Czy bezpieczny VOIP jest lepszy.pdf

(1743 KB) Pobierz
Fortinet Overview
Fortinet VoIP Security
Rainer Baeder
08-10-2010
November 3, 2010
Fortinet Confidential
748991840.011.png 748991840.012.png 748991840.013.png 748991840.014.png
Fortinet Overview
Market-Leading Provider of End-to-End IT Security Solutions
Innovative,
Best-in-Class
Technologies and
Products
Six ICSA certifications
(Firewall, AV, IPS, IPSec VPN,
SSL VPN, Anti-Spam)
Strong IP portfolio – 20+
patents; 80+ pending
Government Certifications
(FIPS-2, Common Criteria
EAL4+, NIST)
Consistent Antivirus Validation
– (Virus Bulletin 100 approved; 2005,
2006, 2007, 2008)
Company Stats
Founded in 2000
Silicon Valley-based, strong
global presence with
32+ offices worldwide
$212M+ in revenues (2008)
Seasoned and proven
executive management team
1,250+ employees /
750+ engineers
550,000+ FortiGate devices
shipped worldwide
Fortinet Confidential
748991840.001.png 748991840.002.png 748991840.003.png 748991840.004.png 748991840.005.png 748991840.006.png
Still not relevant to you ??
Cyberwarfare: VoIP and Convergence
Increase Vulnerability
David L. Fraley
By 2005, the United States and other nations will have the ability to
conduct cyberwarfare. The increasing use of Voice over IP and the
converging of voice/data networks is facilitating it.
The aspects of cyberwarfare have been considered for years. Future cyberattacks could
constitute an entire war or an attack type as part of a larger campaign. Cyberwarfare, like any
military operation, has two components — offensive and defensive operations.
The U.S. military complex continues work on Presidential Directive 16, including developing the
rules and tools. The United States is not the only government thinking about cyberattacks. In the
second quarter of 1995, Major General Wang Pufeng of The Chinese Army published a paper,
―The Challenge of Information Warfare.‖ In this paper, Pufeng writes that the information era will
touch off a revolution in military affairs.
Fortinet Confidential
748991840.007.png 748991840.008.png
Phony Phone Calls Distract Consumers from Genuine Theft
TDoS - FBI and Partners Warn Public
NEWARK, NJ—Have you recently received a large number of
strange and unexplained calls on your mobile or landline
telephones? The FBI is warning consumers about a new scheme
that uses telecommunications denial-of-service attacks as a
diversion to what is really happening: the looting of bank and
online trading accounts.
The Scheme
The scheme is known as telephony denial-of–service (TDOS) and
according to several telecommunications companies working with the
FBI, there has been a recent surge of these attacks in the past few
weeks. The perpetrators are suspected of using automated dialing
programs and multiple accounts to overwhelm the land and cell
phone lines of their victims with thousands of calls. When the
calls are answered, the victim may hear anything from dead air
(nothing on the other end), an innocuous recorded message, an
advertisement, or even a telephone sex menu. The calls are
typically short in duration but so numerous that victims have had to
have their numbers changed to make the calls stop…….
Fortinet Confidential
http://newark.fbi.gov/pressrel/pressrel10/nk051110.htm
748991840.009.png
Cloud Attacking
Amazon EC2 - Amazon Elastic Compute Cloud
Complaints of rampant SIP Brute Force Attacks coming from
servers with Amazon EC2 IP Addresses cause many admins to
simply drop all Amazon EC2 traffic. Generally, SIP brute force
attacks attempt to register various peer names to a system and/or
attempt to guess passwords of known/guesses peers or endpoints.
The complaints mentioned this weekend show an excessive
amount of traffic; with some providers claiming 6GB of traffic
dedicated to such attacks . Since we ourselves received an attack
from an Amazon hosted server, we also reported and complained
to the Amazon NOC/Abuse depts
Fortinet Confidential
748991840.010.png
Zgłoś jeśli naruszono regulamin