欢迎来到第壹文秘! | 帮助中心 分享价值,成长自我!
第壹文秘
全部分类
  • 幼儿/小学教育>
  • 中学教育>
  • 高等教育>
  • 研究生考试>
  • 外语学习>
  • 资格/认证考试>
  • 论文>
  • IT计算机>
  • 法律/法学>
  • 建筑/环境>
  • 通信/电子>
  • 医学/心理学>
  • ImageVerifierCode 换一换
    首页 第壹文秘 > 资源分类 > DOCX文档下载
    分享到微信 分享到微博 分享到QQ空间

    【研报】《GSMA移动通信安全现状(GSMAMobileTelecommunicationsSecurityLandscape)》.docx

    • 资源ID:1221730       资源大小:314.22KB        全文页数:20页
    • 资源格式: DOCX        下载积分:5金币
    快捷下载 游客一键下载
    账号登录下载
    三方登录下载: 微信开放平台登录 QQ登录
    下载资源需要5金币
    邮箱/手机:
    温馨提示:
    快捷下载时,如果您不填写信息,系统将为您自动创建临时账号,适用于临时下载。
    如果您填写信息,用户名和密码都是您填写的【邮箱或者手机号】(系统自动生成),方便查询和重复下载。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP,免费下载
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    【研报】《GSMA移动通信安全现状(GSMAMobileTelecommunicationsSecurityLandscape)》.docx

