Publication date:December 14, 2020
Beyond the changes described above, some additional elements have been taken into account. Firstly, implementation/migration options of a gradual migration to 5G from 4G have been taken into account. Secondly, security issues of operational processes have been considered. These two changes enlarge the scope of the assessment and include important parts for the enhancement of operational security. For all these new elements, this report provides a vulnerability analysis, indicating how these vulnerabilities can be exploited through cyberthreats and how this exploitation can be mitigated through security controls. The assessed vulnerabilities are consolidated from various sources, including main 5G standardisation documents and telecommunication best practices (3GPP, ITU, ETSI, ISO, NIST and GSMA).
Search related content with: Cyber Threat Analysis 5G Threats