As carriers deploy wireless Internet technologies to enable long term evolution (LTE) networks, attackers can use old Internet techniques to new effect through these broadband data services, targeting mobile devices and infrastructure.
Devices are the most obviously vulnerable aspect of the 4G network--the weakest link. However, LTE also introduces new "weak links" throughout carrier infrastructure, as well as greater bandwidth and newly connected devices to exploit.
This paper describes what operators must do now to harden their nascent LTE infrastructure, to mitigate risk, gain operational efficiencies, and maximize potential revenue--offering a detailed review of seven threats that take on unique profiles within 4G networks and a security reference architecture to efficiently counter these threats.
Trending Discussions