2. Securing mobile architectures
When deploying IPv6, the operator's primary objective is to ensure that the move to a new IP protocol version is transparent to the end user. As such, customers must be able to access services without restriction, and must not suffer any inconvenience due to a change in their type of connectivity.
This evolution must be transparent for the operator. It is therefore essential that the operator guarantees that the introduction of IPv6 will not give rise to problems due to a lack of protection. The operator must guarantee that the security level of the mobile infrastructure, once the new IP protocol version has been introduced, is at least equivalent to that observed before the introduction of IPv6. This requires the operator to assess its IPv4 network and service security architecture, and to master the new vulnerabilities induced by the IPv6 protocol and protect...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Securing mobile architectures
Bibliography
Websites
• World IPv6 launch – measurements http://www.worldipv6launch.org
• Arbor Special Report – Worldwide Infrastructure Security Report https://www.netscout.com/arbor-ddos
• Secure Works – Assess your risk from an advanced persistent...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference