Chapter 11
Prioritizing 5G Security Investments
After reading this chapter, you should have a better understanding of the following topics:
The methods for creating a prioritized list of security capabilities and controls based on use cases, deployment models, and network deployment stages
Summary of critical security controls for 5G deployment and their capabilities
Mapping of security controls and its impact on 5G deployments
While Chapter 10, “Building Pragmatic End-to-End 5G Security Architecture,” discussed security controls and capabilities required to secure 5G deployments, this chapter will take you through the considerations for prioritizing investments in securing your 5G network.
This chapter will be of particular interest to the ...
Get Securing 5G and Evolving Architectures now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.