Tips For: 5G Network Slicing cover art

Tips For: 5G Network Slicing

Security Considerations for Design, Deployment, and Maintenance

Preview

Get 30 days of Standard free

£5.99/mo after trial. Cancel monthly.
Try for £0.00
More purchase options
Buy Now for £10.62

Buy Now for £10.62

About this listen

The Enduring Security Framework1 established a working panel comprised of government and industry experts and conducted an in-depth review of the fifth-generation technology for broadband cellular networks standalone network slicing network architecture. This panel assessed the security, risks, benefits, design, deployment, operations, and maintenance of a 5G standalone network slice over two papers: Parts 1 and 2.

The working panel published in Potential Threats to 5G Network Slicing2, which identifies some 5G network slicing threat vectors that pose significant risks to network slicing and serves as Part 1.

This document is Part 2 of the two-part series: it focuses on addressing some identified threats to 5G SA network slicing, and provides industry recognized practices for the design, deployment, operation, and maintenance of a hardened 5G standalone network slice(s).

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2023 Tom Brooks (P)2023 Tom Brooks
Security & Encryption Technology Computer Security
No reviews yet