To beat a hacker, you need to think like one!
"Our Clients, Intelligence, Air force, Army, Navy, Defense, Police, Justice, Banks ,Stock Exchanges, Airports , Hospital,Ministry,University, Government and Pvt Sectors".
All government authorities and private sectors , financial institutions, banks, intelligence agencies, corporate and factories are really worried of the internet threats. They could not have gained the advantage of the internet as the normal entrepreneur.
4. Table of Content
The cyber world, a reflection of our physical world
SDN – Introduction
SDN – Ambition and Purpose
SDN Services and Product Line
Security Threats
IT Security Critical Success Factors
Proposed Services
7. What Internet Assigned Numbers Authority (IANA) doing
The Regional Internet Registry system evolved over time, eventually dividing the world into five RIRs:
•African Network Information Center (AFRINIC)[1] for Africa
•American Registry for Internet Numbers (ARIN)[2] for the United States, Canada, several parts of the Caribbean region, and Antarctica.
•Asia-Pacific Network Information Centre (APNIC)[3] for Asia, Australia, New Zealand, and neighboring countries
•Latin America and Caribbean Network Information Centre (LACNIC)[4] for Latin America and parts of the Caribbean region
•Réseaux IP Européens Network Coordination Centre (RIPE NCC)[5] for Europe, Russia, the Middle East, and Central Asia
14. Estimated Net Loss Due to Cybercrime
Cybercrime is a growth industry.
High return, Low risks
Likely annual cost to the global economy from
cybercrime is more than $400 billion.
Ranging from $375 billion to $575 billion.
This is the equivalent of the GDP of:-
$375bn – Singapore, South Africa
$575bn – Belgium, Argentina, Austria
Governments and companies still
underestimate the risk and the exponential
growth.
Internet economy annually generates between
$2 trillion and $3 trillion.
Therefore, cybercrime extracts between 15%
and 20% of the value created by the Internet.
16. Copy Right –Information Security Forum
As your workforce and customers embrace the cloud, mobility, social media and big data, your
organization’s attack surface expands significantly.
19. But we have expert team and latest technology
We have Teams of Experts , Key Players,
Top Consultants, Latest Technology ,
World Class Data Centers, High end
Servers , etc. But the Threat is ongoing,
the breaches continue
20. CCTV Camera
CCTV Camera
LPR
RFID
ID verification Terminal
Base Station
VSAT
Server
Network
Monitoring
Vehicle screening
Integrated Security System
25. SDN - Introduction
• SDN is a Saudi LLC founded with a big ambition.
• We want to bring state of the arte IT and Power solutions to
the Kingdom by leveraging the strengths of our ecosystem.
• To date we have succeeded to create traction through:-
– strategic relationship to address the local and regional
market with value added solutions
– Created a SDN team that is a unique group of extremely
talented engineers, technicians, and project managers.
• Our service and product line is focused on Systems
Integration, Security, Power and Operations & Maintenances
• We are also exploring data management and analytics for a
2016/2017 launch.
26. • Human Centric ICT services and solutions
that enable end-to-end flow of transactions
and information.
• Creating value by enabling ecosystem
connectivity and collaboration possible
through connections and collaboration.
• Technology to meet business challenges and
resolve issues.
• Secure and trusted multi-surface and multi-
faceted connections.
contribute to the creation of a networked Saudi society that is
rewarding and secure, bringing about a prosperous future for
our nation that fulfils our nation’s dreams and aspiration.
Corporate Vision
Size, Type & Complexity
of Projects • Project Management
• Product & Service Line
Experts
• Build Brand
• Execute through subs
• Collaborate with Global names
• Professional Services
• Brand elements invested
• Based on fundamental & technical analysis
• Seamless mobilization of resources and
assets
• Trusted and valued Partner for customer’s expansion.
• Bring infrastructure solutions that benefit everyone to from a networked society.
