Abstract
AbstractA mobile telecommunications network has arguably become a vital part of today’s critical communications infrastructure underpinning society’s interconnectedness. A mobile telecommunications network can be considered a critical communications infrastructure that has been built upon a complex set of network technologies. However, the migration in recent years from pre-5G to 5G network technologies has presented the mobile telecommunications network operators with not only several security-related challenges but also potential unfortunate risk exposure. A new approach called Control-Risk-Correctness (CRC) addresses the need for evaluating a complex mix of network technology and the associated trade-offs between security and risk. CRC simplifies the analysis by examining the mobile telecommunications network from the perspective of security control effectiveness and risk treatments. This article outlines the application of CRC when assessing a mobile telecommunication network and highlights direct risk mitigation treatments in an aim to increase security control effectiveness and decrease risk exposure. CRC usefulness will assist in the evaluation of existing networks and safeguarding new networks over the coming years.
Publisher
Springer Science and Business Media LLC
Subject
General Earth and Planetary Sciences,General Physics and Astronomy,General Engineering,General Environmental Science,General Materials Science,General Chemical Engineering
Reference45 articles.
1. Ahmad I, Kumar T, Liyanage M, Okwuibe J, Ylianttila M, Gurtov A (2018) Overview of 5G security challenges and solutions. IEEE Commun Stand Mag 2(1):36–43
2. Rosenblum A (2014) Mysterious phony cell towers could be intercepting your calls. Popular Science. Available at https://www.popsci.com/
3. Dabrowski A, Petzl G, Weippl E (2016) The messenger shoots back: network operator based IMSI catcher detection. In: International symposium on research in attacks, intrusions, and defenses. Springer, Cham, pp 279–302
4. Dabrowski A, Pianta N, Klepp T, Mulazzani M, Weippl E (2014) IMSI-catch me if you can: IMSI-catcher-catchers. In: Proceedings of the 30th annual computer security applications conference. ACM, pp 246–255
5. Koscher K, Ney P (2019) Seaglass application. Electronic Frontier Foundation. https://github.com/seaglass-project/seaglass-app
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献