SlideShare a Scribd company logo
1 of 2
Download to read offline
The Top 5
LTE Protection
Domains
LTE operators have invested heavily in protecting the subscriber and the network in five key areas.
Copyright2014 Stoke, Inc.
The LTE Security
Framework
User equipment must be
authenticated by the core
network before enabled to make
voice calls, texting, Internet
browsing or access any other
service through the mobile
network. This helps prevents
fraudulent use of subscriber
services by an unauthorized user
or different device.
Malware infections increased by 20% in
2013, to 11.6M mobile devices
worldwide, 60% of which are Android
devices
Device & Application
Integrity Ensured
Malware Infections
11.6M
Source: KindsightSecurity Labs MalwareReportQ4 2013
Mobile operators and
manufacturers provide anti-
virus software and provide
guidance on software
applications that may be
questionable.
Remote "wipe"
through device
software, removes
subscriber information
in the event of device
theft or loss.
Device Misuse Malware and Viruses
A security gateway (SEG)
provides secure
aggregation of traffic and
ensures correct
authentication of cell
sites.
RAN-Core Border
Malicious Access Averted
Intensified Backhaul
Risks
53%
By 2017, over
half of LTE cell
sites are
forecast to
encrypt traffic
using IPsec.
60M Small
Cells
Source: Small Cells Forum, 2016 forecast
Small cells are especially
vulnerable to hacker
interception and spoofing
as they are often deployed
in less secure locations and
connected with untrusted
backhaul.
Source: Heavy Reading
Encrypted
The SEG protects core
network assets and
further ensures subscriber
confidentiality.
With almost $3 B in projected service
revenues, operators must protect
premium voice (VoLTE) from malicious
intrusion, unauthorized access, and
poor quality of experience (QoE).
Diameter Routing Agents (DRA) and
Session Border Controllers (SBC)
support critical core functions.
Security gateways protect privacy
without adding perceivable latency
that would impair voice quality.
IMS Core & PCC Vulnerable
VoLTE
Policy Charging and Control
Elements provide secure
access to authorized services
and accurate billing.
IP Multimedia Subsystems
enable voice over LTE (VoLTE)
and ensure that only
authorized sessions are
allowed access.
Source: Infonetics
$2.7 B
2017
VoLTE Service
Revenue
Authorized Service Use
Malicious denial-of-service attacks are more
commonly initiated through the Internet, but
can enter through an unsecured RAN-Core
border or through roaming partner
interfaces.
Firewalls, IDS and security gateways are
deployed to protect against DDoS attacks
that can cause widescale service outages or
otherwise disrupt service access and quality.
DDoS Defense
Service Disruption
20%
Source: Arbor Networks
Internet Border
20 % of mobile operators have had a
customer visible outage due to a
security incident. 25% have seen DDoS
attacks targeting users or network.
Denial-of-service
attacks cause
service outages by
flooding the
network with so
much traffic that a
network element is
overwhelmed and
cannot provide
service to
legitimate traffic.
25%
Copyright2014 Stoke, Inc., All Rights Reserved
www.stoke.com

More Related Content

What's hot

REVE Session Border Controller | SBC in Telecom
REVE Session Border Controller | SBC in TelecomREVE Session Border Controller | SBC in Telecom
REVE Session Border Controller | SBC in TelecomAbhishek Upadhyay
 
Strong Authentication and US Federal Digital Services
Strong Authentication and US Federal Digital ServicesStrong Authentication and US Federal Digital Services
Strong Authentication and US Federal Digital ServicesFIDO Alliance
 
Block Armour Case Study
Block Armour Case StudyBlock Armour Case Study
Block Armour Case StudyBlock Armour
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyBlock Armour
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? Forescout Technologies Inc
 
Cybersecurity - Keeping Your Business Protected
Cybersecurity - Keeping Your Business ProtectedCybersecurity - Keeping Your Business Protected
Cybersecurity - Keeping Your Business ProtectedRobert E Jones
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsMichelle Morgan-Nelsen
 
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour
 
NSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsNSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsRonald Bartels
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTForgeRock
 
Secur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm ShowSecur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm Showfmitchell
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantVladimir Jirasek
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Block Armour
 
Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital VaultBlock Armour
 
Financial Districs Wi Fi Scan
Financial Districs Wi Fi ScanFinancial Districs Wi Fi Scan
Financial Districs Wi Fi ScanAirTight Networks
 
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsSAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsAndreas Mai
 

What's hot (20)

REVE Session Border Controller | SBC in Telecom
REVE Session Border Controller | SBC in TelecomREVE Session Border Controller | SBC in Telecom
REVE Session Border Controller | SBC in Telecom
 
Strong Authentication and US Federal Digital Services
Strong Authentication and US Federal Digital ServicesStrong Authentication and US Federal Digital Services
Strong Authentication and US Federal Digital Services
 
Block Armour Case Study
Block Armour Case StudyBlock Armour Case Study
Block Armour Case Study
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System?
 
