Главная
Study mode:
on
1
Intro
2
What is 5G ?
3
Generations of Mobile Technologies
4
5G Features - Performance
5
56 Features - Technology Revolution
6
Supported by Network Slicing and Virtualization
7
5G Security - Radio Access Network
8
5G Security - Core Network - Service-based Architecture
9
5G Security - Trust Model
10
5G Security - Multi-Access Edge Computing (MEC)
11
5G Security - Key Elements
12
5G Security Challenges
13
The Threat Modeling Process
14
Threat Actors
15
Threat Actions - STRIDE + LM
16
Threats (Actors Performing Actions)
17
Threat Model for a Specific Use Case
18
Sample Threat Table for the Use Case
19
Sample Risk Assessment and Disposition
20
5G Threats - Major Mitigating Controls
21
Apply What You Have Learned Today
22
References
Description:
Explore a comprehensive analysis of 5G security risks and mitigating controls in this 46-minute RSA Conference talk by Zhijun Zhang, Lead Security Architect at The World Bank Group. Delve into the new technology components and services of 5G networks, examining potential threats through a custom-developed threat model. Gain insights into the 5G ecosystem's security challenges, including radio access network, core network architecture, trust model, and multi-access edge computing. Learn about the threat modeling process, actors, and actions using the STRIDE+LM framework. Discover how to apply this knowledge to assess risks and implement effective security measures in 5G environments. Prerequisite understanding of threat models such as STRIDE is recommended for maximum benefit from this informative presentation.

Demystifying 5G Security through Threat Modeling

RSA Conference
Add to list
0:00 / 0:00