From the course: Implementing Zero Trust for 5G and Open RAN
Unlock this course with a free trial
Join today to access over 24,800 courses taught by industry experts.
Security risks with confidentiality and data integrity
From the course: Implementing Zero Trust for 5G and Open RAN
Security risks with confidentiality and data integrity
- [Instructor] Now let's take a look at security risk on confidentiality and data integrity. And before we do that, if you can just type telecom on Google, you'll see all of this news coming in. Yes, internet is burning with cyber attack news on telecom infrastructure. And there is a reason to it. If an attacker can get ahold of a telecom infrastructure, user information can be compromised and it can cause serious impact. Let's take a look at the asset classification that why do we care about this? If you look at the data assets, we see user communication data such as wise calls, packet data, data records. We see user privacy information such as the cell phone numbers, the subscription information, as well as the location information where the user is located. We also see operators critical data, such as the billing reports, the call data records. We also see key data for system operation and maintenance, such as logging, billing information. Now, if you look at the equipment assets…
Contents
-
-
-
The evolution from 1G to 5G3m 5s
-
(Locked)
Key components of the mobile network3m 19s
-
(Locked)
Decoding mobile network architecture7m 1s
-
(Locked)
Security risks with confidentiality and data integrity3m 51s
-
(Locked)
Security requirements by standards organizations4m 5s
-
(Locked)
Security challenges and risk at present in 5G and ORAN4m 6s
-
(Locked)
Challenge: Study a recent cyber attack20s
-
(Locked)
Solution: Study a recent cyber attack3m 49s
-
-
-
-
-
-