# <center><i class="fa fa-edit"></i> 5G Security: Comparision </center> ###### tags: `Internship` :::info The main goal is to create a table comparing the security threat mentioned in the four documents. **Resources:** [O-RAN Security Task Group](https://www.o-ran.org/blog/2020/10/24/the-o-ran-alliance-security-task-group-tackles-security-challenges-on-all-o-ran-interfaces-and-components) [A guide to 5G network security](https://www.ericsson.com/48fcab/assets/local/news/2018/10201291-04_gir_report_broschure_dec2018_webb_181212.pdf?_ga=2.63593709.33572225.1614428136-783979408.1614428136) [5G Security: Forward Thinking](https://www.huawei.com/minisite/5g/img/5G_Security_Whitepaper_en.pdf) [Securing the 5G Era](https://www.gsma.com/security/securing-the-5g-era/) ::: # Output | Document | Target | Threat | | -------- | -------- | -------- | | O-RAN Security Task Group | RAN surface | The disaggregation of functions increases the RAN threat surface | | | The whole Open RAN network | The increase of the Open RAN dependence on secure development practices within open source communities | | | The whole Open RAN network | The use of AI in the RAN may lead to unanticipated monsequences | | | The whole Open RAN network | The increasing likelihood of attacks by compromised devices | | | The whole Open RAN network | The open fronthaul interface operating the lower layer split (LLS) interface (Due to the separation of the O-DU and O-RU) | | A guide to 5G network security | signaling traffic | Modification of signaling traffic may be attempted to re-route calls or intercept SMS messages of a target for eavesdropping purposes or denying service. | | | user payload traffic | The privacy of the user and the confidentiality of enterprise or government data would be at risk. | | | management traffic | The management plane is an attractive target for hackers to gain access to network resources, where they can manipulate and disturb network traffic and data. | | | Telecom networks | Fairly trivial malware | | | Telecom networks | Crime-ware (attack toolkits) | | | Telecom networks | hacktivists | | | Telecom networks | Insider threats such as disgruntled former employees or employees who seek to exploit their trusted position for personal gain. | | 5G Security: Forward Thinking | New Business Model | The network based hop-by-hop security approach may not be efficient enough to build differentiated end-to-end (E2E) security for different services. | | | IT-Driven Network Architecture | New security concerns are emerging when new IT technologies (virtualization and Software Defined Network (SDN)/Network Functions Virtualization (NFV)) injecting new vigor into their networks. | | | IT-Driven Network Architecture | Issues of how to isolate, deploy, and manage virtual network slices securely | | | Heterogeneous Access | The heterogeneous access might imply that the access network architecture from different networks are different. | | | Privacy Protection | As open network platforms, 5G networks raise serious concerns on privacy leakage. The service type sensing may involve user privacy. | | Securing the 5G Era | Virtualisation | The risk of data leakage and the impact of virtualisation aware malware outbreaks | | | Cloud Services | Data is leaked and the code can be used to exploit the cloud provider or operator network. | | | Network Slicing | The security model for each slice may not be adapted to the use case. | ||Mobile IoT|Three common attack scenarios: Attacks on the devices (endpoints) via the applications running on the device remote attacks from the internet and via physical attack; Attacks on service platforms (i.e. the cloud) and Attacks on the communications links (e.g. Cellular, WLAN, BLE air interface etc.)| ||Artificial Intelligence (AI)|This technology is available to the attacker and AI-driven attacks are anticipated.|