๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Securing 5G and Evolving Architectures

โœ Scribed by Pramod Nair


Publisher
Addison-Wesley Professional
Year
2021
Tongue
English
Leaves
806
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


SECURING and EVOLVING ARCHITECTURES



5G initiates a period of technological evolution where the benefits transcend faster data download speeds and enable services that will change the way we all live and consume technology. Leveraging 5Gโ€™s openness, a new developer ecosystem is building breakthrough services that billions of people will consume, delivering immense value to enterprises and subscribers alike. For 5G to achieve its potential, organizations must embrace multi-layered security that goes far beyond 3GPP specifications. Now, leading security architect Pramod Nair helps network professionals climb the steep learning curve associated with securing 5G, fully understand its threat surfaces, systematically mitigate its risks, and maximize the value of their security investments.



This coherent, pragmatic, and vendor-agnostic guide will help you plan for security from the outset, make better choices throughout the lifecycle, and develop the mindset needed to secure new generations of networks. Youโ€™ll fi nd all you need: from high-level 5G security concepts to in-depth coverage of specific security controls, end-to-end architectural guidance, 5G security use cases, and cutting-edge โ€œquantum proofing.โ€ Throughout, practical examples and real-life scenarios help you apply Nairโ€™s insightsโ€•whether youโ€™re a service provider, an enterprise, an industry vertical, a startup, a cybersecurity vendor, a systems integrator, or even in a defense environment.



Securing 5G and Evolving Architectures is for technical and management audiences at all levels of 5G experience--from enterprise and security architects to network engineers, cloud computing and data center professionals, to CSO and CTO teams.



  • Explore new 5G security challengesโ€•and why you still need external controls, even with recent 3GPP improvements
  • Implement network component security controls for RAN, Transport, 5GC, and devices
  • Safeguard Multi-Access Edge Compute (MEC), SDNs, virtualized 5G cores, and massive IOT
  • Protect Public and Non-Public Networks (Private 5G) deployment scenarios
  • Secure Critical Infrastructure, Vehicle to Everything (V2X), and Smart Factory use cases
  • Optimize end-to-end 5G security architecture across all 5G domains based on zero trust
  • Prioritize 5G security investments in service provider or enterprise environments
  • Preview emerging 5G use cases and ML/AI-based security enhancements


โœฆ Table of Contents


Title Page
Copyright Page
Dedication Page
Contents
Table of Contents
Foreword
Preface
Acknowledgments
About the Author
Part I: Evolution of Cellular Technologies to 5G: Security Enhancements and Challenges
Chapter 1. Evolution from 4G to 5G
Mobile Network Evolution from 4G to 5G
5G New Radio Features
Disaggregated Architecture
Key 5G Features in 3GPP Releases
Key 5G Advanced Features
Summary
Acronym Key
References
Chapter 2. Deployment Modes in 5G
5G NSA and SA Deployments
5G Time-Sensitive Networks
5G Local Area Networkโ€“Type Service
Private 5G/Non-Public Networks
Summary
Acronym Key
References
Chapter 3. Securing 5G Infrastructure
3GPP 5G Security Enhancements
Security Challenges in 5G
Summary
Acronyms Key
References
Part II: Securing 5G Architectures, Deployment Modes, and Use Casesโ€
Chapter 4. Securing RAN and Transport Deployments in 5G
5G RAN and Transport Threats
Securing 5G RAN and Transport
Real Scenario Case Study: Examples of Threat Surfaces and Their Mitigation
Summary
Acronym Key
References
Chapter 5. Securing MEC Deployments in 5G
Service Provider Network-Based MEC
Enterprise Network-Based MEC
MEC Deployment Models
Threat Surfaces in 5G MEC Deployments
Securing 5G MEC
Real Scenario Case Study: MEC Threats and Their Mitigation
Summary
Acronym Key
References
Chapter 6. Securing Virtualized 5G Core Deployments
A Brief Evolution of Virtualization in Telecommunications
Threats in Virtualized 5G Packet Core Deployments
Securing Virtualized 5G Packet Core Deployments
Real Scenario Case Study: Virtualized 5GC Threats and Mitigation
Summary
Acronym Key
References
Chapter 7. Securing Network Slice, SDN, and Orchestration in 5G
Network Slicing and Its Enablersโ€”SDN and Orchestration
Threat Surfaces in 5G Network Slice, SDN, and Orchestration Deployments
Mitigation of Threats
Real Scenario Case Study: Threats in the 5G Network Slice, SDN, and Orchestration Deployments and Their Mitigation
Summary
Key Acronyms
References
Chapter 8. Securing Massive IoT Deployments in 5G
Massive IoTโ€“Based Threats in 5G
Securing mIoT Deployments in 5G Networks
Real Scenario Case Study: mIoT Threats and Their Mitigation
Summary
Key Acronyms
References
Chapter 9. Securing 5G Use Cases
Secure 5G Smart Factory and Manufacturing
Critical Infrastructure
5G Vehicle-to-Everything (5G-V2X)
Standards and Associations
Summary
Key Acronyms
References
Part III: End to End 5G Security Architecture and Prioritizing Security Investments
Chapter 10. Building Pragmatic End-to-End 5G Security Architecture
Foundations of 5G Security
Key Tenets of 5G Security Architecture
Summary
Acronyms Key
References
Chapter 11. Prioritizing 5G Security Investments
Method of Prioritizing Security Controls
Summary
Acronyms Key
References
Part IV: Emerging Discussions
Chapter 12. 5G and Beyond
Adoption and Adaptability of 5G and Evolving Technologies
Convergence of Wi-Fi and Evolving Cellular Technologies
Use of AI and ML in Securing 5G and Evolving Networks
Crypto Agility in 5G and Evolving Technologies
Summary
Acronym Key
References


๐Ÿ“œ SIMILAR VOLUMES


Securing 5g and Evolving Architectures
โœ Pramod Nair ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Addison-Wesley Professional ๐ŸŒ English

This practical guide employs real-world use cases and deployment methods to address the threat vectors and mitigation techniques to secure 5G networks. 5G is a disruptive technology not only because it has the potential to support millions of devices at ultrafast speeds, but also because it has the

From 5G to 6G: Technologies, Architectur
โœ Abdulrahman Yarali ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Wiley ๐ŸŒ English

From 5G to 6G Understand the transition to the sixth generation of wireless with this bold introduction The transition from the fifth generation of wireless communication (5G) to the coming sixth generation (6G) promises to be one of the most significant phases in the history of telecommunicat

From 5G to 6G: Technologies, Architectur
โœ Abdulrahman Yarali ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Wiley-IEEE Press ๐ŸŒ English

<span>From 5G to 6G</span><p><span>Understand the transition to the sixth generation of wireless with this bold introduction</span></p><p><span>The transition from the fifth generation of wireless communication (5G) to the coming sixth generation (6G) promises to be one of the most significant phase

Security Issues in Fog Computing from 5G
โœ Chintan Bhatt, Yulei Wu, Saad Harous, Massimo Villari ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Springer ๐ŸŒ English

<span>The book provides an examination of how fog security is changing the information technology industry and will continue to in the next decade. The authors first discuss how fog enables key applications in wireless 5G, the Internet of Things, and big data. The book then presents an overview of f