Executive Summary
Mobile network operators safeguard the confidentiality, integrity and availability of communications across the network by securing critical assets (hardware, software and data) and preventing unauthorised access or intrusion to any of the constituent nodes or links.
Since the end-user mobile device is the primary access point to the network from a user’s perspective, protecting the integrity of mobile devices is a critical requirement. By necessity, mobile networks are accessible to a very wide range of users, via a variety of devices and connection protocols.
They must also interconnect with many other communications networks around the world (fixed, mobile, internet service providers and enterprise) in order to offer the anywhereanytime functionality of modern networks. Protecting networks and devices is therefore highly complex in practice.