Return to Home PageISACA Logo at top of page
  • Credentialing
  • Membership
  • Enterprise
  • PARTNERSHIPS
  • Training & Events
  • Resources
  • Join
    • PROFESSIONAL JOIN
    • RECENT GRAD JOIN
    • STUDENT JOIN
  • About Us
    • ABOUT US HOME
    • WHO WE ARE
    • NEWSROOM
    • PARTICIPATE & VOLUNTEER
    • LEADERSHIP & GOVERNANCE
    • ADVOCACY
    • ISACA FOUNDATION
    • CONTACT US
    • CODE OF PROFESSIONAL ETHICS
  • CAREERS
    • Career Journey
    • Career Center
    • Careers at ISACA
  • SUPPORT
  • Store
    Total
    View Cart Checkout

    No items have been added to your cart yet

    Browse Search
  • Cart (0)
  • Sign In
  • MEMBERSHIP
  • CERTIFICATIONS
  • CERTIFICATES
  • CPE CERTIFICATES
  • Engage
  • LEARNING ACCESS
  • RESOURCES
  • ORDER HISTORY
  • Redeemable Products
  • Sign Out
  • Sign In
  • Create an Account
  • CERTIFICATIONS
    • CISA—Certified Information Systems Auditor
    • CISM—Certified Information Security Manager
    • CRISC—Certified in Risk and Information Systems Control
    • CDPSE—Certified Data Privacy Solutions Engineer
    • CCOA—Certified Cybersecurity Operations Analyst
    • AAIA—Advanced in AI Audit
    • AAISM—Advanced in AI Security Management
    • CGEIT—Certified in the Governance of Enterprise IT
    • CET—Certified in Emerging Technology Certification
    • ITCA—Information Technology Certified Associate
    • CSX-P—CSX Cybersecurity Practitioner Certification
  • CERTIFICATES
    • CCAK—Certificate in Cloud Auditing Knowledge
    • COBIT
      • COBIT 2019 Foundation
      • COBIT 2019 Design & Implementation
      • Implementing the NIST Cybersecurity Framework using COBIT 2019
      • COBIT 5 Certificates
    • Cybersecurity Audit
    • Cybersecurity Fundamentals
    • Digital Trust Ecosystem Framework Foundation Certificate
    • Emerging Technology
      • AI Fundamentals
      • Blockchain Fundamentals
      • Cloud Fundamentals
      • IoT Fundamentals
    • Information Technology
      • Computing Fundamentals
      • Data Science Fundamentals
      • Networks and Infrastructure Fundamentals
      • Software Development Fundamentals
    • IT Audit Fundamentals
    • IT Risk Fundamentals
  • WHICH CERTIFICATION IS RIGHT FOR YOU?
  • VERIFY A CERTIFICATION
  • DIGITAL BADGES
  • RENEW OR MAINTAIN A CERTIFICATION
  • Career Journey
  • Which Exam Prep is Right for You?
  • TRAIN YOUR WAY WITH OFFICIAL ISACA EXAM PREP
  • BUILD YOUR TEAM'S PERFORMANCE WITH CUSTOMIZED TRAINING
  • BECOME A MEMBER
    • Browse Chapters
    • Find Your Membership Type
    • Member Benefits
  • ENGAGE ONLINE COMMUNITY
  • GET INVOLVED
    • Advocacy
    • Author an Article
    • Chapter Events Calendar
    • ISACA Awards
    • SheLeadsTech
    • Speak at Conferences
    • Volunteer
  • MAXIMIZE YOUR MEMBERSHIP
    • Career Center
    • Discounts & Savings
    • Free CPE
    • Free Resource Previews
    • Member-Exclusive Leadership Series
    • Mentorship
  • Personalize Your Experience
  • UPDATE YOUR PROFILE
  • CMMI PERFORMANCE IMPROVEMENT SOLUTIONS
    • CMMI Performance Solutions
    • CMMI Cybermaturity Platform
    • Voluntary Improvement Program
  • TEAM TRAINING
    • Skills & Credentials
    • CMMI Training
  • CMMI APPRAISALS (PARS)
  • ENTERPRISE SUPPORT
  • CONTACT US
  • Empower Your Team to Power Business Growth
  • CUSTOMIZE YOUR IT TEAM TRAINING
  • BECOME A TRAINING PARTNER
  • BECOME A CMMI PARTNER
  • BECOME AN ACADEMIC OR WORKFORCE PARTNER
  • Sponsorship
    • Become a Sponsor
    • Global Sponsors
  • FIND A TRAINING PARTNER
    • Certification Training Partners
      • Certification Training Partners
      • Americas
      • Asia and Oceania
      • China
      • EMEA
    • COBIT Training Partners
    • Academic & Workforce Partners
    • CMMI Performance Improvement Partners
  • Over 100,000 People Were Trained by ISACA in 2022
  • BECOME A PARTNER TO CAPITALIZE ON THIS HIGH DEMAND
  • CONFERENCES
    • GRC Conference
    • ISACA Europe Conference
    • ISACA North America Conference
    • ISACA Virtual Conference
    • Student Summit
    • Call for Speakers
  • CHAPTER EVENTS
  • Training Week
  • Virtual Workshops
  • TRAINING BY TYPE
    • Online Review Courses
    • Session Recordings
    • Webinars
    • Virtual Summits
  • GROUP/ENTERPRISE TRAINING
  • TRAINING FROM AN ACCREDITED PARTNER
  • TRAINING BY TOPIC
    • All Training Topics
    • Artificial Intelligence
    • Cybersecurity
    • IT Audit
    • Certification Exam Preparation
    • COBIT
  • On-Demand CPE Training
  • September Featured Training:
  • 15% OFF THE CCOA ONLINE COURSE
  • DIGITAL TRUST
  • ISACA JOURNAL
  • INSIGHTS & EXPERTISE
  • NEWS & TRENDS
  • ENGAGE ONLINE COMMUNITIES
  • COBIT
  • RESOURCES BY TOPIC
    • Artificial Intelligence
    • Cybersecurity
    • Emerging Technology
    • Governance
    • IT Audit
    • IT Risk
    • Privacy
  • FRAMEWORKS, STANDARDS AND MODELS
  • ISACA NOW BLOG
  • ISACA VIDEOS
  • ISACA PODCAST
  • GLOSSARY
  • Announcing ISACA’s Digital Trust Ecosystem Framework and Portfolio
  • Advance Digital Trust
  • Credentialing
    • CREDENTIALING
    • CERTIFICATES
      • CERTIFICATES
      • CCAK—Certificate in Cloud Auditing Knowledge
