27.04.2014 Views

day1_Hacking-telco-equipment-The-HLR-HSS-Laurent-Ghigonis-p1sec

day1_Hacking-telco-equipment-The-HLR-HSS-Laurent-Ghigonis-p1sec

day1_Hacking-telco-equipment-The-HLR-HSS-Laurent-Ghigonis-p1sec

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Other aspects of Telecom Security<br />

• We talked here about <strong>equipment</strong> security<br />

– It’s a work in progress, and only <strong>HLR</strong>/<strong>HSS</strong><br />

– Mainly Network Equipment Vendor responsibility<br />

• Also consider<br />

– Other Network Elements security<br />

– GRX / IPX / SCCP Providers security<br />

– Deployment security (passwords policies,<br />

filtering…), Operator responsability<br />

– Telecom Network Fraud (SS7 spoofing, Call/SMS<br />

Spoofing, …), Operator responsability<br />

2014, Hackito Ergo Sum - Security Conference

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!