Security Transition from 4G to 5G - Are We Secure Enough?

Security Transition from 4G to 5G - Are We Secure Enough?

BruCON Security Conference via YouTube Direct link

Introduction

1 of 41

1 of 41

Introduction

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Security Transition from 4G to 5G - Are We Secure Enough?

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Why WiFi is important
  3. 3 The problem with WiFi
  4. 4 Service Base Architecture
  5. 5 What makes this situation complicated
  6. 6 Cloud security principles
  7. 7 Use case of 5G
  8. 8 Greek wiretapping scandal
  9. 9 The problem of scope
  10. 10 The problem of Co Network
  11. 11 Snowden
  12. 12 MC catcher
  13. 13 Capabilities
  14. 14 Radio Capabilities
  15. 15 Registration
  16. 16 Setup
  17. 17 MNMap
  18. 18 Mobile Networks
  19. 19 Saving capabilities
  20. 20 Fingerprints
  21. 21 Who is BruCON
  22. 22 Supported devices
  23. 23 common fingerprints
  24. 24 two GPS
  25. 25 SIM cards
  26. 26 Maninthemiddle attack
  27. 27 Modifications
  28. 28 Security Mode
  29. 29 Live Networks
  30. 30 Why is this happening
  31. 31 Power Saving Mode
  32. 32 Battery Life
  33. 33 Location Tracking
  34. 34 Authentication
  35. 35 Security improvements
  36. 36 MC Cache
  37. 37 Sequence Number
  38. 38 Targeted Attack
  39. 39 Core Network
  40. 40 NATO Report
  41. 41 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.