Objectives
After completing this course, the learner will be able to:
■ Identify various security threats to 5G networks
■ Sketch the security framework in 5G RAN, core, transport and interconnect networks
■ Identify common security techniques between 5G security and IT networks
■ Step through very high-level 5G operations of authentication, encryption, ciphering, etc.
■ List key 5G-specific security enhancements
Outline
1. Security Needs for 5G Network
1.1 5G enhancements over 4G
1.2 Key 5G security challenges
1.3 Types of threat (STRIDE Model)
1.4 Security threats for RAN, Core, Transport
Exercise: Match threat with its impact
2. Security Framework for 5G Networks
2.1 End-to-end security framework
2.2 Authentication framework
2.3 End-to-end encryption and ciphering
2.4 Security for service-based interfaces
Exercise: Match security function with its role
3. 5G Security Procedures
3.1 Security life of a UE in 5G network
3.2 Authentication procedure
3.3 Ciphering procedure
3.4 Security for roaming and interconnect
4. Infrastructure Security
4.1 Physical infrastructure security
4.2 Virtual workload security
4.3 RAN and Transport security - an example
Putting it all together