Cover Image
市場調查報告書

3G及LTE網路的無線安全:市場與預測

Wireless Security in 3G and LTE Networks: Market and Forecast 2014 - 2019

出版商 Mind Commerce 商品編碼 299356
出版日期 內容資訊 英文 96 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
3G及LTE網路的無線安全:市場與預測 Wireless Security in 3G and LTE Networks: Market and Forecast 2014 - 2019
出版日期: 2014年04月01日 內容資訊: 英文 96 Pages
簡介

由於寬頻無線的急速擴大,終端用戶幾乎在所有日常活動越來越依賴終端設備。第4代(4G)的行動電話LTE,因為設備攻擊劇增,需要解決的漏洞裸露出來,特別顯示出獨特的機會/課題。

本報告提供3G、LTE網路的無線安全市場相關調查、全球LTE市場的狀況與預測、無線安全威脅、行動應用程式市場預測、各國LTE無線網路分析、主要的威脅的案例研究,及今後展望等彙整資料,為您概述為以下內容。

第1章 摘要整理

第2章 簡介

第3章 LTE的演進:全球展望

  • 從2G到3G,並且現在轉換到LTE
  • 從LTE 到LTE ADVANCED
  • 無線網路:全球市場狀況
  • LTE:全球市場狀況
  • LTE用戶比較:各地區
  • 全球LTE引進情形

第4章 LTE市場預測

  • 行動電話加入、行動技術加入

第5章 無線安全比較:UTMS(3G) vs. LTE(4G)

  • 無線安全的簡介
  • 安全架構:UTMS(3G) 及 LTE(4G)
  • 在LTE中無線安全不同的理由
  • 無線安全的漏洞:對行動裝置而言緊急的問題
  • 無線設備的安全風險
  • 行動環境的安全課題相關的事實
  • DNS(域名系統)及LTE安全

第6章 行動的無線安全威脅:LTE的模式

  • 無線LTE的電腦網路威脅形勢
  • 網站安全威脅
  • 安全威脅及商務的影響
  • 類別的威脅
  • 平台的威脅
  • LTE威脅媒體趨勢

第7章 無線LTE設備市場預測

  • 整體無線設備市場預測
  • 各地區的無線設備市場預測
  • LTE加入無線設備用戶市場預測

第8章 行動應用程式市場預測

  • 簡介
  • 預測

第9章 IP環境的行動安全:LTE的展望

  • LTE:IP型網路
  • 行動安全威脅的種類
  • 惡意程式:對LTE(前瞻長程演進)來說的巨大威脅
  • 無線安全:環境的變化的展望
  • 信號傳達衍生威脅:直徑
  • 第三方的威脅
  • RAN、回程傳輸:對行動「駭客主義者」來說LTE的弱點

第10章 LTE展望的無線安全分析

  • 無線LTE威脅分析
  • 無線LTE威脅市場的狀況、展望

第11章 LTE無線網路:各國分析

  • LTE安全認識
  • LTE網路供應商市場佔有率

第12章 為了防禦無線事故的獨特的倡議

  • 英國企業的獨特的行動安全
  • 由於預防應用的無線LTE威脅的特定
  • 對防毒、竊取的行動安全

第13章 LTE相關利益者及廠商市場佔有率

  • 各地區的LTE引進
  • 漏洞的比例 智慧型手機vs.平板電腦設備
  • 無線防毒軟體廠商市場佔有率
  • 無線安全企業的市場佔有率
  • 供應商的LTE基礎設施的商業廣告
  • 支援LTE平板電腦、智慧型手機廠商

第14章 LTE安全市場相關KPI(主要意見領袖)的見解

  • LOWELL MCADAM, CEO, VERIZON
  • DAN HESSE, CEO, SPRINT
  • JOHN T CHAMBER, CEO, CISCO
  • VINCE STECKLER, CEO, AVAST
  • STEVE BENNET, CEO, SYMANTEC

第15章 案例分析

  • DroidDream惡意程式:破壞夢想
  • BadNews:對行動用戶來說實際上是壞消息
  • 金錢的駭侵:手機上的銀行詐騙
  • 感恩節:對駭客而言的重要日子
  • 企業環境的無線威脅
  • 一個單純的圈套可使城市的LTE網路無效
  • 高速LTE恐怖主義者所採取的攻擊來源
  • 行動付款的電腦網路罪犯的網路
  • 病毒下載的行動應用程式下載的地基
  • 行動WiFi駭侵
  • 非法入侵智慧型手機、平板電腦的遊戲應用

