From the course: Implementing Zero Trust for 5G and Open RAN

Unlock this course with a free trial

Join today to access over 24,800 courses taught by industry experts.

Security risks with confidentiality and data integrity

Security risks with confidentiality and data integrity

From the course: Implementing Zero Trust for 5G and Open RAN

Security risks with confidentiality and data integrity

- [Instructor] Now let's take a look at security risk on confidentiality and data integrity. And before we do that, if you can just type telecom on Google, you'll see all of this news coming in. Yes, internet is burning with cyber attack news on telecom infrastructure. And there is a reason to it. If an attacker can get ahold of a telecom infrastructure, user information can be compromised and it can cause serious impact. Let's take a look at the asset classification that why do we care about this? If you look at the data assets, we see user communication data such as wise calls, packet data, data records. We see user privacy information such as the cell phone numbers, the subscription information, as well as the location information where the user is located. We also see operators critical data, such as the billing reports, the call data records. We also see key data for system operation and maintenance, such as logging, billing information. Now, if you look at the equipment assets…

Contents