Skip to main content

The Telecommunication Security (main body)

 

The man-in-the-middle is one of the common threats which face the GSM communication. This threat depends on any bugs between the main user and the network provider to be able to attack. It was found that the main goal of the hacker is eavesdropping on information between the two destinations, where he can make modifications on the wireless signals in order to allow him to have fully controlling on the victim's device. (Bocan and Cretu, 2006). This process would allow the hacker to delete, re-transmit, or change the information by using a modified device. This threat often happens with old technologies such as generation 2(2G) of mobile phone systems, especially with the weaknesses of security systems in these generations. In the light of that, the third generation 3 (3G) of mobile systems was developed by using algorithmic encryption and authentication systems which make the security of the call destination reliable and safety. Also, the protection of the data has been becoming more effective against this threat or any other threats. (Bocan and Cretu, 2006)


Malware is the second most common threat which impacting on communication systems globally. During the first half of 2020, the number of attacks which used malware technology was around 3.2 billion. (SonicWall, 2020) These penetration operations are often for financial theft and to sabotage the victim's information as well. There are some names and methods used in the field of malware threats, for example, Viruses, Spyware, Ransomware, and Trojans. (Johansen, 2019) Technical experts have lunched instructions to avoid penetration attempts by one of these programs. However, users must use defence systems to identify and deter any penetrations attempting that might harm the targeted device. One of these methods which used to deter hacking attempts is the anti-virus program, which is the major component of any device to prevent and protect information from any intruders. Continually updating the operating system helps to decrease the level of risks for any systems which used internet communications in order to fix any bugs that might enable the hacker to reach to the personal information. (Strawbridge, 2018) 

Comments

  1. Well written, however there are still a few grammatical errors and typos that you need to work on.

    ReplyDelete

Post a Comment

Popular posts from this blog

WHAT IS THE CYBER SECURITY !!!!?

    Cyber security is the mode of defending computers, servers, mobile devices, electronic systems, networks, and data from hacker attacks. (What is Cyber Security?, 2020) we can be divided the cyber security into a few common categories: 1) Network security. 2)Application security. 3)Information security. 4)Operational security. 5)Disaster recovery and business continuity. 6)End-user education. (What is Cyber Security?, 2020)   An essential job in cyber security is protecting kinds of technology devices and Sensitive data from hacker attacks. (Taylor, H. 2020) These attacks impact on a different variety of users, whether if they are governments, individuals, institutions, banks, universities, Etc The methods of hacker attacks consist of many technical tools, these technical are developing rapidly to stay invisible and penetrate through the protective technical walls to harm or steal the personal data. (Taylor, H. 2020) The following types show the popular methods using b...

SOFTWARE EXAMPLE(CISCO PACKET TRACER)

I will illustrate how can we create a simultaneous GSM network by using Cisco Packet Tracer.  In the begging, I create a surveillance office, then connect them together as a network with different IP by switch device, which is also linked to the central office server. After that, I use 3 relay towers and link them to the central office server. The following picture shows the destination of the call from smart devices to the telecom provider and opposite. Source: CiscoNetAcad

CASE STUDY- VODAFONE GLOBAL COMPANY (INTRODUCTION)

                 (caveman, 2017)              The Vodafone Global Company is considered a leading telecommunications system in the Europ and Africa. It was established in 1982 by one of the British electronics companies which called Racal Telecommunication.   (The History of Vodafone, 2020)   In the begging of 1985, the first office for this company was located in Newbury, Berkshire. Vodafone's name comes from (Voice Data Fone), which means the elements of the telecommunication system.  (The History of Vodafone, 2020)  The company has made many agreements acquisition on various telecommunication companies globally during the last 45 years ago, Which contributed obviously to spread the name of the company rapidly across the world. The biggest takeovers in the history was made in 1999, when the Vodafone has been taken over the German Telecom Giant Mannesmann by 112£ billion. ( BBC News...