Application Security Architecture Authentication
CertificationsCorporate ComplianceCryptology
Disaster RecoveryEnterprise SecurityExploits
FirewallsIncident HandlingIntrusion Detection
OS SecurityPolicies and ProceduresSecurity Basics
Security ManagementSecurity ToolsServers
StandardsVoIPVulnerability Management
Web SecurityWiFi SecurityWorms and Viruses

Response redefined – ICT and the future of public safety

by Ericsson

Mobile broadband and distributed computing, coupled with industry-wide standardization efforts, can transform emergency response. This paper explains how to use ICT architecture and consulting frameworks to create truly mission-critical, multiagency platforms that enable effective communications and information sharing. At the same time, factors such as affordability and ease of implementation should lead agencies to embrace solutions based on open standards.
» Read more

5G systems – enabling the transformation of industry and society

by Ericsson

A digital transformation is taking place in almost every industry, disrupting and making us rethink our ways of working. Through an unprecedented ability to share information, people and industries are collaborating more, creating solutions that combine many different areas of expertise and overturning traditional business models. This cross-industry transformation has created a need to evolve wireless connectivity for the fifth generation of mobile technology. The goal is to expand the broadband capability of mobile networks, and to provide specific capabilities for consumers and for various industries and society at large unleashing the potential of the Internet of Things.
In this paper, the 5G use cases and their respective requirements are outlined first. The evolution of the network components toward 5G is then presented, followed by a description of the 5G system. Finally, the 5G system is exemplified through three concrete use cases.
» Read more

5G radio access – capabilities and technologies

by Ericsson

The capabilities of 5G wireless access must extend far beyond previous generations of mobile communication. Examples of these capabilities include very high data rates, very low latency, ultra-high reliability, energy efficiency and extreme device densities, and will be realized by the development of LTE in combination with new radio-access technologies. Key technology components include extension to higher frequency bands, access/backhaul integration, device-to-device communication, flexible duplex, flexible spectrum usage, multi-antenna transmission, ultra-lean design, and user/control separation.
» Read more

Hyperscale cloud – reimagining data centers from hardware to applications

by Ericsson

The hyperscale approach can help industries meet the IT capacity demands of the Networked Society. Transforming data centers in this way goes beyond hardware to impact the software layer, including hypervisors, operating systems, cloud platforms and – ultimately – applications.
However, challenges must be overcome if hyperscale is to be fully realized. As well as revealing the scope of this vision, this paper sets out the key considerations and questions for data center operators at every layer – from hardware to applications.
» Read more

IoT Security

by Ericsson

The IoT brings a new set of issues, such as the security, safety, and robustness of cyber-physical systems. Novel types of attack, as well as new privacy and cybersecurity regulations, may take many industries by surprise. Yet the economic benefits of the IoT as an enabler for analytics, automation, and process and resource optimization cannot be overstated. To succeed with the transformation that the IoT brings about, industries need to gather competence and understand new threats and how to mitigate them.
This white paper provides an insight into the major security and privacy challenges due to be met in the Networked Society. Specifically, it addresses security, safety, and privacy in the entire IoT value chain, which includes devices, networks, cloud, infrastructure, applications, and services. The paper also identifies the main security challenges and approaches that need to be taken in the IoT sphere to withstand attacks, and discusses how IoT security and privacy need to be addressed through technology, standardization, and regulation.
» Read more

Bluetooth mesh networking

by P. DiMarco, P. Skillermark, A. Larmo, and P. Arvidson

Bluetooth mesh, officially launched in July 2017, is a highly anticipated addition to the Internet of Things (IoT) connectivity space. Bluetooth is a widely used short-range technology found in smartphones, tablets and consumer electronics, and the Bluetooth Special Interest Group (SIG) has a strong reputation for delivering specifications and tools that guarantee global, multi-vendor interoperability.
The Bluetooth Mesh Profile standardizes a full stack connectivity solution for mesh networking, extending Bluetooth applicability for IoT use cases. Ericsson is a founding member of the Bluetooth SIG and has actively participated in the definition of the architecture and the development of the mesh profile specification.
This white paper provides an overview of the Bluetooth Mesh Profile and highlights some of its unique features. It also presents a large-scale building automation use case and illustrates the impact of configuration and deployment strategies on the mesh network.
» Read more

A Lightbulb Worm?

by Colin O’Flynn

This whitepaper is designed to show some details of the Philips Hue system. It is not designed to demonstrate any specific attack, but instead a chance to “poke around” to see what security features are present. It is designed to serve as a reference for those designing similar systems, to give an idea what attack surfaces might be exploited.
» Read more

Mirai: New wave of IoT botnet attacks hits Germany

by Semantec Security Response

A new wave of attacks involving the Mirai botnet has crippled internet access for nearly a million home users in Germany. The latest attacks used a new version of the Mirai malware (Linux.Mirai) which is configured to exploit a weakness found in routers widely used in Germany. New variant of malware used in attacks that knocked 900,000 home internet users offline. Read more in this posting by Semantec Security Response.
» Read more