C.3 Cellular and Mobile Security

From CyberEdWiki
Jump to: navigation, search

As more communications are conducted via mobile and cellular technologies, these technologies have become critical (and continue to become more critical) to cyber operations. It is important for those involved in cyber operations to understand how data is secured during processing and transmission of information.

Specific topics to be covered in this knowledge unit include, but are not limited to:

  • Access and non-access stratum protocols
  • Short Message Service (SMS) (i.e. implementation, operations and vulnerabilities)
  • LTE Security Architecture (i.e. AS and NAS)
  • Operations administration, maintenance, and provisioning (i.e. charging, billing and accounting, UDR and CDR protocols)
  • Lawful intercept design, implementations, and restrictions
  • EPC Location based services (i.e. mobile location centers, privacy profile register, E911)

Outcome: Students will understand the system wide security implications and vulnerabilities of a cellular/mobile system.