SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Training and Consulting in Information and Communications Technologies
Sean McCarthy
L&M Data Communications
Insecurity & Complexity
2
Communications networks' current situation
• Currently all the networks, services and applications are based on
Internet technologies: TCP/IP Communication Protocols
• Any current device (PCs, Tablets, Telephones, Game Stations, TV,
control equipment, etc.) includes these TCP/IP protocols
• TCP/IP DNA:
– Designed in the 70s for the interconnection of heterogeneous global
networks
– Introduced in the early 80s on the Local Area Networks
– The target was to interconnect heterogeneous networks and equipment,
without taking into account security or efficiency
• Internet was not designed with security in mind
3
Where is the Problem?
TCP/IP Communications Architecture
• The user can fiddle with the communications
4
TCP
IP
ETH A
PHY A PHY C
ETH C
App App App App
App
IP
IP net
Internet Aplication Service is provided
by TCP and controlled by the user
TCP
App
Service
Demarcation
Service
Demarcation
Network
Edge
Network
Edge
POTS (Plain Old Telephone Service) versus Internet TCP/IP
• All the communications are handled and controlled by the Telephone
Operator
5
Service
Demarcation
Service
Demarcation
Network
Edge
Network
Edge
Internet Insecurity (Insecurity everywhere)
In this insecure TCP/IP environment you can do everything, or almost
everything
• Use a fake IP address (origin / destination)
• Impersonation of user´s identity, network equipment, services,
applications, etc.
• Intercept communications from anywhere
• Datagrams modification (changing data)
• Denial of service attacks
• Malicious use of the innumerable auxiliary communications protocols
• And many more bad things…
6
What companies and organizations are doing
• Installing new, complex and expensive secure systems
– Firewalls
– VPNs (Virtual Private Networks)
– Encryption & Authentication & Integrity Protocols
– Digital signature
– Additional Security Protocols
– Intrusion Detection Systems
– Secure Network Devices
– Policies, Audits, PENtesting ....
Time and $$$$$$$$$
• The result is always frustrating, because after removing the known
security holes, new vulnerabilities appear
7
Firewalls, are they really secure?
8
Communication networks must be, and can be:
Secure, simple and more efficient
But to achieve this, we have to change the way we are doing it
9
If I had asked people what they wanted, they would have said faster horses.
(Henry Ford)
Disruptive Technologies
Breaking the rules and the way everybody does it
• Simple, not complex
– Fewer technologies and techniques
– More complex equipment = less secure
– No longer adding more and more security layers
• “Built-in Security”: as the POTS (Plain Old Telephone Service)
– Old circuit switching tech… but in TCP/IP networks
• Reduce the “Cyber Attack Surface” close to zero
– Today, everyone from anywhere can launch a cyber-attack leaving no trace
10
Insanity: doing the same thing over and over again and expecting different results
(Albert Einstein)
We want this idyllic scenario:
• Network equipment (the LAN switches where all the computers are
connected to) must provide the following security features:
– No more additional protocols and no more complex configuration
– Prevent “Fake Internet Addresses”
– Block and disable hacking tools
– Native firewalling features. No rules, no configuration
– Foolproof and automatic attack detection
– Hide the network to outside users to minimize the "attack surface"
– Instantly identify the attack source and block it
• A deep knowledge of networking and how to modify it, to dramatically
improve security, is required to achieve these goals
11
•12
PHY B
Link B
IP
Transport
TCP
IP
Link A
PHY A PHY A PHY CPHY C
Link A Link C Link C
Transport
TCP
App App
App
IP
App App
App
IP IP
PHY B
Link B
IP
Subnet 1 Subnet 2 Subnet 3 •13
PHY B
Link B
IP
Transport
TCP
IP
Link A
PHY A PHY A PHY CPHY C
Link A Link C Link C
Transport
TCP
App App
App
IP
App App
App
IP IP
PHY B
Link B
IP
Subnet 1 Subnet 2 Subnet 3 •14
PHY B
Link B
IP
Transport
TCP
IP
Link A
PHY A PHY A PHY CPHY C
Link A Link C Link C
Transport
TCP
App App
App
IP
App App
App
IP IP
PHY B
Link B
IP
Subnet 1 Subnet 2 Subnet 3 •15
•16
What can we do to secure the TCP / IP
communications without any change to
the applications, infrastructures or users'
computers?
17
18
What is UETS?
An L&M Data Communications idea, patented in U.S. and Spain
• Simple Communications Architecture which uses circuit switching to
transmit Ethernet datagrams
– Provide both the end users and the applications, fully transparent and
compatible IP services
– All the communications are handled and controlled by the Network
equipment
– Non-hijacking communications, rendering eavesdropping and cyber-attacks
to network infrastructures impossible
• Radically opposed to the current strategy of adding new security layers
and complexity
19
PHY B
Transport
TCP
IP
Link A
PHY A PHY A PHY CPHY C
Link C
Transport
TCP
App App
App
App App
App
IP
PHY B
UETS with no changes to the user’s computer
20
TCP
IP
Link A
ETH A
TCP
IP
Link C
ETH C
IP
Link A
ETH A
IP
Link B
ETH B
IP
Link B
ETH B
IP
Link C
ETH C
UETS Highest level of security
(NO TCP/IP on the user's computer)
App App
App
App
App
App
21
PHY B
ETHERNET
PHY A PHY A PHY CPHY C
ETHERNET
App App
App
App App
App
PHY B
EtherNET
UETS Highest level of security
(NO TCP/IP on the user’s computer)
22
UETS Key aspects
• Circuit technology in Ethernet networks
• High security: NO TCP/IP NO TCP/IP attacks
• Full Backward IP Compatibility
• Using standard TCP / IP applications
• Removing Complexities to the minimum
• Eliminating complex solutions
23
INTERNET
UETS Demonstration Platform
LAN
UNI
0 0
0 0
1 1
1 1
UETS SWITCH
Transport Network and Core outside the
scope of concept`s proof
24
SNMP over IP & SNMP over UETS (Trace Wireshark)
SNMP over IP
SNMP over UETS
}
}
It's time for change
26

