IoT security guidelines released by GSMA

The GSMA released a set of security guidelines for the Internet of Things (IoT) in a bid to ensure services are reliable and trustworthy. They take the form of separate documents targeted at the major component parts of the IoT value chain, such as the service, network and terminal. The idea is that by following... Continue Reading →

Telco Providers Security Challenges – Part 2

DDoS AttacksThe common attack vectors for any DDoS would be of the followingVolumetric or Flood Attacks Bad guys shall expoit the system with arge botnets or spoofed IP to generate a lot of traffic bps or pps. The UDP-based floods from spoofed IP take advantage of connection less UDP protocol. They even take out the infrastructure... Continue Reading →

Telco Providers Security Challenges – Part 1

BGP Hijacking (sometimes referred to as IP hijacking, prefix hijacking or route hijacking) Routing between Autonomous Systems (AS) is achieved using the Border Gateway Protocol (BGP), which allows ASes to advertise to others the addresses of their network and receive the routes to reach the other Ases. Each AS implicitly trusts the peer ASes it... Continue Reading →

Blog at WordPress.com.

Up ↑

%d bloggers like this: