SlideShare a Scribd company logo
1 of 14
Download to read offline
The wireless industry has baked security into our networks since the
beginning, and works diligently to continually update and build on our
security capabilities with every generation of wireless. Today’s 4G LTE
networks have the most advanced security features to date, and 5G will
further improve upon them.
As 5G networks start to be deployed this year, wireless providers are
leveraging new and advanced measures—after years of research, investment,
and contributions to standards bodies—to secure 5G networks. This paper
updates CTIA’s 2017 Protecting America’s Wireless Networks paper to feature
5G security highlights, including:
Enhanced privacy protections
5G networks offer enhanced privacy protections like the encryption
of each device’s IMSI, or unique user identifier. Industry is
implementing this update to further secure device-specific and
consumer-specific information as it moves on a 5G wireless
network.
The ability to leverage 5G “home” wireless network security
when roaming or on Wi-Fi
Wireless providers are extending the security of 5G wireless
networks to other networks—called home network control—when
a user is roaming or using a non-wireless network like Wi-Fi. This
1
2
Executive Summary
1 Protecting America’s Wireless Networks
Security moves
with device
Security moves
with device
Your Cellular Network Wi-Fi Network Other Cellular Network
use of home network security on all networks more thoroughly
protects devices, consumer data, and even the network itself at all
times.
Device-specific security updates
Wireless providers developed systems that will allow consumers to
receive new and advanced security technology updates meant for
their device type—referred to as providing native support for plug-
in security. Previous generations of wireless networks were only
able to support a one-size-fits-all approach.
Further enhancing security across the wireless ecosystem, wireless providers
are increasingly deploying network components that are virtual instead of the
hardware of years’ past. 5G’s virtual and cloud-based network systems allow
for more adaptable security since they can be quickly adjusted, removed, or
replaced using software, reducing the likelihood that an entire network would
be impacted by a cyberattack.
Strong cybersecurity is key to the U.S.’s global wireless leadership. 5G is going
to be up to 100 times faster, five times more responsive, and able to support
100 times more devices,1
unlocking innovations we can’t even imagine. For
the U.S. to continue to attract investment in the app economy, as well as the
virtual reality, artificial intelligence, and Internet of Things innovations of the
future, our networks must be secure at every turn. And that’s what our
industry works tirelessly to provide every day.
3
2 Protecting America’s Wireless Networks
Then Now
Update Updates
Security is Critical to
Everyone and Everything
Thanks to wireless, we’re more connected than ever.
Across the United States, more than 400 million wireless
connections join people and increasingly, every part of our world
together.2
These connections generate tremendous traffic over
wireless networks—since 2010, mobile data traffic has grown
over 40 times.3
We’re only going to grow more connected.
Tomorrow’s 5G networks will offer unparalleled speeds,
support a massive increase of IoT devices, and power
real-time connections with minimal delays in response,
enabling entirely new services and applications.
The Internet of Things—bringing broadband connectivity to
consumer and industrial devices, sensors, and objects—will usher
in increased productivity and growth across every economic
sector, from transportation and healthcare to public safety and
energy. The number of connected devices worldwide is
projected to total over 31 billion by 2023.4
Cyber threats are evolving.
Cyber threats continue to grow in number and sophistication,
with new risks and exploits to address. These threats are serious,
often launched by highly resourced intelligence services abroad,
organized criminal networks, and motivated entities seeking to
disrupt communications networks, here and around the world.
5G—Keeping America’s
Wireless Networks Secure
The entire wireless industry continues to innovate and
advance security—across networks, devices, operating
systems, and applications—as we move to 5G and implement
virtualized and software-defined networks.
Given the cyber threat landscape and how it evolves, wireless
network operators, device manufacturers, and operating
system (OS) and application service providers continue
Internet of Things
New opportunities for possible exploits by
hackers and cybercriminals have emerged
with the development of sensors, cameras,
meters, monitors, and other devices
that can be targeted—and exploited—by
hackers and other bad actors if core
network and mobile device protections are
insufficient.
3 Protecting America’s Wireless Networks
Rising Threats
leading-edge and risk-based management efforts that emphasize
security as an integral component of every generation of
technology. Today’s protections will continue to evolve over the
life of 5G and beyond.
Wireless Networks
5G will incorporate existing network protections as well as new
ones and leverage lessons learned from the IT industry, such as
the importance of mutual authentication techniques and multiple
layers of security throughout a system. These enhancements will
touch every cellular-capable device, given the growing
connectivity of our world through the proliferation of Internet of
Things (IoT) devices. 5G network defenses5
include:
• Using standards-based encryption algorithms for on-air
interfaces to prevent unauthorized access to
information over the air, including the encryption of a
device’s unique user identifier, called the International
Mobile Subscriber Identity (IMSI).
• Deploying authentication mechanisms that validate and
authorize the user seeking to access the network in
order to ensure that only legitimate people are
accessing the network. These mechanisms include
security anchor capabilities to authenticate and
improve security across disparate networks.
• Ciphering or coding data sent over the network to
ensure it is kept free from corruption and/or
modification.
• Deploying a robust set of anti-spamming software on
our networks to protect consumers from unsolicited
SMS/MMS messages, illegal robocalls, and unwanted
calls.
• Instituting strict access controls—physical and IT
access—to limit and monitor network resources as
protection against internal and external bad actors.
• Leveraging the flexibility of plug-in security schemes so
that security updates directed toward certain
devices can be sent to them and only them, avoiding
the performance issues caused by non-compatible
devices receiving these updates.
4 Protecting America’s Wireless Networks
Network Threats
Network Attacks
Attacks could be launched by leveraging
existing network protocols to execute
exploits.
Cloud Infrastructure
For instance, a Distributed-
Denial-of-Service (DDOS) attack could
use commandeered IoT devices to
overwhelm elements in the cloud
to restrict or deny the availability of
targeted online services.
Device Security is Key
Mobile Devices
Today, mobile devices are targets for cyberattacks. That’s why
mobile device manufacturers already build in a number of
security mechanisms that protect devices from cyber threats,
including:
SIM Cards
An integrated circuit for securely storing and authenticating