Weitere ähnliche Inhalte

Was ist angesagt?

E:\All About Dect
E:\All About DectE:\All About Dect
E:\All About Dectheatherb51386
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentationmrtheodisthorne2
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
WIFI[autosaved]
WIFI[autosaved]WIFI[autosaved]
WIFI[autosaved]Rekha Sivaji
 
Bluetooth vs Wi-Fi comparison for IoT Solutions
Bluetooth vs Wi-Fi comparison for IoT SolutionsBluetooth vs Wi-Fi comparison for IoT Solutions
Bluetooth vs Wi-Fi comparison for IoT SolutionsRiyaz Lakhani
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Conceptkodela3
 
Wifi Challenges
Wifi ChallengesWifi Challenges
Wifi Challengesnone
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technologyRavi Rajput
 
Wi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen MominWi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen Mominmubeenm50
 
Lifi technology presentation
Lifi technology presentation Lifi technology presentation
Lifi technology presentation ShivPatel206800
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth TechnologyAbdullah Khosa
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Praveen Reddy
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technologyFaiq Ali Sayed
 
Wifi Presentation
Wifi PresentationWifi Presentation
Wifi PresentationMomentum Plus
 
Build of Industrial Wireless Based on MulteFire
Build of Industrial Wireless Based on MulteFireBuild of Industrial Wireless Based on MulteFire
Build of Industrial Wireless Based on MulteFireMFA
 

Was ist angesagt? (20)

wi-fi ppt
wi-fi pptwi-fi ppt
wi-fi ppt
 
E:\All About Dect
E:\All About DectE:\All About Dect
E:\All About Dect
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentation
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
WIFI[autosaved]
WIFI[autosaved]WIFI[autosaved]
WIFI[autosaved]
 
Bluetooth vs Wi-Fi comparison for IoT Solutions
Bluetooth vs Wi-Fi comparison for IoT SolutionsBluetooth vs Wi-Fi comparison for IoT Solutions
Bluetooth vs Wi-Fi comparison for IoT Solutions
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Concept
 
Wifi Challenges
Wifi ChallengesWifi Challenges
Wifi Challenges
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
 
Wi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen MominWi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen Momin
 
Lifi technology presentation
Lifi technology presentation Lifi technology presentation
Lifi technology presentation
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wifi Presentation
Wifi PresentationWifi Presentation
Wifi Presentation
 
Build of Industrial Wireless Based on MulteFire
Build of Industrial Wireless Based on MulteFireBuild of Industrial Wireless Based on MulteFire
Build of Industrial Wireless Based on MulteFire
 

