Zobrazit minimální záznam

Technologie 5G: Posouzení hrozeb a rizik implementace
dc.contributor.advisorŠpelda, Petr
dc.creatorLa Rosa, Giampaolo
dc.date.accessioned2021-02-24T10:49:57Z
dc.date.available2021-02-24T10:49:57Z
dc.date.issued2021
dc.identifier.urihttp://hdl.handle.net/20.500.11956/124605
dc.description.abstractThe new 5G technology, next generation of telecommunication and mobile network, is all around the world in course of inspection and inquiry for its astonishing novelty, from new services to functions and scalability. However, every technology brings alongside new possibilities and new threats scenarios, especially in this case where the impact on the present network is promised to be massive, with brand new features allowed by 5G, like Internet of Things, widespread virtualization and huge leap forward in rapidity and capability of the mobile transmission. An increase in the network surface, considered as more connections, more devices connected and more traffic load of data, will expand also the possible entry point and fault exploitable by a malevolent actor, raising common concern about the technology. The deployment of such a technology on European soil, especially in some states of the Union, caused uproar and critics primarily in the security field. Following a global trend, but also leading a best practice approach, the EU developed a series of mechanisms and agencies that are challenged to oversees the gradual shift from old 4G LTE to 5G. In this paper a Critical Information Infrastructure Protection (CIIP) framework is used to analyse the criticalities of the new technology. Definition of...en_US
dc.languageEnglishcs_CZ
dc.language.isoen_US
dc.publisherUniverzita Karlova, Fakulta sociálních vědcs_CZ
dc.subject5Gen_US
dc.subjectcyber securityen_US
dc.subjectcyber threatsen_US
dc.subjectcyber risksen_US
dc.subject5Gcs_CZ
dc.subjectcyber securitycs_CZ
dc.subjectcyber threatscs_CZ
dc.subjectcyber riskscs_CZ
dc.titleThe 5G Technology Nexus: Assessing Threats and Risks of Implementationen_US
dc.typediplomová prácecs_CZ
dcterms.created2021
dcterms.dateAccepted2021-02-03
dc.description.departmentDepartment of Security Studiesen_US
dc.description.departmentKatedra bezpečnostních studiícs_CZ
dc.description.facultyFakulta sociálních vědcs_CZ
dc.description.facultyFaculty of Social Sciencesen_US
dc.identifier.repId214937
dc.title.translatedTechnologie 5G: Posouzení hrozeb a rizik implementacecs_CZ
dc.contributor.refereeStřítecký, Vít
thesis.degree.nameMgr.
thesis.degree.levelnavazující magisterskécs_CZ
thesis.degree.disciplineInternational Security Studiesen_US
thesis.degree.disciplineMezinárodní bezpečnostní studiacs_CZ
thesis.degree.programPolitologiecs_CZ
thesis.degree.programPolitical Scienceen_US
uk.thesis.typediplomová prácecs_CZ
uk.taxonomy.organization-csFakulta sociálních věd::Katedra bezpečnostních studiícs_CZ
uk.taxonomy.organization-enFaculty of Social Sciences::Department of Security Studiesen_US
uk.faculty-name.csFakulta sociálních vědcs_CZ
uk.faculty-name.enFaculty of Social Sciencesen_US
uk.faculty-abbr.csFSVcs_CZ
uk.degree-discipline.csMezinárodní bezpečnostní studiacs_CZ
uk.degree-discipline.enInternational Security Studiesen_US
uk.degree-program.csPolitologiecs_CZ
uk.degree-program.enPolitical Scienceen_US
thesis.grade.csVýborněcs_CZ
thesis.grade.enExcellenten_US
uk.abstract.enThe new 5G technology, next generation of telecommunication and mobile network, is all around the world in course of inspection and inquiry for its astonishing novelty, from new services to functions and scalability. However, every technology brings alongside new possibilities and new threats scenarios, especially in this case where the impact on the present network is promised to be massive, with brand new features allowed by 5G, like Internet of Things, widespread virtualization and huge leap forward in rapidity and capability of the mobile transmission. An increase in the network surface, considered as more connections, more devices connected and more traffic load of data, will expand also the possible entry point and fault exploitable by a malevolent actor, raising common concern about the technology. The deployment of such a technology on European soil, especially in some states of the Union, caused uproar and critics primarily in the security field. Following a global trend, but also leading a best practice approach, the EU developed a series of mechanisms and agencies that are challenged to oversees the gradual shift from old 4G LTE to 5G. In this paper a Critical Information Infrastructure Protection (CIIP) framework is used to analyse the criticalities of the new technology. Definition of...en_US
uk.file-availabilityV
uk.grantorUniverzita Karlova, Fakulta sociálních věd, Katedra bezpečnostních studiícs_CZ
thesis.grade.codeB
uk.publication-placePrahacs_CZ
uk.thesis.defenceStatusO


Soubory tohoto záznamu

Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail

Tento záznam se objevuje v následujících sbírkách

Zobrazit minimální záznam


© 2017 Univerzita Karlova, Ústřední knihovna, Ovocný trh 560/5, 116 36 Praha 1; email: admin-repozitar [at] cuni.cz

Za dodržení všech ustanovení autorského zákona jsou zodpovědné jednotlivé složky Univerzity Karlovy. / Each constituent part of Charles University is responsible for adherence to all provisions of the copyright law.

Upozornění / Notice: Získané informace nemohou být použity k výdělečným účelům nebo vydávány za studijní, vědeckou nebo jinou tvůrčí činnost jiné osoby než autora. / Any retrieved information shall not be used for any commercial purposes or claimed as results of studying, scientific or any other creative activities of any person other than the author.

DSpace software copyright © 2002-2015  DuraSpace
Theme by 
@mire NV