没有合适的资源?快使用搜索试试~ 我知道了~
物联网和5G时代移动网络安全需求的演变(英文)[2021-09-18](36页).pdf
1.该资源内容由用户上传,如若侵权请联系客服进行举报
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
版权申诉
0 下载量 170 浏览量
2022-05-23
17:10:37
上传
评论
收藏 8.59MB PDF 举报
温馨提示
试读
36页
物联网和5G时代移动网络安全需求的演变(英文)[2021-09-18](36页).pdf
资源推荐
资源详情
资源评论
00 Introduction
01 How Did We Get Here?
02 A New Atmosphere of Mobile Network Attacks
03 5G: New Capabilities, New Security Concerns
04 The Rise of IoT and 5G Devices
05
The Role of Security Automation
and Articial Intelligence
06 5G Security Use Solutions
07 Summary
Contents
Creating a Secure Climate
for Your Customers
People simply hate to be disconnected. They want 24x7 access to
high-speed internet everywhere from any device. All that tweeting,
texting and telecommuting translates into dramatic growth in
mobile traffic. Global mobile data usage is predicted to grow at
a compound annual growth rate (CAGR) of 47%, reaching 49.0
exabytes per month by 2021.
Ever have that panicky
feeling when you’re not
sure where you left your
mobile device? It’s a sign
of the times that the
sensation has a name:
nomophobia.
Then factor in the internet of things (IoT), which
includes billions of machines around the world
connected to the internet. Every smart refrigera-
tor, thermometer and printer, to name a few,
require an always-on network connection for
remote monitoring and data sharing.
While most service providers are just now
getting a handle on 4G networks, 5G network
trials
are set to debut in major metropolitan
areas in the United States by the end of 2018.
The GSMA
predicts Asia (China and Japan),
Europe and the U.S. will be leading the 5G
market by 2025.
2020 is the beginning of a mass rollout of
5G networks. Service providers have a
short runway to gure out security issues.
00 INTRODUCTION
EVOLVING MOBILE NETWORK SECURITY NEEDS IN THE AGE OF IOT AND 5G | 3
These developments combine to create a
complex mobile ecosystem with multiple entry
points for attacks. Every device connected to
your network is a potential security weakness.
Hackers can target your customers to steal
data or use their devices to generate attacks
on your network or other companies’ networks
and applications without the users’ knowledge.
IoT devices are especially vulnerable because
manufacturers are more concerned with keeping
prices low than adding security features.
That means there are potentially millions of
unprotected endpoints on your mobile network.
THE CHALLENGE IS AN OPPORTUNITY.
Mobile service providers can establish a
competitive advantage by creating a secure
environment that protects customers’ data
and devices, building superior trust with their
users in comparison to other service providers.
A CASINO FOUND OUT the hard way that the internet of things is a
jackpot for attackers. By tapping into the smart thermometer that
controls the temperature of the water in the lobby aquarium, hackers
went on a shing expedition in the casino’s network and landed its
database of high-end clients.
SOMETHING’S
FISHY HERE
00 INTRODUCTION
EVOLVING MOBILE NETWORK SECURITY NEEDS IN THE AGE OF IOT AND 5G | 4
01
How Did We Get Here?
The Evolving Network Security Environment
剩余35页未读,继续阅读
资源评论
cjy_行业报告
- 粉丝: 57
- 资源: 1276
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功