• Leverage information and communications technology to create new possibilities for value generation.
Act as the Trusted advisor and enabler
27. SystemsIntegration
Planning and Structuring Product Innovation
TrustandIntegrity
Operation&Maintenance
Powersolutions
KYC – Understand Objectives and Needs – Assess & Align
SDN Product and Service Line
Network Infrastructure
Low Current
Data Centre
Mobility
Security Management
Information Security
Vulnerability Defense
Enterprise Services
On Site Operations
On Call Maintenance
Remote site Support
Power over IT
Solar Energy
Redundancy
29. Our Ecosystem Partners and Customers
System Integration
Trust and Integrity
Operation & Maintenance
Power
• S2N Technology LLC
• Saudi Red Crescent
• Imarat Tabuk
• King Abdulaziz University
• King Fahad Medical City
• Ministry Of Interior (introduction stage )
• Ministry of Defense (under technical evaluation)
• Saudi Aramco (under technical evaluation)
• The Royal Court –(under negation )
• Ministry of Petroleum – (to be finalized in next budget )
• F-Net LLC
• KDN Cyber Security
Center
• SDN • Emara of Najran
• KFMC (bid evaluation, no.1)
• Dammam University
• KAIA
• Saudi Aramco (under technical evaluation)
• S-Energy -Korea
• Solar City- USA
37. * Patented NetSwitch from Taiwan
* A domestic patent application with NetSwitch
* A patent application about Netswitch relative with USA, Japan and China
* A patent announcement about NetSwitch in USA
* A domestic patent application about DualNET
* A domestic registration of utility model of NetSwitch
Acquisition of venture firm status
Selection of Technology Credit Guarantee Fund, blue-chip technology companies
Acquisition of approval of use DualNET from Ministry of Defense
Actuation of security certification from department of public peace in China
(6 security certifications including Netswitch Series )
Authenticated PoE EP Serise EMI/EMC
* Pass the TTA electronic characteristic test about DualSM-24M
Patented Certification
40. Terminal Network Redundancy
Provided non-stop operation environment using a backup
network equipment and electronic patch (Suggest a low
cost and high efficiency of differentiated network method)
41. Information Security
NetSwitch
Plus
DualNET
IPChanger
1) Products that add personal PC security S/W of NETSwitch product lines
2) Add features such as PC firewall/virus protection except IP Changer features
1) Network switching devices that operate by separating the internal network
2) HDD and external network HDD on a single PC Internal HDD data is fully security because
HDD operate separately Safe from hackings and viruses
3) Suitable for educational/research PC because of one of the two OS can be
used on a single PC
1) Send and receive network switching signal in Netswtich product line (Except Netswitch I)
2) Software that enables you to convert the IP environment without rebooting
42. Information Security
NetSwitch I
NetSwitch
II-M
NetSwitch
II-R
- NETSwitch for one user
- Essentially block the entry of the internal network from an external network
- Convert the IP environment without rebooting IP Changer S/W
- Physically separating the two networks and the PC is switched network to the IP changer S/W
- Other networks are cut off the electrical signal when using selected one of the networks.
In particular, the internal network is not accessible from the outside - Support 12 ports, 24 ports
- Built-in router to the Netswitch main functions - In the branch the internet is cable, internal
operations are performed in a dedicated line.
- Reducing leased line costs and achieve internal security in traffic distribution
- Built-in 12 ports 10/100BaseT Switching Hub
49. Problems
Problems of existing Network Isolation
Al through the physical isolation of the network is the safest
security solution; simply isolating the network may have the
following problems
1) Installation : Increase in the installation and management
expenses sue to redundant network cable between the internal
and external network equipment’s and user PC’s
2) Usability: When using one PC, inconvenience of the resetting
the IP address, PC rebooting and switching cables.
3) When using two PC, burden of purchasing an additional PC and
management expenses.
4) Space: excessive space is required for two PC and cabling.