第16章 結論、建議

  • 結論
  • 無線LTE安全課題趨勢
  • LTE的漏洞
  • 其他LTE安全課題
  • 建議
  • LTE安全課題的現有解決方案
  • 行動應用程式開發者的建議
  • Wi-Fi路由器、網路基地台的IOS推薦設定
  • 行動支付的安全建議
  • IP網路安全手法

第17章 用語

圖表清單

目錄

With the rapid expansion of broadband wireless, end-users increasingly rely upon handheld devices for almost all daily living activities. Fourth generation (4G) cellular LTE in particular represents a unique opportunity/challenge as device attacks are growing at a rapid rate, exposing vulnerabilities that must be addressed. Our research indicates that Android malware in particular will grow rapidly and will be considered most vulnerable OS for LTE.

This research is most reading for anyone involved in LTE network planning, device procurement, and/or application development and management. This report includes forecasting for the period 2014 - 2019. The report complements Mind Commerce research in LTE device, subscriptions, and application market analysis as well as security threats for specific applications such as mobile games.

Table of Contents

1.0. EXECUTIVE SUMMARY

2.0. INTRODUCTION

3.0. EVOLUTION OF LTE: GLOBAL PERSPECTIVE

  • 3.1. TRANSITION FROM 2G TO 3G AND NOW LTE
  • 3.2. LTE TO LTE ADVANCED
  • 3.3. WIRELESS NETWORK: GLOBAL MARKET SCENARIO:
  • 3.4. LTE: GLOBAL MARKET SCENARIO:
  • 3.5. COMPARISON OF LTE USERS BY REGION
  • 3.6. WORLDWIDE LTE DEPLOYMENT STATUS:

4.0. LTE MARKET PROJECTION 2014 - 2019

  • 4.1. MOBILE PHONE SUBSCRIPTION AND MOBILE TECHNOLOGY SUBSCRIPTION

5.0. WIRELESS SECURITY COMPARISON: UTMS (3G) VS. LTE (4G)

  • 5.1. INTRODUCTION TO WIRELESS SECURITY
  • 5.2. SECURITY ARCHITECTURE: UTMS (3G) AND LTE (4G)
  • 5.3. WHY WIRELESS SECURITY IS DIFFERENT IN LTE
  • 5.4. WIRELESS SECURITY VULNERABILITY: A BURNING ISSUE FOR MOBILE DEVICES
  • 5.5. SECURITY RISKS IN WIRELESS DEVICES:
  • 5.6. FACTS ABOUT SECURITY ISSUES IN MOBILE ENVIRONMENT
  • 5.7. DOMAIN NAME SYSTEM (DNS) AND LTE SECURITY

6.0. WIRELESS SECURITY THREATS ON MOBILE: LTE PATTERN

  • 6.1. WIRELESS LTE CYBER THREAT LANDSCAPE
  • 6.2. WEB SECURITY THREAT
  • 6.3. SECURITY THREATS AND BUSINESS IMPACTS
  • 6.4. CATEGORY POSED THREATS
  • 6.5. PLATFORM POSED THREATS
  • 6.6. LTE THREAT AGENTS TRENDS

7.0. WIRELESS LTE DEVICE MARKET PROJECTIONS 2014-2019

  • 7.1. OVERALL WIRELESS DEVICE MARKET FORECAST:
  • 7.2. REGIONAL WIRELESS DEVICE MARKET FORECAST
  • 7.3. LTE SUBSCRIBED WIRELESS DEVICE USERS MARKET FORECAST:

8.0. MOBILE APPLICATION MARKET PROJECTION 2014-2019

  • 8.1. MOBILE APPLICATION MARKET: INTRODUCTION
  • 8.2. MOBILE APPLICATION MARKET FORECAST 2014 - 2019

9.0. MOBILE SECURITY IN IP ENVIRONMENT: LTE PERSPECTIVE

  • 9.1. LTE - AN IP BASED NETWORK
  • 9.2. TYPES OF MOBILE SECURITY THREATS
    • 9.2.1. APPLICATION BASED THREATS
    • 9.2.2. WEB BASED THREATS
    • 9.2.3. NETWORK BASED THREATS
    • 9.2.4. PHYSICAL THREATS
  • 9.3. MALWARE: BIG THREATS FOR LTE
  • 9.4. WIRELESS SECURITY: ENVIRONMENTAL CHANGE OUTLOOK
  • 9.5. SIGNALLING DERIVED THREATS: DIAMETER
  • 9.6. THIRD PARTY SOURCED THREATS
  • 9.7. RAN AND BACKHAUL: WEAK POINTS IN LTE FOR MOBILE "HACTIVISTS"