Cybersecurity - Keeping Your Business Protected
Cybersecurity - Keeping Your Business ProtectedCybersecurity - Keeping Your Business Protected
Cybersecurity - Keeping Your Business Protected
 
Public wifi
Public wifiPublic wifi
Public wifi
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
 
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
 
NSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsNSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threats
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
Secur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm ShowSecur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm Show
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital Vault
 
Protecting Americas Next Generation Networks
Protecting Americas Next Generation NetworksProtecting Americas Next Generation Networks
Protecting Americas Next Generation Networks
 
My ppt
My pptMy ppt
My ppt
 
Financial Districs Wi Fi Scan
Financial Districs Wi Fi ScanFinancial Districs Wi Fi Scan
Financial Districs Wi Fi Scan
 
Rajan Raj Pant
Rajan Raj PantRajan Raj Pant
Rajan Raj Pant
 
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsSAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
 

Viewers also liked

Secure from GO: Design considerations for the integration of security into L...
Secure from GO:  Design considerations for the integration of security into L...Secure from GO:  Design considerations for the integration of security into L...
Secure from GO: Design considerations for the integration of security into L...Mary McEvoy Carroll
 
Netmanias.2013.08.05 lte security i-concept and authentication.eng
Netmanias.2013.08.05 lte security i-concept and authentication.engNetmanias.2013.08.05 lte security i-concept and authentication.eng
Netmanias.2013.08.05 lte security i-concept and authentication.engson6971
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerationsMary McEvoy Carroll
 
Security Testing 4G (LTE) Networks - 44CON 2012
Security Testing 4G (LTE) Networks - 44CON 2012Security Testing 4G (LTE) Networks - 44CON 2012
Security Testing 4G (LTE) Networks - 44CON 201244CON
 
Practical security testing for lte networks
Practical security testing for lte networksPractical security testing for lte networks
Practical security testing for lte networksPfedya
 
Netmanias.2012.08.22 [en] lte security i-security concept and authentication
Netmanias.2012.08.22 [en] lte security i-security concept and authenticationNetmanias.2012.08.22 [en] lte security i-security concept and authentication
Netmanias.2012.08.22 [en] lte security i-security concept and authenticationson6971
 
Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Mohamed Tharwat Waheed
 
LTE network: How it all comes together architecture technical poster
LTE network: How it all comes together architecture technical posterLTE network: How it all comes together architecture technical poster
LTE network: How it all comes together architecture technical posterDavid Swift
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network SecuritySatish Chavan
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?Stephen Kho
 
Lte security overview
Lte security overviewLte security overview
Lte security overviewaliirfan04
 
Lte system signaling procedures
Lte system signaling proceduresLte system signaling procedures
Lte system signaling procedurestharinduwije
 

Viewers also liked (15)

Secure from GO: Design considerations for the integration of security into L...
Secure from GO:  Design considerations for the integration of security into L...Secure from GO:  Design considerations for the integration of security into L...
Secure from GO: Design considerations for the integration of security into L...
 
Netmanias.2013.08.05 lte security i-concept and authentication.eng
Netmanias.2013.08.05 lte security i-concept and authentication.engNetmanias.2013.08.05 lte security i-concept and authentication.eng
Netmanias.2013.08.05 lte security i-concept and authentication.eng
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerations
 
Security Testing 4G (LTE) Networks - 44CON 2012
Security Testing 4G (LTE) Networks - 44CON 2012Security Testing 4G (LTE) Networks - 44CON 2012
Security Testing 4G (LTE) Networks - 44CON 2012
 
Practical security testing for lte networks
Practical security testing for lte networksPractical security testing for lte networks
Practical security testing for lte networks
 
Lte transport requirements
Lte transport requirementsLte transport requirements
Lte transport requirements
 
Netmanias.2012.08.22 [en] lte security i-security concept and authentication
Netmanias.2012.08.22 [en] lte security i-security concept and authenticationNetmanias.2012.08.22 [en] lte security i-security concept and authentication
Netmanias.2012.08.22 [en] lte security i-security concept and authentication
 
Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Lte security solution white paper(20130207)
Lte security solution white paper(20130207)
 
LTE network: How it all comes together architecture technical poster
LTE network: How it all comes together architecture technical posterLTE network: How it all comes together architecture technical poster
LTE network: How it all comes together architecture technical poster
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network Security
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
 
Lte security overview
Lte security overviewLte security overview
Lte security overview
 
Security In LTE Access Network
Security In LTE Access NetworkSecurity In LTE Access Network
Security In LTE Access Network
 
Lte system signaling procedures
Lte system signaling proceduresLte system signaling procedures
Lte system signaling procedures
 
Lte optimization
Lte optimizationLte optimization
Lte optimization
 

Similar to Top5 protectiondomains infographic_final

Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network securityAnkit Anand
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveRobert Herjavec
 
FirstPartner 2015 M2M & IoT Market Map
FirstPartner 2015 M2M & IoT Market MapFirstPartner 2015 M2M & IoT Market Map
FirstPartner 2015 M2M & IoT Market MapFirstPartner
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdfSecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdfSecurity Gen
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxadolphoyonker
 
Wireless security
Wireless securityWireless security
Wireless securitySalma Elhag
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIOSR Journals
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cloudflare
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? PECB
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxronak56
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxdaniahendric
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdfonline Marketing
 

Similar to Top5 protectiondomains infographic_final (20)

Securing VoIP Networks
Securing VoIP NetworksSecuring VoIP Networks
Securing VoIP Networks
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
 
FirstPartner 2015 M2M & IoT Market Map
FirstPartner 2015 M2M & IoT Market MapFirstPartner 2015 M2M & IoT Market Map
FirstPartner 2015 M2M & IoT Market Map
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdfSecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Wireless security
Wireless securityWireless security
Wireless security
 
AGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-iAGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-i
 
A017130104
A017130104A017130104
A017130104
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
L017326972
L017326972L017326972
L017326972
 

More from Mary McEvoy Carroll

Hadoop top 20 influencers of 2015
Hadoop top 20 influencers of 2015Hadoop top 20 influencers of 2015
Hadoop top 20 influencers of 2015Mary McEvoy Carroll
 
Machine learning's 2015 top influencers
Machine learning's 2015 top influencersMachine learning's 2015 top influencers
Machine learning's 2015 top influencersMary McEvoy Carroll
 
What is the connected retail environment?
What is the connected retail environment?What is the connected retail environment?
What is the connected retail environment?Mary McEvoy Carroll
 
A guided tour to the internet of things in the sim connected world
A guided tour to the internet of things in the sim connected worldA guided tour to the internet of things in the sim connected world
A guided tour to the internet of things in the sim connected worldMary McEvoy Carroll
 
Connectem VCM powered by VMware - partner brief
Connectem VCM powered by VMware - partner briefConnectem VCM powered by VMware - partner brief
Connectem VCM powered by VMware - partner briefMary McEvoy Carroll
 
Securing the LTE Core: the Road to NFV
Securing the LTE Core:  the Road to NFVSecuring the LTE Core:  the Road to NFV
Securing the LTE Core: the Road to NFVMary McEvoy Carroll
 
Infonetics and Stoke webinar: Security at the speed of VoLTE
Infonetics and Stoke webinar: Security at the speed of VoLTEInfonetics and Stoke webinar: Security at the speed of VoLTE
Infonetics and Stoke webinar: Security at the speed of VoLTEMary McEvoy Carroll
 
Secure from go: Stoke Guide to Securing LTE Networks from Day 1
Secure from go:  Stoke Guide to Securing LTE Networks from Day 1Secure from go:  Stoke Guide to Securing LTE Networks from Day 1
Secure from go: Stoke Guide to Securing LTE Networks from Day 1Mary McEvoy Carroll
 
Infonetics white paper: Security at the Speed of VoLTE
Infonetics white paper:  Security at the Speed of VoLTEInfonetics white paper:  Security at the Speed of VoLTE
Infonetics white paper: Security at the Speed of VoLTEMary McEvoy Carroll
 

More from Mary McEvoy Carroll (12)

Hadoop top 20 influencers of 2015
Hadoop top 20 influencers of 2015Hadoop top 20 influencers of 2015
Hadoop top 20 influencers of 2015
 
Machine learning's 2015 top influencers
Machine learning's 2015 top influencersMachine learning's 2015 top influencers
Machine learning's 2015 top influencers
 
What is the connected retail environment?
What is the connected retail environment?What is the connected retail environment?
What is the connected retail environment?
 