critical subscriber identity information, a SIM (Subscriber
Identification Module) card enables a secure and reliable voice
and data connection and the ability to provision new
applications and services remotely.7
Temporary Identities
To mitigate the risk of serial numbers being compromised,
networks use temporary identities that vary regularly, helping
prevent interception by unauthorized users.
Wireless Account Controls
To protect against unauthorized use, consumers can leverage
PINs and passwords to protect wireless provider account
information, multi-factor account controls to provide more
complex user authentication, and text or email notifications
regarding changes in account profiles or number porting
requests.
Roots-of-Trust
Built into mobile devices, this hardware-based cryptographic
information is used to detect malware and authenticate system
software integrity.
Anti-Theft Tools
The mobile industry’s voluntary anti-theft commitment provides
consumers the tools to locate, lock and wipe their device in the
event of theft or loss.8
Integrated Systems
Mobile devices will be able to leverage 5G’s advanced
authentication and encryption algorithms to work in near
real-time with network security enhancements.
5 Protecting America’s Wireless Networks
Malware
Malware includes Trojan packages used
to target financial information and
ransomware6
that locks a user out of
their system until they pay for re-access.
Mobile Threats
These threats include attacks on mobile
applications, phishing attacks to install
malicious software, and attacks to trick
users to divulge access credentials such
as personal passwords or PINs.
Mobile Device Risks
Mobile OS/Apps
Mobile operating system providers like Android and iOS work
with application developers continuously to improve security
while screening for bad applications at app stores in order to
prevent the spread of viruses and malware. Operating system
providers and app developers will continue to advance software
that protects wireless devices and consumers, including:
Anti-Malware and Anti-Virus Software
This kind of software prevents, detects, and removes malware
from a user’s device.
Device Security
If a device is stolen or lost, personal and sensitive information
contained in the device can be rendered inaccessible to an
unauthorized user. Tools are provided to consumers for such
protection.
The wireless industry will use every tool to defend against cyber
threats.
Setting Cybersecurity
Standards
Standards
Wireless network security standards processes are
comprehensive and constantly evolving and improving. Driven
by industry participation, standards-setting and standards-
developing organizations are expanding global standards to
enable dynamic, resilient, and safe wireless networks that
counter security threats in a connected world. Key guidance-
setting organizations include the following:
3GPP, the main wireless standards-setting body, is
developing 5G security and privacy standards for the next
generation of wireless technologies, architectures and
protocols.11
3GPP is also developing several cryptographic
algorithms to enhance end-to-end security and providing for
ongoing enhancements to mobile cybersecurity. The new 5G
standards include items discussed throughout this paper, such
as increased home network control, a unified authentication
framework across cellular and non-cellular networks, native
support for the plug-in of new authentication schemes, security
6 Protecting America’s Wireless Networks
of Americans report having the
ability to remotely locate, lock, and
erase their smartphones.9
of consumers use PINs/passwords on
their smartphones, an increase of 54%
from five years ago.10
Consumer Security
Trends
anchor capabilities to re-authorize devices as they move across different
networks, and IMSI encryption for enhanced privacy protections.
IETF is developing security requirements for network protocols for end-to-end
device security and the IoT.12
These efforts build on several successful security
protocols and standards IETF has developed, such as IP Security, Transport
Layer Security, and Simple Authentication and Security Layer.
ETSI is responsible for the standardization of cybersecurity standards
internationally and for providing a center of relevant expertise for information
and communications technologies, including mobile. The standards include
global encryption technologies and algorithms to support integrity,
authentication, and privacy.
National Institute of Standards and Technology (NIST) is a U.S. standards
body responsible for setting guidance for government agency conduct. CTIA
and its members collaborate with NIST to share best practices and further
refine an industry-driven methodology called the Cybersecurity Framework
which helps companies assess and manage cybersecurity risks and outcomes.
CTIA’s Cybersecurity Working Group brings together cybersecurity and
policy experts from service provider, manufacturer, wireless data, internet,
and application companies to develop best practices, common frameworks,
and educational materials for consumers. The members work with the
Department of Homeland Security (DHS), the Federal Communications
Commission (FCC), the National Telecommunications and Information
Administration (NTIA), and NIST, as well as with Congress to enhance technical
and policy approaches to cybersecurity in the U.S.
GSMA, a global trade association, leverages the contributions of its many
members around the globe to share best practices for security management
in mobile networks.
Network Security and Monitoring
Tools are Key
Wireless Radio Access Network
The radio access network (RAN) provides the radio communications between
the mobile and the core network. The base station provides the air-interface
radio connection between the mobile device and core network, performs
mobility and handover, and ensures good performance and allocation of
shared radio resources.
7 Protecting America’s Wireless Networks
To prevent intruders from eavesdropping, wireless network operators equip
their RAN with features that ensure the security of the radio communications
functions and their connection to the core network. Specifically, RAN security
features include:
Mutual Authentication Functions
To detect and prevent “spoofing,” these functions use an Authentication and
Key Agreement protocol between the mobile device and the RAN allowing
the device to authenticate the network, and the network to authenticate the
device.13
IPSec Encryption
This protocol allows the RAN to encrypt communications between the
back-haul connections and the core network and also detect and mitigate
unauthorized access, helping ensure proper radio access and prevent denial
of service attacks.
Access Controls
These tools enable the detection of unauthorized access to RAN resources and
the ability to deny access if appropriate.
Wireless Core Network
The 4G LTE core network consists of data gateways or routers, mobility
management platforms, policy and billing, and the home subscriber database.
The data gateways and major routing platforms carry IP traffic from many
connected devices through the core network and out to cloud services or the
Internet. 5G networks will build on the core network used by 4G LTE networks,
called an Enhanced Packet Core (EPC), to interpret and route data. Initial 5G
networks will adapt EPC capabilities to the changing threat landscape.
8 Protecting America’s Wireless Networks
5G Network Security
