September 2021
Intermediate to advanced
624 pages
16h 57m
English
After reading this chapter, you should have a better understanding of the following topics:
Key threat surfaces in different models of 5G MEC deployments
Key security controls for securing 5G MEC
Real scenario case study examples on MEC threat surfaces and threat mitigation techniques
In the previous chapters, we discussed the security controls to mitigate threat surfaces in 5G radio access network (RAN) deployments. This chapter will take you through the threat surfaces in 5G multi-access edge computing (MEC) deployments and mechanisms to mitigate the threats.
This chapter will be of particular interest to the following teams from enterprise 5G MEC consumers, 5G service providers, and cybersecurity ...