A guided tour to the internet of things in the sim connected world
A guided tour to the internet of things in the sim connected worldA guided tour to the internet of things in the sim connected world
A guided tour to the internet of things in the sim connected world
 
Connectem VCM powered by VMware - partner brief
Connectem VCM powered by VMware - partner briefConnectem VCM powered by VMware - partner brief
Connectem VCM powered by VMware - partner brief
 
Latency considerations in_lte
Latency considerations in_lteLatency considerations in_lte
Latency considerations in_lte
 
Securing the shared network
Securing the shared networkSecuring the shared network
Securing the shared network
 
Sec conf london_v07
Sec conf london_v07Sec conf london_v07
Sec conf london_v07
 
Securing the LTE Core: the Road to NFV
Securing the LTE Core:  the Road to NFVSecuring the LTE Core:  the Road to NFV
Securing the LTE Core: the Road to NFV
 
Infonetics and Stoke webinar: Security at the speed of VoLTE
Infonetics and Stoke webinar: Security at the speed of VoLTEInfonetics and Stoke webinar: Security at the speed of VoLTE
Infonetics and Stoke webinar: Security at the speed of VoLTE
 
Secure from go: Stoke Guide to Securing LTE Networks from Day 1
Secure from go:  Stoke Guide to Securing LTE Networks from Day 1Secure from go:  Stoke Guide to Securing LTE Networks from Day 1
Secure from go: Stoke Guide to Securing LTE Networks from Day 1
 
Infonetics white paper: Security at the Speed of VoLTE
Infonetics white paper:  Security at the Speed of VoLTEInfonetics white paper:  Security at the Speed of VoLTE
Infonetics white paper: Security at the Speed of VoLTE
 

Top5 protectiondomains infographic_final

  • 1. The Top 5 LTE Protection Domains LTE operators have invested heavily in protecting the subscriber and the network in five key areas. Copyright2014 Stoke, Inc. The LTE Security Framework User equipment must be authenticated by the core network before enabled to make voice calls, texting, Internet browsing or access any other service through the mobile network. This helps prevents fraudulent use of subscriber services by an unauthorized user or different device. Malware infections increased by 20% in 2013, to 11.6M mobile devices worldwide, 60% of which are Android devices Device & Application Integrity Ensured Malware Infections 11.6M Source: KindsightSecurity Labs MalwareReportQ4 2013 Mobile operators and manufacturers provide anti- virus software and provide guidance on software applications that may be questionable. Remote "wipe" through device software, removes subscriber information in the event of device theft or loss. Device Misuse Malware and Viruses
  • 2. A security gateway (SEG) provides secure aggregation of traffic and ensures correct authentication of cell sites. RAN-Core Border Malicious Access Averted Intensified Backhaul Risks 53% By 2017, over half of LTE cell sites are forecast to encrypt traffic using IPsec. 60M Small Cells Source: Small Cells Forum, 2016 forecast Small cells are especially vulnerable to hacker interception and spoofing as they are often deployed in less secure locations and connected with untrusted backhaul. Source: Heavy Reading Encrypted The SEG protects core network assets and further ensures subscriber confidentiality. With almost $3 B in projected service revenues, operators must protect premium voice (VoLTE) from malicious intrusion, unauthorized access, and poor quality of experience (QoE). Diameter Routing Agents (DRA) and Session Border Controllers (SBC) support critical core functions. Security gateways protect privacy without adding perceivable latency that would impair voice quality. IMS Core & PCC Vulnerable VoLTE Policy Charging and Control Elements provide secure access to authorized services and accurate billing. IP Multimedia Subsystems enable voice over LTE (VoLTE) and ensure that only authorized sessions are allowed access. Source: Infonetics $2.7 B 2017 VoLTE Service Revenue Authorized Service Use Malicious denial-of-service attacks are more commonly initiated through the Internet, but can enter through an unsecured RAN-Core border or through roaming partner interfaces. Firewalls, IDS and security gateways are deployed to protect against DDoS attacks that can cause widescale service outages or otherwise disrupt service access and quality. DDoS Defense Service Disruption 20% Source: Arbor Networks Internet Border 20 % of mobile operators have had a customer visible outage due to a security incident. 25% have seen DDoS attacks targeting users or network. Denial-of-service attacks cause service outages by flooding the network with so much traffic that a network element is overwhelmed and cannot provide service to legitimate traffic. 25% Copyright2014 Stoke, Inc., All Rights Reserved www.stoke.com