Professional Custom Accounting: Describe GSM security goals and how does SMS meet those goals.

Professional Custom Accounting: Describe GSM security goals and how does SMS meet those goals.

1. In an analog cellular structure, what is needed to establish valid authentication?

2. What is a rogue base station?

3. What is snarfing and how does it work?

4. Is there such a thing as legal eavesdropping? Give an example.

5. How does cellular authentication work? Briefly explain the process.

6. Describe GSM security goals and how does SMS meet those goals. Be specific.

Please follow and like us: