Skip to Content
Securing 5G and Evolving Architectures
book

Securing 5G and Evolving Architectures

by Pramod Nair
September 2021
Intermediate to advanced
624 pages
16h 57m
English
Addison-Wesley Professional
Content preview from Securing 5G and Evolving Architectures

Chapter 5

Securing MEC Deployments in 5G

After reading this chapter, you should have a better understanding of the following topics:

  • Key threat surfaces in different models of 5G MEC deployments

  • Key security controls for securing 5G MEC

  • Real scenario case study examples on MEC threat surfaces and threat mitigation techniques

In the previous chapters, we discussed the security controls to mitigate threat surfaces in 5G radio access network (RAN) deployments. This chapter will take you through the threat surfaces in 5G multi-access edge computing (MEC) deployments and mechanisms to mitigate the threats.

This chapter will be of particular interest to the following teams from enterprise 5G MEC consumers, 5G service providers, and cybersecurity ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

5G for the Connected World

5G for the Connected World

Devaki Chandramouli, Rainer Liebhart, Juho Pirskanen
5G Verticals

5G Verticals

Rath Vannithamby, Anthony Soong
Networking Vehicles to Everything

Networking Vehicles to Everything

Markus Mueck, Ingolf Karls
EPC and 4G Packet Networks, 2nd Edition

EPC and 4G Packet Networks, 2nd Edition

Magnus Olsson, Catherine Mulligan

Publisher Resources

ISBN: 9780137458097