Access &
Mobility Manager
Session Manager
Authentication
Center
Gateway
Policy Control
Core
5G
Internet
RAN
5G networks will be able to support interoperability between
the Enhanced Packet Core and future advanced Core
(NextGen) networks as they come online. This flexibility is key
to rapid 5G deployment and allows providers to scale security
quickly using a known, but adaptable core network system.
To monitor, guard, and protect the core platforms and
subscriber databases against denial of service attacks or the
threat of a stolen master key, wireless operators deploy a
number of tools, including:
• Firewalls that block certain types of network traffic,
forming a barrier between a trusted and untrusted
network—analogous to a physical wall that blocks
and isolates the spread of an attack.
• Intrusion detection and prevention systems that
monitor network activities for malicious activity—
helping identify the activity, record information
about it, and block or stop it.
• Malware monitoring and detection to target hostile
or intrusive software, including computer viruses,
worms, Trojan horses, ransomware, spyware,
adware, scareware, and other malicious programs.
• Virtual Private Networks that enable traffic to be
sent through a secure connection, isolating that
traffic from other devices on intermediate
networks. Capable of connecting individual
users to a remote network, application or multiple
networks, VPNs require authentication for remote
access and use encryption techniques.
• Machine learning and artificial intelligence that
detect anomalous behavior and automatically
mitigate attacks.
Core network elements are highly secure functions in terms
of physical security and access controls, requiring gated
facilities, guards, secure card entry, sophisticated login/
password controls, and other security measures. Not only are
security functions a high priority, the core network is
managed by trained and specialized personnel who are
security and risk management experts.
LTE
EPC
Evolution
5G Interoperability
9 Protecting America’s Wireless Networks
4G Operability
LTE
EPC
5G NR
5G
5G with NextGen Core
NextGen/5G Core
LTE
EPC
5G NR
5G
4G
Virtualizing 5G Networks
Whether running apps, storing data, or delivering services, the cloud—a
network of servers—has proven popular and efficient for delivering provider
grade text messaging, social networking, banking, ecommerce, and mobile
health applications. These servers and the mobile applications and services
they enable have become a target for new threats. This matters because the
all-IP architecture and openness of the internet provides broad and diverse
entry points for an attack on a mobile network.
As network functions become virtualized, often referred to as Network
Functions Virtualization (NFV) and Software Defined Networking (SDN), cloud-
based security is deployed by network providers to ensure the security of their
networks against threats. Cloud-based security systems will support:
• Secure interconnection and transport from the core network out to
the cloud and internet
• Mutual authentication techniques to continually authenticate a
device and the network connection
• Features that limit and monitor the number of
entry points into the mobile network
10 Protecting America’s Wireless Networks
Secure 5G Virtualization
4G Security
5G Security
• Highly secure communication between links of a network
• Localized security tied to virtualized network functions
• Distributed functions, making cloud systems more difficult to attack
• Data-driven elements that can detect and clean malware or other
threats that enter the system and replace compromised functions
virtually—all in seconds.
Policies to Secure the Next
Generation of Wireless
Wireless companies monitor, protect, diagnose, and fight potential
cyberattacks in real time, and that’s why policymakers should promote
flexible, technology-neutral solutions and focus on cyber threat information
sharing with appropriate liability protections for today’s 4G LTE and
tomorrow’s 5G networks.
To ensure we can continue to innovate as fast as cyber threats do, we need
voluntary, collaborative, industry-led efforts—avoiding mandates that quickly
become outdated. While many federal agencies have roles to play, the
Department of Homeland Security is critical in convening industry and
government stakeholders to work together toward a common framework to
address cybersecurity.
We urge policymakers to continue collaborating with the wireless industry on
important and complex 5G security issues in order to encourage actions that
can be taken in standards groups and other organizations. As 5G is deployed,
flexibility is critical to meeting the challenge of protecting our networks and
our consumers against the dynamic global threat landscape.
Acknowledgements
John Marinho, VP Technology and Cybersecurity
Thomas Sawanobori, SVP and Chief Technology Officer
Kevin Ryan, Assistant Vice President, Communications and Policy
Katherine Den Boer, Director, Communications and Policy
11 Protecting America’s Wireless Networks
Endnotes
1. The Wireless Industry: An American Success Story, CTIA, https://www.ctia.org/the-wireless-
industry/wireless-industry.
2. Id.
3. 5G networks will be 10 times faster than 4G networks, respond five times as quickly, and
connect 100 times the number of devices. Thomas K. Sawanobori, CTIA, The Next
Generation of Wireless: 5G Leadership in the U.S., at 5 (Feb. 9, 2016), at www.ctia.org/docs/
default-source/default-document-library/5g-white-paper.pdf.
4. Ericsson Mobility Report 2018, at 16 (June 2018), at https://www.ericsson.com/assets/local/
mobility-report/documents/2018/ericsson-mobility-report-june-2018.pdf.
5. The Sector Annual Report (SAR) is filed with DHS and highlights a more comprehensive
description of the actions and capabilities that the mobile industry deploys to protect
networks and consumers from threats and bad-actors, at https://www.dhs.gov/keywords/
sector-annual-report.
6. Ransomware is malware that installs itself on a mobile device without the knowledge of the
user and extorts payment once device information is locked, usually encrypted, and held
hostage in exchange for a ransom payment.
7. Manufacturers limit access to SIM cards to minimize risks from the challenges of the
application ecosystem.
8. Smartphone Anti-Theft Voluntary Commitment, CTIA (2016), at https://www.ctia.org/
the-wireless-industry/industry-commitments/smartphonea-anti-theft-voluntary-
commitment; Capabilities that the wireless industry deploys to protect networks and
consumers from threats and bad actors.
9. CTIA commissioned Harris Poll to conduct these surveys. Four such surveys have been
conducted since 2012. An online survey was conducted Feb. 19-31, 2017, using a sample from
the Harris Poll Panel of 1,007 U.S. adults who own and use a smartphone and/or tablet. A
supplemental survey of 1,690 smartphone owners was conducted the week of March 6, 2017.
A full methodology is available upon request.
10. Id.
11. SA3 – Security, 3GPP, http://www.3gpp.org/specifications-groups/sa-plenary/sa3-
security#term0_1 (last visited Jun. 11, 2018).
12. See e.g., Best Current Practices for Securing Internet of Things (IoT) Devices, IETF, https://
datatracker.ietf.org/doc/draft-moore-iot-security-bcp/ (last visited Jun. 11, 2018).
13. Such authentication functions include SNOW 3G (designed by Lund University, Sweden), and
the Clock cipher standard (NIST, USA), or Stream cipher.
12
Protecting Americas Next Generation Networks