50. Physical Separation
1. What is the physical network isolation?
• Physical isolation method fundamentally removes the
access part from the internal network from external
network by isolating the internal network that requires high
level of security from the external network, different from
the existing software base security .
• It is the most ideal security solution and from past 15 years
and still gone of its kind successfully working and still
growing strong
2. Need of Network Isolation ?
• Organization that are sensitive to the security worry about
the limit that the internal network and critical resource
cannot be completely protected when the internal and
external and external network are physically connected
even if the logical security solutions , such as the firewall,
IDS,VPN and Anti virus , are implemented.
• It is impossible to defend any hacking method or viruses
that are known yet .
If there is a way out, there must be way in.
52. Advantage
Advantages of F-Net Network Isolation Security Products.
As the new network Isolation), NetSwitch Series and DualNET provide the following advantages to the user
and network administrator:
1) Physical Level Security : Highest Level of Network Security
2) Ensemble of Convenience and Efficiency : Network Switching required only simple user interaction
3) Reducing of system implementation cost : Network isolation and implementation cost us reduced by using single
PC and cabling
4) Reduction of Network Security Management Cost: Management cost is minimized through the use of Hardware-
based product.
5) Economical Line Speed upgrade: Traffic can be distributed through the isolation of the internal or external
network.
53. IP-Changer IPCHANGER
IPChanger is a program used in conjunction with NetSwitch II-
M (24- or 12-port) or NetSwitch IIR (12-port). To use internal
network and external network (Internet) in a very isolated
manner by implementing NetSwitch II series product,
IPChanger must be installed in each computer connected to
network. Internal network or external network can be
conveniently selected and switched using IPChanger.
IP changer supports latest operating system
environment with integrating of Arabic language It
allows you to selectively connect to either internal network or
external network (Internet) by clicking on the system tray icon
located in the lower left corner of the desktop after the
installation. IPChanger can be configured to meet various user
requirements, offers the following benefits, and advanced
61. From Purpose to Solution Architecture
Power Oil District Heating, etc
National Security & People’s Living Stabilization
through stable demand and supply of energy
Real-time surveillance Emergency response
IT Infrastructure in Energy Sector
Vulnerability Analysis/assessment
Gas
Cyber Security Center
62. Governance Structure
▶ 28 Participating Institutions
- information furnishing
- joint measure
power(15) gas(4) oil(2) the others(7)
▶ Steering Committee : vice
minister of MKE + 11 CEOs
▶ Chief : policy director of MKE
▶ Secretariat : 2 officials of MKE
- in charge of Information Mg ’t Div.
Working committee
Steering committeechief
secretariat
▶ Operating Institution(KDN)
- Security Operation Team
- Computer Emergency Response Team
- Vulnerability Analysis/Assessment Team Operation T. CERT Analysis T.
Operating Institution
Organization
63. Operational System
Cyber attack (hacking / worm / virus)
early warning
information sharing person
in charge
security controlling
1. 24-hour surveillance
cooperation
emergency response
1. accident analysis
surveillance
blocking
restoration
analysis/assessment
1. vulnerability review
2. measure establishment
2. initial response
3. operation of Help Desk
2. restoration
3. proliferation prevention
NationalInfrastructure
Mission
65. Enterprise Security Management (ESM)
• normalization and
unified management
of security events
• correlation analysis &
accident detection
based on real-time
• intuitional grasp and
situation analysis
based on 3D
visualization
Quick defense of cyber security symptoms
66. Threat Management System(TMS)
• detection, analysis
and block of harmful
traffic
• Forecast/warning of
cyber threat
• real-time statistics,
analysis and web
service
Forecast/warning & real-time information sharing to the participant
67. WEB Management System(WMS)
• periodic surveillance of
participant’s homepage
• 24 hours real-time
monitoring
• instant countermove to
forgery and altering of
homepage
Instant countermove to forgery and altering of homepage