Overview
Syllabus
Intro
What is 5G ?
Generations of Mobile Technologies
5G Features - Performance
56 Features - Technology Revolution
Supported by Network Slicing and Virtualization
5G Security - Radio Access Network
5G Security - Core Network - Service-based Architecture
5G Security - Trust Model
5G Security - Multi-Access Edge Computing (MEC)
5G Security - Key Elements
5G Security Challenges
The Threat Modeling Process
Threat Actors
Threat Actions - STRIDE + LM
Threats (Actors Performing Actions)
Threat Model for a Specific Use Case
Sample Threat Table for the Use Case
Sample Risk Assessment and Disposition
5G Threats - Major Mitigating Controls
Apply What You Have Learned Today
References
Taught by
RSA Conference