Question

In: Computer Science

What tasks and deliverables are needed to implement "User Domain" risk mitigation recommendations?

What tasks and deliverables are needed to implement "User Domain" risk mitigation recommendations?

Solutions

Expert Solution

This section addresses the high level security design principles for the architecture and recommendations as to how to proceed. We take as our basis the set of security building blocks needed to meet the security objectives, not only in terms of the 5G architecture enforcement but also to address explicit requirements and also building blocks related to common best practice.

These three basic concepts confidentiality, integrity, and availability, commonly referred to as the CIA-triad are key aspects in design of secure systems. Though there are other concepts such as authentication, non- Repudiation which are also important characteristics of secure system design.

The project’s 5G security architecture builds on, extends (and in our opinion clarifies) the current 3GPP security architecture. The logical “dimension” of our architecture captures first of all security aspects associated with the various domains that are involved in delivering services over 5G networks. This part is therefore also strongly associated with the project’s trust model. Additionally, the logical part captures Security aspects associated with network layers and/or special types of network traffic. This is in our architecture associated with different strata. The functional “dimension” of our architecture comprises a set of security capabilities required to protect and uphold the security of the various domains and strata. In the functional dimension, we build on the 3GPP defined security feature groups. We also here extend and refine to adapt to a 5G context.

A goal of the architecture work within 5G-ENSURE has been to clearly provide rationale for the architecture’s structure and features, i.e. instead of staring from detailed security requirements, we seek to motivate which high level security problem is relevant in a 5G context, and then break that down into a manageable set of security objectives for 5G.


Related Solutions

Risk Mitigation Recommendation What’s the recommendation by the risk assessment team? What are the final decisions...
Risk Mitigation Recommendation What’s the recommendation by the risk assessment team? What are the final decisions made by HGA management? Justify their decisions based on cost benefit analysis. Please make copy paste available Must be 250 words
What is the risk mitigation matrix for an automotive company in India in relation to politics,...
What is the risk mitigation matrix for an automotive company in India in relation to politics, economic, social, operations & Supply chain? The answer should cover each category in Opportunities, external threats & Action for the above types.
Find an example of risk mitigation effort on a project and what are some ways of...
Find an example of risk mitigation effort on a project and what are some ways of mitigating risks,300 words or more
What will you review and assess in the User Domain as part of this security assessment?
What will you review and assess in the User Domain as part of this security assessment?
With a creditable source. 1. What would be at least 2 recommendations to implement to an...
With a creditable source. 1. What would be at least 2 recommendations to implement to an organization for Employee Assistant Programs(EAP) explain in details. 2. Listing the positive employee outcomes
How was the AppleWatch team built? What skills were needed and what were the main tasks...
How was the AppleWatch team built? What skills were needed and what were the main tasks assigned to team members?
1. What are the current recommendations from the CDC regarding vaccines needed during pregnancy and/or the...
1. What are the current recommendations from the CDC regarding vaccines needed during pregnancy and/or the immediate post-partum period? Explain. 2. There are a wide variety of lab tests that are ordered throughout pregnancy. Below is a small sample. Complete the table. Lab Test, Purpose, When is this checked? (if once then when?, if multiple times then when?), Possible results and How does the result alter the plan of care? Urine dipstick Blood type Rubella titer Glucose tolerance test Group...
Identify the developmental tasks of adolescence. Describe challenges that adolescents face, and explain what is needed...
Identify the developmental tasks of adolescence. Describe challenges that adolescents face, and explain what is needed for an adolescent to successfully master developmental tasks. Consider culture, ethnicity, family, and peer relationships
1. What are three risks and threats of the User Domain? 2. Why do organizations have...
1. What are three risks and threats of the User Domain? 2. Why do organizations have acceptable use policies (AUPs)? 3. Can Internet use and e-mail use policies be covered in an acceptable use policy? 4. Do compliance laws, such as the Health Insurance Portability and Accountability Act (HIPAA) or GLBA, play a role in AUP definition? 5. Why is an acceptable use policy not a fail-safe means of mitigating risks and threats within the User Domain?
What three recommendations would you give the US Army to implement or improve their diversity efforts?
What three recommendations would you give the US Army to implement or improve their diversity efforts?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT