Tips For: 5G Network Slicing
Security Considerations for Design, Deployment, and Maintenance
Échec de l'ajout au panier.
Échec de l'ajout à la liste d'envies.
Échec de la suppression de la liste d’envies.
Échec du suivi du balado
Ne plus suivre le balado a échoué
0,99 $/mois pendant vos 3 premiers mois
Acheter pour 18,74 $
Aucun mode de paiement valide enregistré.
Nous sommes désolés. Nous ne pouvons vendre ce titre avec ce mode de paiement
-
Narrateur(s):
-
Tom Brooks
-
Auteur(s):
-
Cybersecurity National Security Agency
À propos de cet audio
The Enduring Security Framework1 established a working panel comprised of government and industry experts and conducted an in-depth review of the fifth-generation technology for broadband cellular networks standalone network slicing network architecture. This panel assessed the security, risks, benefits, design, deployment, operations, and maintenance of a 5G standalone network slice over two papers: Parts 1 and 2.
The working panel published in Potential Threats to 5G Network Slicing2, which identifies some 5G network slicing threat vectors that pose significant risks to network slicing and serves as Part 1.
This document is Part 2 of the two-part series: it focuses on addressing some identified threats to 5G SA network slicing, and provides industry recognized practices for the design, deployment, operation, and maintenance of a hardened 5G standalone network slice(s).
PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.
©2023 Tom Brooks (P)2023 Tom Brooks