More Related Content

What's hot

The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Shawn Nutley
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Ekonomikas ministrija
 
Security and Your Business
Security and Your BusinessSecurity and Your Business
Security and Your BusinessAll Covered
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Amrit Chhetri
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPaloAltoNetworks
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docxAmir Khan
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAAharon Aharon
 
Survey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetSurvey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetijctet
 
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...ijtsrd
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldWTHS
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information securitySsendiSamuel
 

What's hot (20)

The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Security and Your Business
Security and Your BusinessSecurity and Your Business
Security and Your Business
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity Predictions
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Mobile security
Mobile securityMobile security
Mobile security
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
 
Survey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetSurvey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manet
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile world
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information security
 

Similar to Protecting Americas Next Generation Networks

Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network securityAnkit Anand
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443WoMaster
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
 
A survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsA survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsKavita Rastogi
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdfonline Marketing
 
A Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless NetworksA Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless NetworksScott Bou
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docxlorainedeserre
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlockArmour1
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environmentIBM Software India
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...Clifton M. Hasegawa & Associates, LLC
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber lawDivyank Jindal
 

Similar to Protecting Americas Next Generation Networks (20)

Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
A survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsA survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systems
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
A Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless NetworksA Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless Networks
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for Telcom
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environment
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 

More from Digital Policy and Law Consulting

Best Practices for 5G Transformation - Key Findings from the Nokia 5G Maturit...
Best Practices for 5G Transformation - Key Findings from the Nokia 5G Maturit...Best Practices for 5G Transformation - Key Findings from the Nokia 5G Maturit...
Best Practices for 5G Transformation - Key Findings from the Nokia 5G Maturit...Digital Policy and Law Consulting
 
Community Networks in Latin America: Challenges, Regulations and Solutions
Community Networks in Latin America: Challenges, Regulations and SolutionsCommunity Networks in Latin America: Challenges, Regulations and Solutions
Community Networks in Latin America: Challenges, Regulations and SolutionsDigital Policy and Law Consulting
 
Improving mobile broadband quality of service in low and middle income countries
Improving mobile broadband quality of service in low and middle income countriesImproving mobile broadband quality of service in low and middle income countries
Improving mobile broadband quality of service in low and middle income countriesDigital Policy and Law Consulting
 
State of Broadband: Broadband catalyzing sustainable development 2018
State of Broadband: Broadband catalyzing sustainable development 2018State of Broadband: Broadband catalyzing sustainable development 2018
State of Broadband: Broadband catalyzing sustainable development 2018Digital Policy and Law Consulting
 
Broadband for national development if four ICDc: Cambodia Rwanda, Senegal and...
Broadband for national development if four ICDc: Cambodia Rwanda, Senegal and...Broadband for national development if four ICDc: Cambodia Rwanda, Senegal and...
Broadband for national development if four ICDc: Cambodia Rwanda, Senegal and...Digital Policy and Law Consulting
 

More from Digital Policy and Law Consulting (20)

CTIA 2019 Annual Survey Highlights
CTIA 2019 Annual Survey HighlightsCTIA 2019 Annual Survey Highlights
CTIA 2019 Annual Survey Highlights
 
Best Practices for 5G Transformation - Key Findings from the Nokia 5G Maturit...
Best Practices for 5G Transformation - Key Findings from the Nokia 5G Maturit...Best Practices for 5G Transformation - Key Findings from the Nokia 5G Maturit...
Best Practices for 5G Transformation - Key Findings from the Nokia 5G Maturit...
 
