Chapter 9

Securing 5G Use Cases

After reading this chapter, you should have a better understanding of the following topics:

  • Key 5G use cases

  • Key threat surfaces in different 5G use cases

  • Key security controls for securing 5G use cases

This chapter will take you through the different 5G IoT use cases, their respective threat surfaces, and mechanisms to mitigate the threats.

This chapter will be of particular interest to the following members of teams from enterprise 5G consumers, 5G service providers, and cybersecurity vendors planning to provide security layers for 5G:

  • Strategy teams of service provider and enterprise verticals looking at 5G use cases

  • Security strategy teams within service provider and enterprise verticals deploying 5G

Get Securing 5G and Evolving Architectures now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.