      • COBIT
        • COBIT 2019 Foundation
        • COBIT 2019 Design & Implementation
        • Implementing the NIST Cybersecurity Framework using COBIT 2019
        • COBIT 5 Certificates
      • Cybersecurity Audit
      • Cybersecurity Fundamentals
      • Digital Trust Ecosystem Framework Foundation Certificate
      • Emerging Technology
        • AI Fundamentals
        • Blockchain Fundamentals
        • Cloud Fundamentals
        • IoT Fundamentals
      • Information Technology
        • Computing Fundamentals
        • Data Science Fundamentals
        • Networks and Infrastructure Fundamentals
        • Software Development Fundamentals
      • IT Audit Fundamentals
      • IT Risk Fundamentals
    • WHICH CERTIFICATION IS RIGHT FOR YOU?
    • VERIFY A CERTIFICATION
    • CERTIFICATIONS
      • CERTIFICATIONS
      • CISA—Certified Information Systems Auditor
      • CISM—Certified Information Security Manager
      • CRISC—Certified in Risk and Information Systems Control
      • CDPSE—Certified Data Privacy Solutions Engineer
      • CCOA—Certified Cybersecurity Operations Analyst
      • AAIA—Advanced in AI Audit
      • AAISM—Advanced in AI Security Management
      • CGEIT—Certified in the Governance of Enterprise IT
      • CET—Certified in Emerging Technology Certification
      • ITCA—Information Technology Certified Associate
      • CSX-P—CSX Cybersecurity Practitioner Certification
    • DIGITAL BADGES
    • TRAIN YOUR WAY WITH OFFICIAL ISACA EXAM PREP
    • BUILD YOUR TEAM'S PERFORMANCE WITH CUSTOMIZED TRAINING
    • RENEW OR MAINTAIN A CERTIFICATION
    • Career Journey
  • Membership
    • MEMBERSHIP
    • BECOME A MEMBER
      • BECOME A MEMBER
      • Browse Chapters
      • Find Your Membership Type
      • Member Benefits
    • ENGAGE ONLINE COMMUNITY
    • MAXIMIZE YOUR MEMBERSHIP
      • MAXIMIZE YOUR MEMBERSHIP
      • Career Center
      • Discounts & Savings
      • Free CPE
      • Free Resource Previews
      • Member-Exclusive Leadership Series
      • Mentorship
    • UPDATE YOUR PROFILE
    • GET INVOLVED
      • GET INVOLVED
      • Advocacy
      • Author an Article
      • Chapter Events Calendar
      • ISACA Awards
      • SheLeadsTech
      • Speak at Conferences
      • Volunteer
  • Enterprise
    • ENTERPRISE
    • CMMI PERFORMANCE IMPROVEMENT SOLUTIONS
      • CMMI PERFORMANCE IMPROVEMENT SOLUTIONS
      • CMMI Performance Solutions
      • CMMI Cybermaturity Platform
      • Voluntary Improvement Program
    • CUSTOMIZE YOUR IT TEAM TRAINING
    • TEAM TRAINING
      • ENTERPRISE TRAINING AND CREDENTIALS
      • Skills & Credentials
      • CMMI Training
    • CMMI APPRAISALS (PARS)
    • ENTERPRISE SUPPORT
    • CONTACT US
  • PARTNERSHIPS
    • PARTNERSHIPS
    • BECOME A TRAINING PARTNER
    • BECOME A CMMI PARTNER
    • BECOME AN ACADEMIC OR WORKFORCE PARTNER
    • Sponsorship
      • Become a Sponsor
      • Global Sponsors
    • FIND A TRAINING PARTNER
      • FIND A TRAINING PARTNER
      • Certification Training Partners
        • Certification Training Partners
        • Americas
        • Asia and Oceania
        • China
        • EMEA
      • COBIT Training Partners
      • Academic & Workforce Partners
      • CMMI Performance Improvement Partners
    • BECOME A PARTNER TO CAPITALIZE ON THIS HIGH DEMAND
  • Training & Events
    • TRAINING AND EVENTS
    • CONFERENCES
      • CONFERENCES
      • GRC Conference
      • ISACA Europe Conference
      • ISACA North America Conference
      • ISACA Virtual Conference
      • Student Summit
      • Call for Speakers
    • CHAPTER EVENTS
    • Training Week
    • Virtual Workshops
    • TRAINING BY TYPE
      • TRAINING BY TYPE
      • Online Review Courses
      • Session Recordings
      • Webinars
      • Virtual Summits
    • GROUP/ENTERPRISE TRAINING
    • TRAINING FROM AN ACCREDITED PARTNER
    • TRAINING BY TOPIC
      • Find Training by Topic
      • All Training Topics
      • Artificial Intelligence
      • Cybersecurity
      • IT Audit
      • Certification Exam Preparation
      • COBIT
    • On-Demand CPE Training
    • 15% OFF THE CCOA ONLINE COURSE
  • Resources
    • RESOURCES
    • DIGITAL TRUST
    • ISACA JOURNAL
    • INSIGHTS & EXPERTISE
    • NEWS & TRENDS
    • ENGAGE ONLINE COMMUNITIES
    • COBIT
    • RESOURCES BY TOPIC
      • Artificial Intelligence
      • Cybersecurity
      • Emerging Technology
      • Governance
      • IT Audit
      • IT Risk
      • Privacy
    • FRAMEWORKS, STANDARDS AND MODELS
    • ISACA NOW BLOG
    • ISACA VIDEOS
    • ISACA PODCAST
    • GLOSSARY
    • Advance Digital Trust
  • Join
    • PROFESSIONAL JOIN
    • RECENT GRAD JOIN
    • STUDENT JOIN
  • About Us
    • ABOUT US HOME
    • WHO WE ARE
    • NEWSROOM
    • PARTICIPATE & VOLUNTEER
    • LEADERSHIP & GOVERNANCE
    • ADVOCACY
    • ISACA FOUNDATION
    • CONTACT US
    • CODE OF PROFESSIONAL ETHICS
  • CAREERS
    • Career Journey
    • Career Center
    • Careers at ISACA
  • SUPPORT
  • Store
  • Cart
Sign In
Home / Resources / White Papers / 5G Security Addressing Risk and Threats of Mobile Network Technologies Technology
MD-WHP5GS
Whitepaper