Tv audiences report 2019.pdf
Tv audiences report 2019.pdfTv audiences report 2019.pdf
Tv audiences report 2019.pdf
 
The State of Mobile Network Experience - Open Signal
The State of Mobile Network Experience - Open SignalThe State of Mobile Network Experience - Open Signal
The State of Mobile Network Experience - Open Signal
 
Ericsson Mobility Report June 2019
Ericsson Mobility Report June 2019Ericsson Mobility Report June 2019
Ericsson Mobility Report June 2019
 
Community Networks in Latin America: Challenges, Regulations and Solutions
Community Networks in Latin America: Challenges, Regulations and SolutionsCommunity Networks in Latin America: Challenges, Regulations and Solutions
Community Networks in Latin America: Challenges, Regulations and Solutions
 
Improving mobile broadband quality of service in low and middle income countries
Improving mobile broadband quality of service in low and middle income countriesImproving mobile broadband quality of service in low and middle income countries
Improving mobile broadband quality of service in low and middle income countries
 
10 hot consumer trends 2019 Ericsson
10 hot consumer trends 2019 Ericsson10 hot consumer trends 2019 Ericsson
10 hot consumer trends 2019 Ericsson
 
State of Broadband: Broadband catalyzing sustainable development 2018
State of Broadband: Broadband catalyzing sustainable development 2018State of Broadband: Broadband catalyzing sustainable development 2018
State of Broadband: Broadband catalyzing sustainable development 2018
 
Pay TV innovation forum industry perspectives 2018
Pay TV innovation forum industry perspectives 2018Pay TV innovation forum industry perspectives 2018
Pay TV innovation forum industry perspectives 2018
 
Video 360 Report 2018
Video 360 Report 2018Video 360 Report 2018
Video 360 Report 2018
 
Social media effectiveness roundup
Social media effectiveness roundupSocial media effectiveness roundup
Social media effectiveness roundup
 
Nielsen total audience report Q1 2018
Nielsen total audience report Q1 2018Nielsen total audience report Q1 2018
Nielsen total audience report Q1 2018
 
Reporte de industria sector TIC 2017
Reporte de industria sector TIC 2017Reporte de industria sector TIC 2017
Reporte de industria sector TIC 2017
 
5G work programme
5G work programme 5G work programme
5G work programme
 
Audio today report julio 2018nielsen
Audio today report julio 2018nielsenAudio today report julio 2018nielsen
Audio today report julio 2018nielsen
 
Broadband for national development if four ICDc: Cambodia Rwanda, Senegal and...
Broadband for national development if four ICDc: Cambodia Rwanda, Senegal and...Broadband for national development if four ICDc: Cambodia Rwanda, Senegal and...
Broadband for national development if four ICDc: Cambodia Rwanda, Senegal and...
 
Safety of life study
Safety of life study Safety of life study
Safety of life study
 
Global music report 2018
Global music report 2018Global music report 2018
Global music report 2018
 
Next mobile economy
Next mobile  economyNext mobile  economy
Next mobile economy
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Protecting Americas Next Generation Networks