Ă„hnlich wie 2017 conferencia-uets-mobilecongress l∓m

Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetAnish Thomas
 
EGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - LicensingEGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - LicensingDr. Edwin Hernandez
 
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)SANTIAGO PABLO ALBERTO
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital SecurityLindsey Jones
 
Final project report
Final project reportFinal project report
Final project reportRaziaSultanaHimu
 
Data analysis telecommunications the int
Data analysis telecommunications the intData analysis telecommunications the int
Data analysis telecommunications the int123456naji
 
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSIntellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSDr. Edwin Hernandez
 
1_IoT_Fundamentals.ppt
1_IoT_Fundamentals.ppt1_IoT_Fundamentals.ppt
1_IoT_Fundamentals.pptHodaKHajeh1
 
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdfchapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdfAliMurat5
 
Chapter 7 telecommunications the internet and wireless technology
Chapter 7 telecommunications the internet and wireless technologyChapter 7 telecommunications the internet and wireless technology
Chapter 7 telecommunications the internet and wireless technologyVan Chau
 
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologyMIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologySukanya Ben
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersITExamAnswers.net
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingssuser06ea42
 
homenet-ews.ppt
homenet-ews.ppthomenet-ews.ppt
homenet-ews.pptTariq Emad
 

Ă„hnlich wie 2017 conferencia-uets-mobilecongress l∓m (20)

Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
EGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - LicensingEGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - Licensing
 
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
Final project report
Final project reportFinal project report
Final project report
 
Data analysis telecommunications the int
Data analysis telecommunications the intData analysis telecommunications the int
Data analysis telecommunications the int
 
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSIntellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
 
1_IoT_Fundamentals.ppt
1_IoT_Fundamentals.ppt1_IoT_Fundamentals.ppt
1_IoT_Fundamentals.ppt
 
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdfchapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
 
Chapter 7 telecommunications the internet and wireless technology
Chapter 7 telecommunications the internet and wireless technologyChapter 7 telecommunications the internet and wireless technology
Chapter 7 telecommunications the internet and wireless technology
 
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologyMIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
 
Ip telephony
Ip telephonyIp telephony
Ip telephony
 
Networking
NetworkingNetworking
Networking
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computing
 
homenet-ews.ppt
homenet-ews.ppthomenet-ews.ppt
homenet-ews.ppt
 
INTERNET AS A NETWORK INFRASTRUCTURE ...
INTERNET AS A NETWORK INFRASTRUCTURE                                         ...INTERNET AS A NETWORK INFRASTRUCTURE                                         ...
INTERNET AS A NETWORK INFRASTRUCTURE ...
 
niceData com.
niceData com.niceData com.
niceData com.
 
niceData com.
niceData com.niceData com.
niceData com.
 

KĂĽrzlich hochgeladen

8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524najka9823
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 

KĂĽrzlich hochgeladen (20)

