Download - SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

Transcript
Page 1: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Understand challenges for providing

reliable and secure TETRA network operation

• Choose relevant requirements for your

TETRA network

• Establish questions and criteria to evaluate

vendor expertise and solutions

• Mitigate risks for availability, security

and continuity

SCOPE

Page 2: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Functionality

• Performance

• Scalability - Capacity

• Availability - Reliability - Coverage

• Security

• Continuity

REQUIREMENTS

Page 3: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Definition of Availability• Availability in Time & Place (coverage)

• Availability versus Reliability• Availability calculation (MTBF, MTTR)

• Increase availability by…• System redundancy

• Link redundancy

• Component redundancy

• Coverage redundancy

• Local Site Fallback

• Direct Mode

AVAILABILITY

Page 4: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• System redundancy• Synchronization, Activation, Recovery > Expected Outage

• Link redundancy• Physical links, Protocols > Expected Outage

AVAILABILITY

MainSwMI

StandbySwMI

BS2 BS4 BS6

BS3 BS5 BS7BS1

Ethernet

E1, DSL, Fiber, ...

Main path to BS4

Standby pathto BS4

Page 5: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Coverage• Coverage planning

• Drive tests

• Special Coverage Locations

• Continuous coverage reporting

AVAILABILITY

Page 6: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Security risks• Eavesdropping – Air interface, Fixed network, Control room

• Traffic analysis – Identities, Movements, …

• Denial of Service – Air interface, Fixed network

• Compromised base station – Sensitive key material

• False base station – Take control of valid users

• Unauthorized user access – Eavesdropping, Disinformation, Fraud

• System disruption – System or site unavailability

SECURITY

Page 7: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• TETRA security• Class 2 Air Interface Encryption – SCK

• Class 3 Air Interface Encryption – DCK, CCK

• Class 3G Air Interface Encryption – GCK

• (Mutual) Authentication

• End-to-End Encryption

SECURITY

Page 8: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• System security• System hardening –

Reduce “surface of vulnerability” (services, ports, …)

• Access security – Encryption and (two-factor) user authentication

• Security auditing – Logging of access and command execution

• Security patches – Resolve known vulnerabilities

SECURITY

Page 9: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Network security• Physical security – Fences, Access control, Alarms

• Cyber security –

Firewall, Intrusion detection, Virus & Malware interception

• Admin access – VPN, (two factor) User authentication

• Network access – VLAN, ACL, EAP

• Link encryption – IPsec, MACsec

• Security auditing – RADIUS, Syslog

SECURITY

Page 10: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Continuity risks• Failures – How to deal with hardware and software failures

• Complaints – How to pro-actively solve user complaints

• Expansion – How to ensure expansions within budget

• Support – How support can be provided securely and effectively

• Lifecycle – How to deal with hardware and software obsolescence

• Vendor – How to ensure long-term vendor relations

CONTINUITY

Page 11: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Failure mitigation• Component Failures – Spares, Repairs

• System Failures – Backup, Restore, Disaster recovery

• User Complaints – Logging, Statistics, Analysis, Reporting

CONTINUITY

Page 12: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure

• Business mitigation• Expansion – Scalability, Cost (Hardware, Licenses)

• Support – Ease of configuration, Remote support,

Service Level Agreements, Cost

• Lifecycle – Software releases, (Security) patches,

End-of-Life Notices, Escrow

• Vendor – Profitability, Strategy, Commitment

CONTINUITY