  • 1.
  • 2. The wireless industry has baked security into our networks since the beginning, and works diligently to continually update and build on our security capabilities with every generation of wireless. Today’s 4G LTE networks have the most advanced security features to date, and 5G will further improve upon them. As 5G networks start to be deployed this year, wireless providers are leveraging new and advanced measures—after years of research, investment, and contributions to standards bodies—to secure 5G networks. This paper updates CTIA’s 2017 Protecting America’s Wireless Networks paper to feature 5G security highlights, including: Enhanced privacy protections 5G networks offer enhanced privacy protections like the encryption of each device’s IMSI, or unique user identifier. Industry is implementing this update to further secure device-specific and consumer-specific information as it moves on a 5G wireless network. The ability to leverage 5G “home” wireless network security when roaming or on Wi-Fi Wireless providers are extending the security of 5G wireless networks to other networks—called home network control—when a user is roaming or using a non-wireless network like Wi-Fi. This 1 2 Executive Summary 1 Protecting America’s Wireless Networks Security moves with device Security moves with device Your Cellular Network Wi-Fi Network Other Cellular Network
  • 3. use of home network security on all networks more thoroughly protects devices, consumer data, and even the network itself at all times. Device-specific security updates Wireless providers developed systems that will allow consumers to receive new and advanced security technology updates meant for their device type—referred to as providing native support for plug- in security. Previous generations of wireless networks were only able to support a one-size-fits-all approach. Further enhancing security across the wireless ecosystem, wireless providers are increasingly deploying network components that are virtual instead of the hardware of years’ past. 5G’s virtual and cloud-based network systems allow for more adaptable security since they can be quickly adjusted, removed, or replaced using software, reducing the likelihood that an entire network would be impacted by a cyberattack. Strong cybersecurity is key to the U.S.’s global wireless leadership. 5G is going to be up to 100 times faster, five times more responsive, and able to support 100 times more devices,1 unlocking innovations we can’t even imagine. For the U.S. to continue to attract investment in the app economy, as well as the virtual reality, artificial intelligence, and Internet of Things innovations of the future, our networks must be secure at every turn. And that’s what our industry works tirelessly to provide every day. 3 2 Protecting America’s Wireless Networks Then Now Update Updates
  • 4. Security is Critical to Everyone and Everything Thanks to wireless, we’re more connected than ever. Across the United States, more than 400 million wireless connections join people and increasingly, every part of our world together.2 These connections generate tremendous traffic over wireless networks—since 2010, mobile data traffic has grown over 40 times.3 We’re only going to grow more connected. Tomorrow’s 5G networks will offer unparalleled speeds, support a massive increase of IoT devices, and power real-time connections with minimal delays in response, enabling entirely new services and applications. The Internet of Things—bringing broadband connectivity to consumer and industrial devices, sensors, and objects—will usher in increased productivity and growth across every economic sector, from transportation and healthcare to public safety and energy. The number of connected devices worldwide is projected to total over 31 billion by 2023.4 Cyber threats are evolving. Cyber threats continue to grow in number and sophistication, with new risks and exploits to address. These threats are serious, often launched by highly resourced intelligence services abroad, organized criminal networks, and motivated entities seeking to disrupt communications networks, here and around the world. 5G—Keeping America’s Wireless Networks Secure The entire wireless industry continues to innovate and advance security—across networks, devices, operating systems, and applications—as we move to 5G and implement virtualized and software-defined networks. Given the cyber threat landscape and how it evolves, wireless network operators, device manufacturers, and operating system (OS) and application service providers continue Internet of Things New opportunities for possible exploits by hackers and cybercriminals have emerged with the development of sensors, cameras, meters, monitors, and other devices that can be targeted—and exploited—by hackers and other bad actors if core network and mobile device protections are insufficient. 3 Protecting America’s Wireless Networks Rising Threats
  • 5. leading-edge and risk-based management efforts that emphasize security as an integral component of every generation of technology. Today’s protections will continue to evolve over the life of 5G and beyond. Wireless Networks 5G will incorporate existing network protections as well as new ones and leverage lessons learned from the IT industry, such as the importance of mutual authentication techniques and multiple layers of security throughout a system. These enhancements will touch every cellular-capable device, given the growing connectivity of our world through the proliferation of Internet of Things (IoT) devices. 5G network defenses5 include: • Using standards-based encryption algorithms for on-air interfaces to prevent unauthorized access to information over the air, including the encryption of a device’s unique user identifier, called the International Mobile Subscriber Identity (IMSI). • Deploying authentication mechanisms that validate and authorize the user seeking to access the network in order to ensure that only legitimate people are accessing the network. These mechanisms include security anchor capabilities to authenticate and improve security across disparate networks. • Ciphering or coding data sent over the network to ensure it is kept free from corruption and/or modification. • Deploying a robust set of anti-spamming software on our networks to protect consumers from unsolicited SMS/MMS messages, illegal robocalls, and unwanted calls. • Instituting strict access controls—physical and IT access—to limit and monitor network resources as protection against internal and external bad actors. • Leveraging the flexibility of plug-in security schemes so that security updates directed toward certain devices can be sent to them and only them, avoiding the performance issues caused by non-compatible devices receiving these updates. 4 Protecting America’s Wireless Networks Network Threats Network Attacks Attacks could be launched by leveraging existing network protocols to execute exploits. Cloud Infrastructure For instance, a Distributed- Denial-of-Service (DDOS) attack could use commandeered IoT devices to overwhelm elements in the cloud to restrict or deny the availability of targeted online services.
