Case 4 Satellite Communications Systems

Case 4 – Satellite Communications Systems 2o Clar ke b elt C Band: 6 GHz uplink/4 GHz downlink FM/FDMA 24 - 36 MHz transponders. Scrambled video, en...
1 downloads 0 Views 102KB Size
Case 4 – Satellite Communications Systems 2o

Clar ke b elt

C Band: 6 GHz uplink/4 GHz downlink FM/FDMA 24 - 36 MHz transponders. Scrambled video, encrypted audio Ku Band: 14 GHz uplink/12 GHz downlink PSK/TDMA

Broadcast TV, Long distance communications

EE584-F’03 11/9/2003

Copyright ©2003 Stevens Institute of Technology - All rights reserved

194

Pote Vulne ntial rabilit ies

Threats

Additio na contro l ls

Perpetrators

Assetsat atRisk Risk Assets

Existing safeguards

Discussion order: •

Assets



Perpetrators



Threats



Existing Safeguards

Non-repudiation Confidentiality

Integrity

Availability

Access Control •

Potential Vulnerabilities

Authentication Identification



Additional Security Controls

EE584-F’03 11/9/2003

Copyright ©2003 Stevens Institute of Technology - All rights reserved

195

Pote Vulne ntial rabilit ies

Threats

Additio na contro l ls

Perpetrators

ASSETS • • Assetsat atRisk Risk Assets

Existing safeguards

Discussion order: •

Assets



Perpetrators



Threats



Existing Safeguards

Non-repudiation Confidentiality

Integrity

Availability

Access Control •

Potential Vulnerabilities

Authentication Identification



Additional Security Controls

EE584-F’03 11/9/2003

Copyright ©2003 Stevens Institute of Technology - All rights reserved

196

Pote Vulne ntial rabilit ies

Threats

Additio na contro l ls

Perpetrators

PERPETRATORS • • Assetsat atRisk Risk Assets

Existing safeguards

Discussion order: •

Assets



Perpetrators



Threats



Existing Safeguards

Non-repudiation Confidentiality

Integrity

Availability

Access Control •

Potential Vulnerabilities

Authentication Identification



Additional Security Controls

EE584-F’03 11/9/2003

Copyright ©2003 Stevens Institute of Technology - All rights reserved

197

Pote Vulne ntial rabilit ies

Threats

Additio na contro l ls

Perpetrators

THREATS • • Assetsat atRisk Risk Assets

Existing safeguards

Discussion order: •

Assets



Perpetrators



Threats



Existing Safeguards

Non-repudiation Confidentiality

Integrity

Availability

Access Control •

Potential Vulnerabilities

Authentication Identification



Additional Security Controls

EE584-F’03 11/9/2003

Copyright ©2003 Stevens Institute of Technology - All rights reserved

198

Pote Vulne ntial rabilit ies

Threats

Additio na contro l ls

Perpetrators

EXIST. SAFEGUARDS • • Assets at Risk

Existing safeguards

Discussion order: •

Assets



Perpetrators



Threats



Existing Safeguards

Non-repudiation Confidentiality

Integrity

Availability

Access Control •

Potential Vulnerabilities

Authentication Identification



Additional Security Controls

EE584-F’03 11/9/2003

Copyright ©2003 Stevens Institute of Technology - All rights reserved

199

Pote Vulne ntial rabilit ies

Threats

Additio na contro l ls

Perpetrators

VULNERABILITIES • • Assetsat atRisk Risk Assets

Existing safeguards

Discussion order: •

Assets



Perpetrators



Threats



Existing Safeguards

Non-repudiation Confidentiality

Integrity

Availability

Access Control •

Potential Vulnerabilities

Authentication Identification



Additional Security Controls

EE584-F’03 11/9/2003

Copyright ©2003 Stevens Institute of Technology - All rights reserved

200

Pote Vulne ntial rabilit ies

Threats

Additio na contro l ls

Perpetrators

ADD’L CONTROLS • • Assetsat atRisk Risk Assets

Existing safeguards

Discussion order: •

Assets



Perpetrators



Threats



Existing Safeguards

Non-repudiation Confidentiality

Integrity

Availability

Access Control •

Potential Vulnerabilities

Authentication Identification



Additional Security Controls

EE584-F’03 11/9/2003

Copyright ©2003 Stevens Institute of Technology - All rights reserved

201

ASSETS • •

PERPETRATORS • •

EXIST. SAFEGUARDS • •

EE584-F’03 11/9/2003

THREATS • •

VULNERABILITIES • •

Copyright ©2003 Stevens Institute of Technology - All rights reserved

ADD’L CONTROLS • •

202

Course Project •

• • •



• EE584-F’03 11/9/2003

Pick a topic you are interested in or project you may be working on. Topic should involve either – A wireless system that has notable security issues – Security issues that are are exacerbated in wireless systems Research the topic – current technical journal and conference paper references are desirable, but all sources are welcome. Prepare a 5-8 paper on the topic – due during the next to last class (11/20 for –TP section, 12/2 for –A section) Prepare a short presentation on the topic – due during the last class (12/4 for –TP section, 12/9 for –A section. Due to the number of students in ‘584A, I’d like a few volunteers to do their presentation on 12/2) Material covered in paper should address: – Background on topic: What is the general issue being addressed? – A brief assessment of the security aspects (use the structure of security assessments we have done in class) – In the context of the security services presented, what are the major security issues? – How dramatic are the security concerns (e.g., likelihood of attack) – Does it appear that there are efficient ways to improve security (e.g., cost-benefit tradeoffs) – What conclusions can you draw about the future directions for this topic (e.g., will it take major loss of assets to cause action to be taken? Is future technology likely to make the issue better or worse? How widespread is understanding of the underlying concern? What might change this? Is this a chronic or an acute issue?) – References The presentation should briefly cover the key points in the paper and provide detail on one or two Copyright ©2003 Stevens Institute of Technology - All rights reserved

203

Suggest Documents