10.0. WIRELESS SECURITY ANALYSIS ON LTE PERSPECTIVE

  • 10.1. ANALYSIS OF WIRELESS LTE THREATS
    • 10.1.1. LTE NETWORKS: AN ACCESS POINT AND THREAT FOR APPLICATIONS
    • 10.1.1. LTE NETWORKS: REGIONAL DISTRIBUTION OF MOBILE APPLICATION USERS
    • 10.1.2. MOBILE USER AWARENESS OF WIRELESS SECURITY 2013 - 2019
  • 10.2. WIRELESS LTE THREATS MARKET STATUS AND OUTLOOK
    • 10.2.1. WIRELESS LTE THREATS AND OPPORTUNITIES
    • 10.2.2. OUTLOOK OF WIRELESS LTE NETWORKS THREATS
    • 10.2.1. GLOBAL LTE CONNECTIONS

11.0. LTE WIRELESS NETWORK - COUNTRY-WISE ANALYSIS

  • 11.1. LTE SECURITY AWARENESS 2014 - 2019
    • 11.1.1. USA
    • 11.1.2. UNITED KINGDOM
    • 11.1.3. SOUTH KOREA
    • 11.1.4. AFRICA
    • 11.1.5. AUSTRALIA
    • 11.1.6. BRAZIL
    • 11.1.7. CANADA
    • 11.1.8. BELGIUM
    • 11.1.9. FRANCE
    • 11.1.10. GERMANY
    • 11.1.11. RUSSIA
    • 11.1.12. MIDDLE EAST
    • 11.1.13. JAPAN
    • 11.1.14. CHINA
    • 11.1.15. INDIA
  • 11.2. LTE NETWORK PROVIDER MARKET SHARE
    • 11.2.1. USA
    • 11.2.2. UNITED KINGDOM
    • 11.2.3. AFRICAN REGION
    • 11.2.4. MIDDLE EAST REGION
    • 11.2.5. SOUTH KOREA
    • 11.2.6. JAPAN
    • 11.2.7. RUSSIA
    • 11.2.8. GERMANY
    • 11.2.9. AUSTRALIA
    • 11.2.10. HONGKONG
    • 11.2.11. CHINA
    • 11.2.12. INDIA
    • 11.2.13. GLOBAL TOP 10 SERVICE PROVIDER OF LTE NETWORK SUBSCRIBER BASE

12.0. DISTINCTIVE INITIATIVE TO PREVENT WIRELESS INCIDENT

  • 12.1. UNIQUE MOBILE SECURITY BY BRITISH FIRM
  • 12.2. WIRELESS LTE THREAT IDENTIFICATION THROUGH PREVENTION APPLICATION
  • 12.3. MOBILE SECURITY AGAINST ANTIVIRUS AND THEFT

13.0. LTE STAKEHOLDERS AND VENDOR MARKET SHARE

  • 13.1. REGIONAL LTE DEPLOYMENT 2014
  • 13.2. VULNERABILITY % SMARTPHONE VS. TABLET DEVICE 2014 - 2019
  • 13.3. WIRELESS ANTIVIRUS VENDORS MARKET SHARE 2013
  • 13.4. WIRELESS SECURITY COMPANY MARKET SHARE 2013
  • 13.5. LTE INFRASTRUCTURE COMMERCIAL BY VENDORS
  • 13.6. LTE SUPPORTING TABLET AND SMARTPHONE MANUFACTURERS

14.0. KEY OPINION LEADERS VIEW ON LTE SECURITY MARKET

  • 14.1. LOWELL MCADAM, CEO, VERIZON
  • 14.2. DAN HESSE, CEO, SPRINT
  • 14.3. JOHN T CHAMBER, CEO, CISCO
  • 14.4. VINCE STECKLER, CEO, AVAST
  • 14.5. STEVE BENNET, CEO, SYMANTEC

