Additional Interfaces. Many of the problems in the Data intensive infrastructure may come to increased number of interfaces additionally for Data than those were present for voice only initial 2G systems, hence, infra vendors must give special attention to interfaces and their related vulnerability. Such vendors may ensure that they provide additional notes that they have taken care of the same and the test mechanism and methodology adopted by them with adequate evidence. Some of these interfaces are listed below: Gi: Exposed to Internet and corporate networks Gp: Primary interconnection pt. between operator’s n/w and un-trusted external networks Gc: Allows access (via HLR) to key user info. from remote network during roaming Vulnerable Interfaces Gi: Exposed to all threats from Internet: viruses, DoS, and malicious network traffic Gp: Connection hijacking, overbilling from a roaming network during handover Gn: Not encrypted by default
Appears in 5 contracts
Samples: Telecommunications, Security and Business Continuity Agreement, Security and Business Continuity Agreement