Cybersecurity Risks of 5G – And How to Control Them
eSecurity Planet
SEPTEMBER 1, 2021
To be successful, an attacker must gain access to the 5G Service Based Architecture. From there, the risks posed are data access and a DoS attack on other network slices. Together, the report outlines established 5G threat vectors and threat scenarios for 1) policy and standards, 2) supply chains, and 3) 5G system architectures.
Let's personalize your content