15.0. CASE ANALYSIS

  • 15.1. DROIDDREAM MALWARE: SPOILING YOUR DREAM
  • 15.2. BAD NEWS: REAL BAD NEWS FOR MOBILE USERS
  • 15.3. HACKING YOUR MONEY: BANKING FRAUDS OVER MOBILE
    • 15.3.1. UK BANKS ATTACKED USING MALWARE: £1M FRAUD
    • 15.3.2. EUROGRABBER ATTACK
  • 15.4. THANKS GIVING: BIG DAY FOR HACKERS
    • 15.4.1. INTRODUCTION: HACKERS TARGETING SHOPPERS' SMARTPHONES
    • 15.4.2. HOW THE SMARTPHONE ATTACKED
    • 15.4.3. RESEARCHERS OPINION AND CONCLUSION
  • 15.5. WIRELESS THREAT IN CORPORATE ENVIRONMENT
    • 15.5.1. INTRODUCTION
    • 15.5.2. ATTACK IN CORPORATE ENVIRONMENT:
  • 15.6. ONE SIMPLE TRICK COULD DISABLE A CITY'S LTE NETWORK
    • 15.6.1. INTRODUCTION
    • 15.6.2. FEMTOCELL IS A CONTRIBUTOR IN LTE ATTACKS
  • 15.7. HIGH SPEED LTE IS A SOURCE OF ATTACK FOR TERRORIST
    • 15.7.1. INTRODUCTION
    • 15.7.2. RESEARCHERS QUOTE ON "LTE AS A SOURCE OF TERRORIST ATTACK"
  • 15.8. CYBERCRIMINAL'S NETWORK ON MOBILE PAYMENTS
    • 15.8.1. INTRODUCTION
  • 15.9. MOBILE APPLICATION DOWNLOAD FOUNDATION OF VIRUS DOWNLOAD
    • 15.9.1. INTRODUCTION
    • 15.9.2. VIRUSES INFILTRATE BY APPLICATIONS DOWNLOADS
  • 15.10. MOBILE WIFI HACKING
  • 15.11. GAME APPLICATION HACKED SMARTPHONE AND TABLET

16.0. CONCLUSION & RECOMMENDATIONS

  • 16.1. CONCLUSIONS
  • 16.2. TRENDING WIRELESS LTE SECURITY ISSUES IN 2014
    • 16.2.1. TARGETED ATTACKS
    • 16.2.2. MORE HACTIVISM
    • 16.2.3. CYBER ESPIONAGE AND WARFARE
    • 16.2.4. BIG BROTHER WATCHING EVEN MORE
    • 16.2.5. INCREASE IN MALWARE
    • 16.2.6. PRIVACY RIGHTS ERODING
    • 16.2.7. CYBER EXTORTION
    • 16.2.8. APPLE UNDER ATTACK
    • 16.2.9. ANDROID IS EVEN WORSE
    • 16.2.10. UN-PATCHED EXPLOITS IN JAVA
  • 16.3. VULNERABILITIES IN LTE
    • 16.3.1. VULNERABILITY IN LTE SYSTEM ARCHITECTURE
    • 16.3.2. VULNERABILITY IN ACCESS AND HANDOVER PROCEDURES
    • 16.3.3. VULNERABILITY IN IMS SECURITY AND HENB SECURITY
  • 16.4. OTHER LTE SECURITY ISSUES
  • 16.5. RECOMMENDATION
    • 16.5.1. PROTECTING CORPORATE NETWORK
  • 16.6. EXISTING SOLUTIONS FOR LTE SECURITY ISSUES
  • 16.7. RECOMMENDATION FOR MOBILE APPLICATION DEVELOPERS
  • 16.8. IOS RECOMMENDED SETTINGS FOR WI-FI ROUTERS AND ACCESS POINTS
  • 16.9. RECOMMENDED SECURITY FOR MOBILE PAYMENT
    • 16.9.1. DETECTING IF CARDHOLDER DATA IS BEING SKIMMED
    • 16.9.2. IDENTIFYING AND PROTECTING WLAN FROM UNAUTHORIZED DEVICES
  • 16.10. IP NETWORK SECURITY MEASURES:

