Cybersecurity Risks of 5G – And How to Control Them
eSecurity Planet
SEPTEMBER 1, 2021
.” In instances where network administrators operate several slices, including shared and dedicated network functions, this hybrid approach creates a deficiency in mapping between the application and transport layer identities. To be successful, an attacker must gain access to the 5G Service Based Architecture.
Let's personalize your content