5G initiates a period of technological evolution where the benefits transcend faster data download speeds and enable services that will change the way we all live and consume technology. Leveraging 5G’s openness, a new developer ecosystem is building breakthrough services that billions of people will consume, delivering immense value to enterprises and subscribers alike. For 5G to achieve its potential, organizations must embrace multi-layered security that goes far beyond 3GPP specifications. Now, leading security architect Pramod Nair helps network professionals climb the steep learning curve associated with securing 5G, fully understand its threat surfaces, systematically mitigate its risks, and maximize the value of their security investments.
Security in evolving cellular technologies is not an easy concept to grasp, as the technologies have evolved rapidly and are becoming increasingly complex and nuanced as they become more open, especially when you add 5G to the mix. 5G will also enable enterprises and industry verticals to deploy private 5G/non-public 5G networks (5G NPN networks) on their own, without any integration with service providers. This necessitates private and government sectors to fully understand the 5G threat surfaces, develop methods to mitigate the threats, and prioritize the investments in security.
The existing material on security and cellular technologies is dispersed across many resources and does not cover the end-to-end 5G threat surfaces, threat mitigation, examples of real-life deployment scenarios, and prioritization of security controls based on use cases and deployment scenarios. The learning curve for a person trying to understand the evolution in cellular technologies, new architectures, multiple deployment methods, threat surfaces, and mitigation techniques is extremely steep and sometimes unnerving. It is not surprising that the topic of securing cellular technologies tends to flummox newcomers and even seasoned network security engineers.
This book brings all the information together and arranges the key topics in such a way that they can be easily consumed and understood. The main purpose of this book is to enable any person to understand the key aspects of securing 5G and evolving technologies. This book covers a range of topics; it will take you through the evolution of technologies from 2G to 5G, with deep dives into specific topics, such as securing non-public 5G networks/private 5G deployments and prioritizing security investments.
Скачать Securing 5G and Evolving Architectures (Final)
Wireless and Mobile Device Security 2nd Edition Название: Wireless and Mobile Device Security, Second Edition Автор: Jim Doherty Издательство: Jones & Bartlett Learning Год: 2021 Формат:...
Securing the Internet of Things Название: Securing the Internet of Things Автор: Shancang Li, Li Da Xu Издательство: Syngress Год: 2017 Страниц: 154 Формат: PDF Размер: 10 Mb Язык:...
Securing SQL Server: DBAs Defending the Database Название: Securing SQL Server: DBAs Defending the Database Автор: Peter A. Carter Издательство: Apress Год: 2016 Страниц: 164 Формат: PDF Размер: 11...
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.