  • 6. Device Security is Key Mobile Devices Today, mobile devices are targets for cyberattacks. That’s why mobile device manufacturers already build in a number of security mechanisms that protect devices from cyber threats, including: SIM Cards An integrated circuit for securely storing and authenticating critical subscriber identity information, a SIM (Subscriber Identification Module) card enables a secure and reliable voice and data connection and the ability to provision new applications and services remotely.7 Temporary Identities To mitigate the risk of serial numbers being compromised, networks use temporary identities that vary regularly, helping prevent interception by unauthorized users. Wireless Account Controls To protect against unauthorized use, consumers can leverage PINs and passwords to protect wireless provider account information, multi-factor account controls to provide more complex user authentication, and text or email notifications regarding changes in account profiles or number porting requests. Roots-of-Trust Built into mobile devices, this hardware-based cryptographic information is used to detect malware and authenticate system software integrity. Anti-Theft Tools The mobile industry’s voluntary anti-theft commitment provides consumers the tools to locate, lock and wipe their device in the event of theft or loss.8 Integrated Systems Mobile devices will be able to leverage 5G’s advanced authentication and encryption algorithms to work in near real-time with network security enhancements. 5 Protecting America’s Wireless Networks Malware Malware includes Trojan packages used to target financial information and ransomware6 that locks a user out of their system until they pay for re-access. Mobile Threats These threats include attacks on mobile applications, phishing attacks to install malicious software, and attacks to trick users to divulge access credentials such as personal passwords or PINs. Mobile Device Risks
  • 7. Mobile OS/Apps Mobile operating system providers like Android and iOS work with application developers continuously to improve security while screening for bad applications at app stores in order to prevent the spread of viruses and malware. Operating system providers and app developers will continue to advance software that protects wireless devices and consumers, including: Anti-Malware and Anti-Virus Software This kind of software prevents, detects, and removes malware from a user’s device. Device Security If a device is stolen or lost, personal and sensitive information contained in the device can be rendered inaccessible to an unauthorized user. Tools are provided to consumers for such protection. The wireless industry will use every tool to defend against cyber threats. Setting Cybersecurity Standards Standards Wireless network security standards processes are comprehensive and constantly evolving and improving. Driven by industry participation, standards-setting and standards- developing organizations are expanding global standards to enable dynamic, resilient, and safe wireless networks that counter security threats in a connected world. Key guidance- setting organizations include the following: 3GPP, the main wireless standards-setting body, is developing 5G security and privacy standards for the next generation of wireless technologies, architectures and protocols.11 3GPP is also developing several cryptographic algorithms to enhance end-to-end security and providing for ongoing enhancements to mobile cybersecurity. The new 5G standards include items discussed throughout this paper, such as increased home network control, a unified authentication framework across cellular and non-cellular networks, native support for the plug-in of new authentication schemes, security 6 Protecting America’s Wireless Networks of Americans report having the ability to remotely locate, lock, and erase their smartphones.9 of consumers use PINs/passwords on their smartphones, an increase of 54% from five years ago.10 Consumer Security Trends
  • 8. anchor capabilities to re-authorize devices as they move across different networks, and IMSI encryption for enhanced privacy protections. IETF is developing security requirements for network protocols for end-to-end device security and the IoT.12 These efforts build on several successful security protocols and standards IETF has developed, such as IP Security, Transport Layer Security, and Simple Authentication and Security Layer. ETSI is responsible for the standardization of cybersecurity standards internationally and for providing a center of relevant expertise for information and communications technologies, including mobile. The standards include global encryption technologies and algorithms to support integrity, authentication, and privacy. National Institute of Standards and Technology (NIST) is a U.S. standards body responsible for setting guidance for government agency conduct. CTIA and its members collaborate with NIST to share best practices and further refine an industry-driven methodology called the Cybersecurity Framework which helps companies assess and manage cybersecurity risks and outcomes. CTIA’s Cybersecurity Working Group brings together cybersecurity and policy experts from service provider, manufacturer, wireless data, internet, and application companies to develop best practices, common frameworks, and educational materials for consumers. The members work with the Department of Homeland Security (DHS), the Federal Communications Commission (FCC), the National Telecommunications and Information Administration (NTIA), and NIST, as well as with Congress to enhance technical and policy approaches to cybersecurity in the U.S. GSMA, a global trade association, leverages the contributions of its many members around the globe to share best practices for security management in mobile networks. Network Security and Monitoring Tools are Key Wireless Radio Access Network The radio access network (RAN) provides the radio communications between the mobile and the core network. The base station provides the air-interface radio connection between the mobile device and core network, performs mobility and handover, and ensures good performance and allocation of shared radio resources. 7 Protecting America’s Wireless Networks
  • 9. To prevent intruders from eavesdropping, wireless network operators equip their RAN with features that ensure the security of the radio communications functions and their connection to the core network. Specifically, RAN security features include: Mutual Authentication Functions To detect and prevent “spoofing,” these functions use an Authentication and Key Agreement protocol between the mobile device and the RAN allowing the device to authenticate the network, and the network to authenticate the device.13 IPSec Encryption This protocol allows the RAN to encrypt communications between the back-haul connections and the core network and also detect and mitigate unauthorized access, helping ensure proper radio access and prevent denial of service attacks. Access Controls These tools enable the detection of unauthorized access to RAN resources and the ability to deny access if appropriate. Wireless Core Network The 4G LTE core network consists of data gateways or routers, mobility management platforms, policy and billing, and the home subscriber database. The data gateways and major routing platforms carry IP traffic from many connected devices through the core network and out to cloud services or the Internet. 5G networks will build on the core network used by 4G LTE networks, called an Enhanced Packet Core (EPC), to interpret and route data. Initial 5G networks will adapt EPC capabilities to the changing threat landscape. 8 Protecting America’s Wireless Networks 5G Network Security Access & Mobility Manager Session Manager Authentication Center Gateway Policy Control Core 5G Internet RAN
