web. rogue operators are granting access to the...

22
Securing the Telecommunications Network Defense Against the Dark Web

Upload: others

Post on 21-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

Securing the Telecommunications Network Defense Against the Dark Web

Page 2: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

Today, we rely—and even depend—on our devices to deliver data in an instant.

Page 3: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

Whether we’re commuting to work or socializing with friends, our mobiles are almost always by our side.

Page 4: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

The data we demand, however, needs to travel safely and securely across a worldwide telecommunications network.

Page 5: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

This network needs to know important information like where a subscriber is located and what services they’ve subscribed to.

Page 6: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

But the control network that manages all of these sessions is at risk—and is leaking sensitive subscriber information.

Page 7: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

This risk comes from a community of hackers who lurk in one location…

Page 8: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

The dark web.

Page 9: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

Rogue operators are granting access to the control network to these attackers.

Page 10: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

The once trusted model of telephone company interconnection has been broken.

Page 11: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

Many small operators are granting access to bad actors as they look to take advantage of the revenue stream.

Page 12: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

Instead of focusing on the exploits that hackers have published today, operators need to consider the bigger issue of unauthorized access.

********

Username

Password

***********

Page 13: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

Blocking current exploits does not restrict access to the control network.

Page 14: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

So what do you need to do?

Page 15: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

Ignore the problem and hope it goes away?

?

Page 16: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

Or purchase inexperienced, limited external firewalls that are focused on a small portion of the problem?

Page 17: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

The answer:Neither.

Page 18: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

You need to implement the most basic of security practices that restrict access to the control network.

Page 19: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

Short-term solutions simply won’t cut it.

Page 20: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

Gateway firewall functionality at the network edge is a must.

Page 21: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

And a multilayered security program will shield your sensitive and personal information from bad actors, while preparing you for the future.

Page 22: Securing the Telecommunications Network · The dark web. Rogue operators are granting access to the control network to these attackers. The once trusted model of telephone company

So start to secure your network from the dark web.Click here for more information.

Copyright © 2017, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. VDL25713 170111