    ContentsGSMACTOForeword1GSMAFraudandSecurityGroupChair2Chair,GSMAFraudandSecurityGroup&CEOxCopperHorse1.td21.KeyPoints31. Introduction53. AttacksonOperators7Ana1.ysis84. Attacksonvirtua1.isedinfrastructure10Ano1.ysis105. Supp1.yChains12Anctysis126. G1.oba1.Tit1.eAbuseandInterconnect14Anctysis15Ma1.ware&Ransomware16Anctysis178. Spyware18Anctysis189. Mobi1.eAppSecurity20Ana1.ysis21ID.NewandRepackagedFraudTypes22Anotysis23I1.Theemergingsecurityoperatingcontext24AForward1.k26Summary2911Fina1.thoughts30GSMAMobi1.eTQieCoEmUn心tkonsSecurityUndscapeGSMACTOForewordAs5Gusagegatherspaceinbothconsumerandenterprisesettings,itsbenefitswi1.1.spreadacrosstheg1.oba1.economy.Wereachedmorethan1.4bi1.1.ion5Gconnectionswor1.dwideattheendofQ32023.And,today,over270mobi1.eoperatorsinmorethan100marketshave1.aunchedcommercia1.5Gservices.5Gmobi1.econnectivityisexpectedtoaddnear1.y$1tri1.1.iontotheg1.oba1.economyby2030zwitha1.mostha1.fofthiscomingfromnewenterpriseservicesandapsracrosssectorsinc1.udingfinance,hea1.thcare,andeducation.5Gnetworksdefcveraspartofomu1.tigenerationa1.evo1.utionofmobi1.einfrastructure.2G,3Gond4Gnetworkscontinuetode1.iverservicesacrosstheg1.obeondsuchconnectivitybecomesevermorefundamenta1.toourdai1.y1.ives.Assuch,thecybersecurityofthosenetworksisafundamenta1.techno1.ogyenob1.efthatisincreasing1.ymandatedbygovernmentsandrequiresconstantscrutinyandinvestmenttokeeppacewiththechangingthreatnaturedescribedinthis,andpreviousGSMAmoWete1.ecommunicationsecurity1.andscapereports.Thisthreat1.andscapereportp1.aysakeyro1.eincommunicatingtheongoing,evo1.vingandesca1.atingnatureofthethreatsfacingorindustry.Important1.y,thereportdrw5onbothpub1.icsourcesandreportsfromwithintheGSMAsecuritycommunity.Pieosetakethetimetoreadthisreportandgetinvo1.vedinourteamefforttoincreasetheprotectionofoperatordep1.oyedtechno1.ogyandinfrostrcture,customeridentity,securityandprivacy.ExistingGSMAmemberscancontinuetocontributetooursecurityworkandareencouragedIoapp1.yGSMAsecurityguide1.inesandfecom11>endotionswithintheirbusinesses.Oefogetinvo1.ved:theycondosobyjoiningtheGSMA.whichwi1.1.ensureaccesstoobreadthofsecurityodviceandbestpractices.GSMAFraudandSecurityGroupChairThepastyearhasbeenanothereventfu1.oneinthemobi1.esecuritywor1.d.Conf1.ictsaroundtheg1.obehaveoftenfocusedonte1.ecomstechno1.ogiesandservices,eitherasadirecttargetorasaroutetoanothertarget.Inaddition,crimina1.attackscanandhavebeendevastating;ransomwareisaconstantanxietyandthetechniquesforcompromisingbusinesseshavebecomeincreasing1.yeffective,oftenfocusingonindividua1.emp1.oyeesandsocia1.engineering.TocircumventdefensivemeasuresOttackersoftenseektocompromiseotherpartsofthesupp1.ychainandabusethetrustre1.ationshipsbetweenorganisations.Thisissomethingthatwe,1.1.needtocontinuetoaddressasanindustry,a1.ongwithothersupp1.ychainconsiderationssuchasdea1.ingwithdep1.oyed,commonvu1.nerabi1.itiesinsoftware1.ibrariesinaneffectiveandswiftmannersuchthattheexposureofattacksurfacesisminima1.WecontinuetoseeIorgeamountsoffraudg1.oba1.1.y.usingmanydifferenttechniques.Ina1.mosta1.1.ofthese,inc1.udingwheresocia1.engineeringbinvo1.ved,thereareunder1.yingtechnica1.VuInerabiStiesthathavebeendiscoveredandthenexp1.oitedassomepartoftheattackchain.Ourindustryneedstoensurethat!heinfe1.1.igenceaboutnewand©mergingfraudsissharedanddisseminatedquick1.yandmostimportant1.y-acteduponJnordertoeffective1.ytakethefighttothefraudsters,1.eavingthemveryfett1.eopportunitytoexp1.oitsystemsandsubscribers.Ourjobindefendingagainstthethreatstomobi1.eiswhatIca1.1.the'JanusproWem,.WearerequiredIoboth1.ookbackata1.1.th©1.egacysystemsthatweneedfoprotectagainsto1.dandnewattacks,buta1.sofo100kforwardandprotectnew5Gnetworksthatarebeingdep1.oyed,wi1.ethinkingaboutWhaifuturenetworksecurity1.ooks1.ikeandwhatattackswemayface.Akeyareaoffocusthisyearforuswasaddressingcommercia1.spywarevectors,whichoftenuseacombinationofo1.dandnewtechno1.ogies.Wewi1.1.continuetoidentifythetechniques,tacticsandproceduresofthesethreatactorsinordertomokethemobi1.enetworkohosti1.eenvironmentforthemtooperatewithin.Thereisonincreasingrecognitionoftheimportanceofmobi1.ete1.ecomssecurityinprotectingcritica1.systemsandtheconsequencesoffaureforindividuatethroughtobusinesses.Thesecurityactionsthatwe,vetakenasanindustryandtherecommendationsthatwehavedeve1.opedarebothmirroredin,andinformcybersecuritypo1.icydeve1.opmentbygovernmentsoroundthewor1.d.Thereisabroadcommitmentbyoi1.tomeetthecha1.1.engesfaced,butitisa1.sogettingmoreonerousforbusinesseswhomaynothavetheresourcestofixa1.1.themanyissues,particu1.ar1.ywith1.egacytechno1.ogies.Thiscanseemanimpossib1.echa1.1.enge,howevertheseprobtemswi1.1.notgoawayandthereisnohidingfromattack-theymustbeaddressed.TheGSMAFraudandSecurityGroup(FASG)Imunityofexpertsinmobi1.etechno1.ogiesthotconhe1.pyourcompany,sop1.easejoinUSandgetinvo1.ved.IDavidRogersMBEChai

    注意事项

    本文(【研报】《GSMA移动通信安全现状(GSMAMobileTelecommunicationsSecurityLandscape)》.docx)为本站会员(p**)主动上传,第壹文秘仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知第壹文秘(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2023 1wenmi网站版权所有

    经营许可证编号:宁ICP备2022001189号-1

    本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。第壹文秘仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知第壹文秘网,我们立即给予删除!

    收起
    展开