《GSMA 移动通信安全现状 (GSMA Mobile Telecommunications Security Landscape)》
February 2024GSMA Mobile Telecommunications Security Landscape GSMA Mobile Telecommunications Security LandscapeGSMA Mobile Telecommunications Security Landscape GSMA Mobile TelecommunicationsSecurity LandscapeThis is an information paper of the GSMASecurity Classification: Non-confidentialAccess to and distribution of this document is restricted to the persons permitted by the security classification. This document is subject to copyright protection and is to be used only for the purposes for which it has been supplied and information contained in it must not be disclosed or in any other way made available, in whole or in part, to persons other than those permitted under the security classification without the prior written approval of the Association.Copyright NoticeCopyright © 2024 GSM AssociationDisclaimerThe GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document. The information contained in this document may be subject to change without prior notice.Antitrust NoticeThe information contain herein is in full compliance with the GSM Association’s antitrust compliance policy. GSMA CTO Foreword 1 GSMA Fraud and Security Group Chair 2 Chair, GSMA Fraud and Security Group & CEO, Copper Horse Ltd 21. Key Points 32. Introduction 53. Attacks on Operators 7 Analysis 84. Attacks on virtualised infrastructure 10 Analysis 105. Supply Chains 12 Analysis 126. Global Title Abuse and Interconnect 14 Analysis 157. Malware & Ransomware 16 Analysis 178. Spyware 18 Analysis 189. Mobile App Security 20 Analysis 2110. New and Repackaged Fraud Types 22 Analysis 2311. The emerging security operating context 24 A Forward Look 26 Summary 2912. Final thoughts 30ContentsGSMA Mobile Telecommunications Security LandscapeGSMA Mobile Telecommunications Security Landscape GSMA Mobile Telecommunications Security Landscape 1/30GSMA Mobile Telecommunications Security LandscapeGSMA Mobile Telecommunications Security Landscape GSMA Mobile TelecommunicationsSecurity LandscapeGSMA CTO Foreword1/30GSMA Mobile Telecommunications Security LandscapeSpyware5G networks deliver as part of a multi-generational evolution of mobile infrastructure. 2G, 3G and 4G networks continue to deliver services across the globe and such connectivity becomes ever more fundamental to our daily lives. As such, the cyber security of those networks is a fundamental technology enabler that is increasingly mandated by governments and requires constant scrutiny and investment to keep pace with the changing threat nature described in this, and previous, GSMA mobile telecommunication security landscape reports. This threat landscape report plays a key role in communicating the ongoing, evolving and escalating nature of the threats facing our industry. Importantly, the rep
《GSMA 移动通信安全现状 (GSMA Mobile Telecommunications Security Landscape)》,点击即可下载。报告格式为PDF,大小7.08M,页数34页,欢迎下载。