17.0. ACRONYMS

List of Figures

  • Figure 1: System Architecture of Wireless LTE
  • Figure 2: Wireless Technologies
  • Figure 3: LTE Evolution
  • Figure 4: LTE and Mobile Evolution
  • Figure 5: Wireless Network and comparison
  • Figure 6: Wireless Network Global Market Scenario
  • Figure 7: LTE Global Market Scenario
  • Figure 8: LTE by Region
  • Figure 9: LTE Worldwide Deployment Status
  • Figure 10: Mobile Phone and Technology Subscription
  • Figure 11: Global LTE User Projection 2014 - 2019
  • Figure 12: The UTRAN Architecture
  • Figure 13: The E-UTRAN Architecture
  • Figure 14: The LTE Security Architecture
  • Figure 15: Top 10 Mobile Malware Encounters
  • Figure 16: Wireless Security Threats
  • Figure 17: LTE Web Security Threats
  • Figure 18: Security Implications on Organizational Goals
  • Figure 19: Business Technology and Threats
  • Figure 20: Category Posed Threats
  • Figure 21: Platform Posed LTE Threats
  • Figure 22: Top Threats and Sources
  • Figure 23: Wireless Devices Market Projection 2014 - 2019
  • Figure 24: Regional Wireless Devices Market 2014 - 2019
  • Figure 25: LTE Subscription 2014 - 2019
  • Figure 26: Types of Mobile Applications
  • Figure 27: Free Apps vs. Paid Apps 2014 - 2019
  • Figure 28: Mobile Application Market 2014 - 2019
  • Figure 29: LTE Network Architecture
  • Figure 30: Functionalities of E-UTRAN and EPC
  • Figure 31: Web-based Threats
  • Figure 32: Worldwide Malware Infection Rate
  • Figure 33: Malware Infected Applications
  • Figure 34: Wireless Security Changes
  • Figure 35: RAN and Black-haul in LTE
  • Figure 36: Average Daily Subscribers for LTE and 3G
  • Figure 37: Regional Mobile Application LTE Users
  • Figure 38: Mobile User Awareness of Wireless Security 2014 - 2019
  • Figure 39: LTE Smartphone Sales Forecast
  • Figure 40: Global LTE Connections
  • Figure 41: USA: LTE Incident Awareness 2014 - 2019
  • Figure 42: UK: LTE Incident Awareness 2014 - 2019
  • Figure 43: South Korea: LTE Incident Awareness 2014 - 2019
  • Figure 44: Africa: LTE Incident Awareness 2014 - 2019
  • Figure 45: Australia: LTE Incident Awareness 2014 - 2019
  • Figure 46: Brazil: LTE Incident Awareness 2014 - 2019
  • Figure 47: Canada: LTE Incident Awareness 2014 - 2019
  • Figure 48: Belgium: LTE Incident Awareness 2014 - 2019
  • Figure 49: France: LTE Incident Awareness 2014 - 2019
  • Figure 50: Germany: LTE Incident Awareness 2014 - 2019
  • Figure 51: Russia: LTE Incident Awareness 2014 - 2019
  • Figure 52: Middle East: LTE Incident Awareness 2014 - 2019
  • Figure 53: Japan: LTE Incident Awareness 2014 - 2019
  • Figure 54: China: LTE Incident Awareness 2014 - 2019
  • Figure 55: India LTE incident Awareness 2014 - 2019
  • Figure 56: USA LTE Service Provider
  • Figure 57: UK LTE Service Provider
  • Figure 58: Africa LTE Service Provider
  • Figure 59: Middle East LTE Service Provider
  • Figure 60: South Korea LTE Service Provider
  • Figure 61: Japan LTE Service Provider
  • Figure 62: Russia LTE Service Provider
  • Figure 63: Germany LTE Service Provider
  • Figure 64: Australia LTE Service Provider
  • Figure 65: Hong Kong LTE Service Provider
  • Figure 66: China LTE Service Provider
  • Figure 67: India LTE Service Provider
  • Figure 68: Mobile Security Model
  • Figure 69: LTE threat identification application
  • Figure 70: Regional Percentage of LTE deployment 2014
  • Figure 71: Vulnerability % Smartphone vs. Tablet Devices 2014 - 2019
  • Figure 72: Wireless Antivirus Vendors Market Share 2013
  • Figure 73: Global Security Vendor Company Market Share 2013
  • Figure 74: Top LTE Infrastructure Commercial Vendors 2013
  • Figure 75: LTE Supporting Tablet and Smartphone Manufacturers 2013
  • Figure 76: BOWLTIME: DROIDDREAM Infected Application
  • Figure 77: BADNEWS infected Application
  • Figure 78: Attacker Targeting Smartphones and Tablets
  • Figure 79: Wireless Threats in Corporate Environment
  • Figure 71: Mobile Payment Attacks
  • Figure 72: Virus Spread through Application Download
  • Figure 73: Game Application on Smartphone

List of Tables

  • Table 1: Types of Application Based Threats
  • Table 2: Types of Wireless Attacks
  • Table 3: Top 10 Service Provider of LTE Network Worldwide
  • Table 4: Top Cellular and WiFi Threats in 2014
Back to Top