Chapter 11. Security Considerations
11.1. UMC Security Considerations: A View of the Landscape
Most consumers are naive about the security of their wireless phone calls. In the early days of analog cellular service, some knowledgeable engineer with a frequency-tunable RF receiver and some method to record the traffic could record and play back cell phone calls at will. That's most certainly a scary thought for most 21st-century security-conscience individuals. Because UMC potentially traverses multiple network topologies, different classes of security must be considered. It is important to understand the breadth and strength of any security services that are provided by the UMC solutions, and for enterprises it is important to understand how ...
Get Fixed/Mobile Convergence and Beyond now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.