January 22, 2014

The 7 Deadly Threats to 4G


As carriers deploy wireless Internet technologies to enable long term evolution (LTE) networks, attackers can use old Internet techniques to new effect through these broadband data services, targeting mobile devices and infrastructure.

Devices are the most obviously vulnerable aspect of the 4G network--the weakest link. However, LTE also introduces new "weak links" throughout carrier infrastructure, as well as greater bandwidth and newly connected devices to exploit.

This paper describes what operators must do now to harden their nascent LTE infrastructure, to mitigate risk, gain operational efficiencies, and maximize potential revenue--offering a detailed review of seven threats that take on unique profiles within 4G networks and a security reference architecture to efficiently counter these threats.

  • Download Paper
  • More resources from McAfee


  • Get E-News and Notices via Email


      

     



      

    I accept Webtorials' Terms and Conditions.

    Featured Sponsor Microsites






















    Recent Tweets

    Archives

    Notices

    Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at https://www.webtorials.com/Sonus_logo.jpgreg/.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

    Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2015, Distributed Networking Associates, Inc.