Completed
Cloud security principles
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Security Transition from 4G to 5G - Are We Secure Enough?
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Why WiFi is important
- 3 The problem with WiFi
- 4 Service Base Architecture
- 5 What makes this situation complicated
- 6 Cloud security principles
- 7 Use case of 5G
- 8 Greek wiretapping scandal
- 9 The problem of scope
- 10 The problem of Co Network
- 11 Snowden
- 12 MC catcher
- 13 Capabilities
- 14 Radio Capabilities
- 15 Registration
- 16 Setup
- 17 MNMap
- 18 Mobile Networks
- 19 Saving capabilities
- 20 Fingerprints
- 21 Who is BruCON
- 22 Supported devices
- 23 common fingerprints
- 24 two GPS
- 25 SIM cards
- 26 Maninthemiddle attack
- 27 Modifications
- 28 Security Mode
- 29 Live Networks
- 30 Why is this happening
- 31 Power Saving Mode
- 32 Battery Life
- 33 Location Tracking
- 34 Authentication
- 35 Security improvements
- 36 MC Cache
- 37 Sequence Number
- 38 Targeted Attack
- 39 Core Network
- 40 NATO Report
- 41 Questions