Skip to main content

Telecommunication Security(Initial Idea 1)

(Caruso, M., 2020.)

one of the initial ideas about the main research is going to be about the Telecommunications Security.

The Telecommunication Technology is using different types to transmit or receive the data through the air or ground cables with a verity of devices such as satellites, repeater towers, TV signals, radars, internet lines, or another using methods, etc.(Carritech Telecommunication.2019)

 

(Scott Harrell, 2008)
This diagram shows the process of signals transmission and receiving the information through the air.

A smartphone transmits a signal to the nearest repeater tower which takes this signal and resend it again to others repeater towers rapidly. The closest repeter tower to the end access point reachs the signal to it. (Scott Harrell, 2008)

The famous style of attack in telecommunication system is The Man In The Middle, that will happen when the hacker is in the middle between two parties then starting to interception their communication and trying to damage or jamming the communication signal. (Security of telecommunication networks, 2019) however, an encryption data is used by telecommunication devices to prevent any access attempts from intruders. (Security of telecommunication networks, 2019)

Two-factor authentication is used between the two devices to confirm the identity of each device separately. This technology enables to create a specific code between two devices in order for each device to recognize the other, and prevent any intruders from penetrating this connection. (Netsparker Security Team, 2020)

(Netsparker Security Team, 2020)

References:

Carritech Telecommunication, 2019. Security of telecommunication networks. Available at: <https://www.carritech.com/news/telecommunication-network-security/> [Accessed 6 November 2020].

Netsparker Security Team, 2020. Man-In-The-Middle Attacks And How To Avoid Them. [image] Available at: <https://www.netsparker.com/blog/web-security/man-in-the-middle-attack-how-avoid/> [Accessed 6 November 2020].

Miller, L. and Gregory, P., n.d. CISSP For Dummies, 4Th Edition. 4th ed.

Caruso, M., 2020. Https://Unsplash.Com/Photos/0C9vmzuqct8. [image].

Scott Harrell, L., 2008. [image] Available at: <https://pursuitmag.com/wp-content/uploads/2008/07/cell-phones.jpg> [Accessed 15 November 2020].

Comments

  1. Really good, I'm looking forward to see more of your point is this subject .

    ReplyDelete
  2. Very good introduction to telecommunication, what are some of the used telecommunication technologies that you can expand on? e.g. satellite, radars, GSM etc.

    ReplyDelete

Post a Comment

Popular posts from this blog

WHAT IS THE CYBER SECURITY !!!!?

    Cyber security is the mode of defending computers, servers, mobile devices, electronic systems, networks, and data from hacker attacks. (What is Cyber Security?, 2020) we can be divided the cyber security into a few common categories: 1) Network security. 2)Application security. 3)Information security. 4)Operational security. 5)Disaster recovery and business continuity. 6)End-user education. (What is Cyber Security?, 2020)   An essential job in cyber security is protecting kinds of technology devices and Sensitive data from hacker attacks. (Taylor, H. 2020) These attacks impact on a different variety of users, whether if they are governments, individuals, institutions, banks, universities, Etc The methods of hacker attacks consist of many technical tools, these technical are developing rapidly to stay invisible and penetrate through the protective technical walls to harm or steal the personal data. (Taylor, H. 2020) The following types show the popular methods using b...

Questionnaire- the impact of jamming and fraud threats on GSM system.

 In accordance with the questionnaire,  57.1% of the participants have exposed to jamming operations while they were calling with other parties by the GSM system. Also, 81.8% of them have faced fraud calls from unknown individuals. This attack is called a phishing threat which asks the victim to share his personal information such as bank details, user names, passwords or other things that related to the victim with the hacker either by text message or phone call.

SOFTWARE EXAMPLE(CISCO PACKET TRACER)

I will illustrate how can we create a simultaneous GSM network by using Cisco Packet Tracer.  In the begging, I create a surveillance office, then connect them together as a network with different IP by switch device, which is also linked to the central office server. After that, I use 3 relay towers and link them to the central office server. The following picture shows the destination of the call from smart devices to the telecom provider and opposite. Source: CiscoNetAcad