5G Security: Addressing Risk and Threats of Mobile Network Technologies

5G technology can provide the foundation of an entire Internet of Things (IoT) ecosystem with the capability to unleash its full potential. This white paper examines how 5G technology addresses the risk and threats facing cellular technologies and compares 5G technology to 4G and previous generation technologies. It reviews 5G system architecture and 5G security architecture at a high level, identifying six security domains having security features that, when implemented, mitigate the identified risk.

5G Security: Addressing Risk and Threats of Mobile Network Technologies provides a brief history of cellular network technology from first-generation, voice-only systems through today’s voice/text/data 5G technology. With useful diagrams and clear explanations, it explains the fundamentals of modern 5G networks and then goes deeper into the security architecture of these networks. The six domains of 5G security are explored and explained, and specific risks are identified and cross-referenced to the 5G security features that are designed to mitigate them.

The white paper presents complex information with graphic clarity and practical implications in an easy-to-digest format. Professional security technologists will appreciate the overview, particularly those with a growing responsibility for IoT and other emerging technologies.

Download
  • LinkedIn
  • Facebook
  • Instagram
  • YouTube
  • Contact Us
  • Terms
  • Privacy
  • Cookie Notice
  • Cookie Settings
  • Fraud Reporting
  • Bug Reporting

1700 E. Golf Road, Suite 400, Schaumburg, Illinois 60173, USA  |  +1-847-660-5505  |  ©2025 ISACA. All rights reserved.