Security for Mobile Operators in Practice
نویسنده
چکیده
Mobile operators are organizations that have to manage a great amount of critical information, including legal sensitive subscriber data. A number of assessment projects on the infrastructures of major mobile operators, revealed a number of vulnerabilities that if exploited may lead to important business impact. The scope of this paper is to publish these vulnerabilities towards the enhancement of security and privacy of mobile operators. A threat model was created, according to which countermeasures tailored to the specific environment of a mobile operator are proposed.
منابع مشابه
The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملThe Effect of Word-Of-Mouth Advertisements on the Responses of Clients (Case Study: Mobile Operators)
Customer reviews in social media contain valuable electronic word-of-mouth (eWOM) information of products, which facilitates firms’ business strategy and individual consumers’ comparison shopping. This study examined the effects of eWOM motivations on customers’ behavioral intentions in the Mobile operators setting. eWOM advertising is very important because nowadays many customer buying decisi...
متن کاملImproving Security Management for Mobile Operators
By Christos K. Dimitriadis, Ph.D., CISA, CISM Mobile operators are organizations that provide telecommunication services over a cellular interface. The mobile industry initially consisted of infrastructures that provided voice and very limited data services through mobile phones. Modern mobile operators provide a wide range of multimedia data services, including video-on-demand and mobile Inter...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 15 شماره
صفحات -
تاریخ انتشار 2013