IoT security guidelines released by GSMA


The GSMA released a set of security guidelines for the Internet of Things (IoT) in a bid to ensure services are reliable and trustworthy. They take the form of separate documents targeted at the major component parts of the IoT value chain, such as the service, network and terminal. The idea is that by following these guidelines, the industry will develop IoT services and devices … Continue reading IoT security guidelines released by GSMA

Telco Providers Security Challenges – Part 2


DDoS Attacks The common attack vectors for any DDoS would be of the following Volumetric or Flood Attacks  Bad guys shall expoit the system with arge botnets or spoofed IP to generate a lot of traffic bps or pps. The UDP-based floods from spoofed IP take advantage of connection less UDP protocol. They even take out the infrastructure capacity – routers, switches, servers, links State … Continue reading Telco Providers Security Challenges – Part 2

Telco Providers Security Challenges – Part 1


BGP Hijacking (sometimes referred to as IP hijacking, prefix hijacking or route hijacking) Routing between Autonomous Systems (AS) is achieved using the Border Gateway Protocol (BGP), which allows ASes to advertise to others the addresses of their network and receive the routes to reach the other Ases. Each AS implicitly trusts the peer ASes it exchanges routing information with. BGP hijacking is an attack against the … Continue reading Telco Providers Security Challenges – Part 1