36,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
18 °P sammeln
  • Broschiertes Buch

The reliance on cellular communication and its use in transfer of sensitive information, both of private and business critical nature, raises the need for up to date security measures. This book discusses one security lapse in GSM architecture, lack of mutual authentication, and serves as a proof of concept where man in the middle attack was deployed on live networks. The purpose is to highlight the above mentioned flaw and to motivate changes/additions in standards to discourage such a possibility.

Produktbeschreibung
The reliance on cellular communication and its use in transfer of sensitive information, both of private and business critical nature, raises the need for up to date security measures. This book discusses one security lapse in GSM architecture, lack of mutual authentication, and serves as a proof of concept where man in the middle attack was deployed on live networks. The purpose is to highlight the above mentioned flaw and to motivate changes/additions in standards to discourage such a possibility.
Autorenporträt
Die Autoren sind Absolventen der National University of Sciences and Technology im Fachbereich Elektrotechnik mit Schwerpunkt Telekommunikation. Ahthsham ist derzeit als RF-Optimierungsingenieur beim größten Mobilfunkbetreiber Pakistans tätig. Umar arbeitet derzeit an standortbezogenen Diensten unter Verwendung von GSM. Beide sind begeisterte Sicherheitsfanatiker.