8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 

2017 conferencia-uets-mobilecongress l∓m

  • 1. Training and Consulting in Information and Communications Technologies Sean McCarthy L&M Data Communications
  • 3. Communications networks' current situation • Currently all the networks, services and applications are based on Internet technologies: TCP/IP Communication Protocols • Any current device (PCs, Tablets, Telephones, Game Stations, TV, control equipment, etc.) includes these TCP/IP protocols • TCP/IP DNA: – Designed in the 70s for the interconnection of heterogeneous global networks – Introduced in the early 80s on the Local Area Networks – The target was to interconnect heterogeneous networks and equipment, without taking into account security or efficiency • Internet was not designed with security in mind 3
  • 4. Where is the Problem? TCP/IP Communications Architecture • The user can fiddle with the communications 4 TCP IP ETH A PHY A PHY C ETH C App App App App App IP IP net Internet Aplication Service is provided by TCP and controlled by the user TCP App Service Demarcation Service Demarcation Network Edge Network Edge
  • 5. POTS (Plain Old Telephone Service) versus Internet TCP/IP • All the communications are handled and controlled by the Telephone Operator 5 Service Demarcation Service Demarcation Network Edge Network Edge
  • 6. Internet Insecurity (Insecurity everywhere) In this insecure TCP/IP environment you can do everything, or almost everything • Use a fake IP address (origin / destination) • Impersonation of user´s identity, network equipment, services, applications, etc. • Intercept communications from anywhere • Datagrams modification (changing data) • Denial of service attacks • Malicious use of the innumerable auxiliary communications protocols • And many more bad things… 6
  • 7. What companies and organizations are doing • Installing new, complex and expensive secure systems – Firewalls – VPNs (Virtual Private Networks) – Encryption & Authentication & Integrity Protocols – Digital signature – Additional Security Protocols – Intrusion Detection Systems – Secure Network Devices – Policies, Audits, PENtesting .... Time and $$$$$$$$$ • The result is always frustrating, because after removing the known security holes, new vulnerabilities appear 7
  • 8. Firewalls, are they really secure? 8
  • 9. Communication networks must be, and can be: Secure, simple and more efficient But to achieve this, we have to change the way we are doing it 9 If I had asked people what they wanted, they would have said faster horses. (Henry Ford)
  • 10. Disruptive Technologies Breaking the rules and the way everybody does it • Simple, not complex – Fewer technologies and techniques – More complex equipment = less secure – No longer adding more and more security layers • “Built-in Security”: as the POTS (Plain Old Telephone Service) – Old circuit switching tech… but in TCP/IP networks • Reduce the “Cyber Attack Surface” close to zero – Today, everyone from anywhere can launch a cyber-attack leaving no trace 10 Insanity: doing the same thing over and over again and expecting different results (Albert Einstein)
  • 11. We want this idyllic scenario: • Network equipment (the LAN switches where all the computers are connected to) must provide the following security features: – No more additional protocols and no more complex configuration – Prevent “Fake Internet Addresses” – Block and disable hacking tools – Native firewalling features. No rules, no configuration – Foolproof and automatic attack detection – Hide the network to outside users to minimize the "attack surface" – Instantly identify the attack source and block it • A deep knowledge of networking and how to modify it, to dramatically improve security, is required to achieve these goals 11
  • 13. PHY B Link B IP Transport TCP IP Link A PHY A PHY A PHY CPHY C Link A Link C Link C Transport TCP App App App IP App App App IP IP PHY B Link B IP Subnet 1 Subnet 2 Subnet 3 •13
  • 14. PHY B Link B IP Transport TCP IP Link A PHY A PHY A PHY CPHY C Link A Link C Link C Transport TCP App App App IP App App App IP IP PHY B Link B IP Subnet 1 Subnet 2 Subnet 3 •14
  • 15. PHY B Link B IP Transport TCP IP Link A PHY A PHY A PHY CPHY C Link A Link C Link C Transport TCP App App App IP App App App IP IP PHY B Link B IP Subnet 1 Subnet 2 Subnet 3 •15
  • 17. What can we do to secure the TCP / IP communications without any change to the applications, infrastructures or users' computers? 17
  • 18. 18
  • 19. What is UETS? An L&M Data Communications idea, patented in U.S. and Spain • Simple Communications Architecture which uses circuit switching to transmit Ethernet datagrams – Provide both the end users and the applications, fully transparent and compatible IP services – All the communications are handled and controlled by the Network equipment – Non-hijacking communications, rendering eavesdropping and cyber-attacks to network infrastructures impossible • Radically opposed to the current strategy of adding new security layers and complexity 19
  • 20. PHY B Transport TCP IP Link A PHY A PHY A PHY CPHY C Link C Transport TCP App App App App App App IP PHY B UETS with no changes to the user’s computer 20
  • 21. TCP IP Link A ETH A TCP IP Link C ETH C IP Link A ETH A IP Link B ETH B IP Link B ETH B IP Link C ETH C UETS Highest level of security (NO TCP/IP on the user's computer) App App App App App App 21
  • 22. PHY B ETHERNET PHY A PHY A PHY CPHY C ETHERNET App App App App App App PHY B EtherNET UETS Highest level of security (NO TCP/IP on the user’s computer) 22
  • 23. UETS Key aspects • Circuit technology in Ethernet networks • High security: NO TCP/IP NO TCP/IP attacks • Full Backward IP Compatibility • Using standard TCP / IP applications • Removing Complexities to the minimum • Eliminating complex solutions 23
  • 24. INTERNET UETS Demonstration Platform LAN UNI 0 0 0 0 1 1 1 1 UETS SWITCH Transport Network and Core outside the scope of concept`s proof 24
  • 25. SNMP over IP & SNMP over UETS (Trace Wireshark) SNMP over IP SNMP over UETS } }
  • 26. It's time for change 26