Demystifying 5G Security through Threat Modeling
Zhijun Zhang, Lead Security Architect, The World Bank Group
5G promises to bring much faster data rate and many new services. At the same time it has created a lot of concerns around security risks. This talk will walk through the new technology components in a 5G network and the new services it provides, to comprehensively analyze the risks in this ecosystem through a threat model the World Bank Group developed and to discuss the mitigating controls.Pre-Requisites: Understanding of Threat models such as STRIDE.
Видео Demystifying 5G Security through Threat Modeling канала RSA Conference
5G promises to bring much faster data rate and many new services. At the same time it has created a lot of concerns around security risks. This talk will walk through the new technology components in a 5G network and the new services it provides, to comprehensively analyze the risks in this ecosystem through a threat model the World Bank Group developed and to discuss the mitigating controls.Pre-Requisites: Understanding of Threat models such as STRIDE.
Видео Demystifying 5G Security through Threat Modeling канала RSA Conference
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
OWASP Based Threat Modelling: Creating A Feedback Model In An Agile Environment - Chaitanya BhattSecurity and Privacy for the 5G Core NetworkNew Vulnerabilities in 5G NetworksUntangling SaaS Security in the EnterpriseFeds Fighting Ransomware: How the FBI Investigates and How You Can HelpWhat Does Cyber-Insurance Really Bring to the Table and…Are You Covered?Detection of Advanced Attacks with a CPU Level Sandbox TechnologyDeploying Container Network Functions (CNF) on Kubernetes5G Protocol Vulnerabilities and Exploits - Roger Piqueras Jover (Shmoocon 2020)How Google Protects Its Corporate Security Perimeter without FirewallsDemystifying the 5G NR physical layerOrchestration and automation for 5G and the cloud4G to 5G Evolution: In-Depth Security PerspectiveA Framework to Effectively Develop Insider Threat ControlsBringing 5G mobile core to hyperscale cloud as a software serviceDITT #1 | The opportunities of 5G in RailSTRIDE+MS_TMTWebinar: 5G Security BriefingThe Five Most Dangerous New Attack Techniques and How to Counter Them