  • 10. 5G networks will be able to support interoperability between the Enhanced Packet Core and future advanced Core (NextGen) networks as they come online. This flexibility is key to rapid 5G deployment and allows providers to scale security quickly using a known, but adaptable core network system. To monitor, guard, and protect the core platforms and subscriber databases against denial of service attacks or the threat of a stolen master key, wireless operators deploy a number of tools, including: • Firewalls that block certain types of network traffic, forming a barrier between a trusted and untrusted network—analogous to a physical wall that blocks and isolates the spread of an attack. • Intrusion detection and prevention systems that monitor network activities for malicious activity— helping identify the activity, record information about it, and block or stop it. • Malware monitoring and detection to target hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. • Virtual Private Networks that enable traffic to be sent through a secure connection, isolating that traffic from other devices on intermediate networks. Capable of connecting individual users to a remote network, application or multiple networks, VPNs require authentication for remote access and use encryption techniques. • Machine learning and artificial intelligence that detect anomalous behavior and automatically mitigate attacks. Core network elements are highly secure functions in terms of physical security and access controls, requiring gated facilities, guards, secure card entry, sophisticated login/ password controls, and other security measures. Not only are security functions a high priority, the core network is managed by trained and specialized personnel who are security and risk management experts. LTE EPC Evolution 5G Interoperability 9 Protecting America’s Wireless Networks 4G Operability LTE EPC 5G NR 5G 5G with NextGen Core NextGen/5G Core LTE EPC 5G NR 5G 4G
  • 11. Virtualizing 5G Networks Whether running apps, storing data, or delivering services, the cloud—a network of servers—has proven popular and efficient for delivering provider grade text messaging, social networking, banking, ecommerce, and mobile health applications. These servers and the mobile applications and services they enable have become a target for new threats. This matters because the all-IP architecture and openness of the internet provides broad and diverse entry points for an attack on a mobile network. As network functions become virtualized, often referred to as Network Functions Virtualization (NFV) and Software Defined Networking (SDN), cloud- based security is deployed by network providers to ensure the security of their networks against threats. Cloud-based security systems will support: • Secure interconnection and transport from the core network out to the cloud and internet • Mutual authentication techniques to continually authenticate a device and the network connection • Features that limit and monitor the number of entry points into the mobile network 10 Protecting America’s Wireless Networks Secure 5G Virtualization 4G Security 5G Security
  • 12. • Highly secure communication between links of a network • Localized security tied to virtualized network functions • Distributed functions, making cloud systems more difficult to attack • Data-driven elements that can detect and clean malware or other threats that enter the system and replace compromised functions virtually—all in seconds. Policies to Secure the Next Generation of Wireless Wireless companies monitor, protect, diagnose, and fight potential cyberattacks in real time, and that’s why policymakers should promote flexible, technology-neutral solutions and focus on cyber threat information sharing with appropriate liability protections for today’s 4G LTE and tomorrow’s 5G networks. To ensure we can continue to innovate as fast as cyber threats do, we need voluntary, collaborative, industry-led efforts—avoiding mandates that quickly become outdated. While many federal agencies have roles to play, the Department of Homeland Security is critical in convening industry and government stakeholders to work together toward a common framework to address cybersecurity. We urge policymakers to continue collaborating with the wireless industry on important and complex 5G security issues in order to encourage actions that can be taken in standards groups and other organizations. As 5G is deployed, flexibility is critical to meeting the challenge of protecting our networks and our consumers against the dynamic global threat landscape. Acknowledgements John Marinho, VP Technology and Cybersecurity Thomas Sawanobori, SVP and Chief Technology Officer Kevin Ryan, Assistant Vice President, Communications and Policy Katherine Den Boer, Director, Communications and Policy 11 Protecting America’s Wireless Networks
  • 13. Endnotes 1. The Wireless Industry: An American Success Story, CTIA, https://www.ctia.org/the-wireless- industry/wireless-industry. 2. Id. 3. 5G networks will be 10 times faster than 4G networks, respond five times as quickly, and connect 100 times the number of devices. Thomas K. Sawanobori, CTIA, The Next Generation of Wireless: 5G Leadership in the U.S., at 5 (Feb. 9, 2016), at www.ctia.org/docs/ default-source/default-document-library/5g-white-paper.pdf. 4. Ericsson Mobility Report 2018, at 16 (June 2018), at https://www.ericsson.com/assets/local/ mobility-report/documents/2018/ericsson-mobility-report-june-2018.pdf. 5. The Sector Annual Report (SAR) is filed with DHS and highlights a more comprehensive description of the actions and capabilities that the mobile industry deploys to protect networks and consumers from threats and bad-actors, at https://www.dhs.gov/keywords/ sector-annual-report. 6. Ransomware is malware that installs itself on a mobile device without the knowledge of the user and extorts payment once device information is locked, usually encrypted, and held hostage in exchange for a ransom payment. 7. Manufacturers limit access to SIM cards to minimize risks from the challenges of the application ecosystem. 8. Smartphone Anti-Theft Voluntary Commitment, CTIA (2016), at https://www.ctia.org/ the-wireless-industry/industry-commitments/smartphonea-anti-theft-voluntary- commitment; Capabilities that the wireless industry deploys to protect networks and consumers from threats and bad actors. 9. CTIA commissioned Harris Poll to conduct these surveys. Four such surveys have been conducted since 2012. An online survey was conducted Feb. 19-31, 2017, using a sample from the Harris Poll Panel of 1,007 U.S. adults who own and use a smartphone and/or tablet. A supplemental survey of 1,690 smartphone owners was conducted the week of March 6, 2017. A full methodology is available upon request. 10. Id. 11. SA3 – Security, 3GPP, http://www.3gpp.org/specifications-groups/sa-plenary/sa3- security#term0_1 (last visited Jun. 11, 2018). 12. See e.g., Best Current Practices for Securing Internet of Things (IoT) Devices, IETF, https:// datatracker.ietf.org/doc/draft-moore-iot-security-bcp/ (last visited Jun. 11, 2018). 13. Such authentication functions include SNOW 3G (designed by Lund University, Sweden), and the Clock cipher standard (NIST, USA), or Stream cipher. 12