Chapter 4

Securing RAN and Transport Deployments in 5G

After reading this chapter, you should have a better understanding of the following topics:

  • 5G RAN and Transport Threats

  • Securing 5G RAN and Transport

  • Real Scenario Case Study: Examples of Threat Surfaces and Threat Mitigation Techniques

The previous chapter discussed how device-based threats have an impact on a 5G network and different ways of mitigating the threats. This chapter is aimed primarily at the 5G radio access network (RAN) threat surfaces and mitigation techniques for the service provider network. This chapter will be of particular interest to the following teams from service providers and vendors:

  • Mobile infrastructure strategy

  • Security strategy

  • Radio planning and optimization ...

Get Securing 5G and Evolving Architectures now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.