Abstract
There are rising cybersecurity concerns in the telecommunication sector as hackers intensify their sophistication. The techniques employed by hackers are constantly evolving and so are their tools. Data theft is the end goal for numerous attacks, with hackers seeking predominantly personal data, credentials, and credit card information. Telecom companies are a big target for cyber-attacks because they build, control, and operate critical infrastructure that is widely used to communicate and store large amounts of sensitive data. Hackers often compromise telecommunication systems and attempt to steal users’ information, defraud people and also attack telecom services and infrastructures. Cyber criminals often achieve their aim using different strategies, including the exploitation of vulnerabilities in both software and hardware and other possible loopholes. Given that telecom companies control critical infrastructure, the impact of an attack can be very high and far-reaching, this chapter examines the attack strategies and ethical hacking in telecommunication with a view to help the industry to understand, prepare and defend themselves against existing and potential cyber threats and attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hallman R, Bryan J, Palavicini G, Divita J, Romero-Mariona J (2017) IoDDoS—the internet of distributed denial of sevice attacks—a case study of the mirai malware and IoT-based botnets. In: Proceedings of the 2nd international conference on Internet of Things, Big Data and Security (IoTBDS 2017), Porto, Portugal, 24–26 April 2017, pp 47–58
https://www.zdnet.com/article/the-hacking-strategies-that-will-dominate-in-2019/
https://www2.deloitte.com/global/en/pages/risk/cyber-strategic-risk/articles/Telecommunications.html
Schneider B (2000) Attack trees: modeling security threats. Dr. Dobb’s J 1:5
Ethical Hacking. Tutorials point Simply Easy Learning, pp 86. https://www.tutorialspoint.com/ethical_hacking/index.htm
Pandey BK, Singh A, Balani B (2015) ETHICAL HACKING (Tools, Techniques and Approaches). In: ICAIM-international conference on advancement in IT and management at: Thakur Institute of Management studies career development and research Thakur Village Kandivali East Mumbai. https://doi.org/10.13140/2.1.4542.2884
Hartley R (2015) Ethical hacking: teaching students to hack. https://doi.org/10.13140/RG.2.1.3580.8085
Maurushat A (2019) Ethical hacking. ISBN 978-0-7766-2792-2. University of Ottawa Press, Ottawa. http://hdl.handle.net/10393/39080
Viduto V, Huang W, Maple C (2011) Toward optimal multi-objective models of network security: survey. In: Proceedings of the 17th International Conference on Automation and Computing (ICAC), Huddersfield, UK, 10 September 2011
Feng N, Wang HJ, Li M (2014) A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis. Inf Sci 256:57–73
Rockson KA, Michael A, Onyema EM (2020) Implementing morpheme-based compression security mechanism in distributed systems. Int J Innov Res Dev (IJIRD) 9(2):157–162. https://doi.org/10.24940/ijird/2020/v9/i2/JAN20092
Roger MN, Michael DS (1978) Using encryption for authentication in large network of computers. Commun ACM 21(12):993–999. https://doi.org/10.1145/359657.359659
Renaud D (2009–2010) Cryptography and computer security. University of Liège, Faculty of Applied Sciences
AGaray J, Jakobsson M, MacKenzie P (1999) Abuse-free optimistic contract signing. In: Advances in cryptology: proceedings of Crypto'99, volume 1666 of lecture notes in computer science, pp 449–466. Springer
Greg O, Michael R (2001) Child-proof authentication for MIPv6 (CAM). Comput Commun Rev (2001)
Ghada G, Aref, M (2018) 6LowPSec: an end-to-end security protocol for 6LoWPAN. Ad Hoc Netw. https://doi.org/10.1016/j.adhoc
IEEE 802.11 Local and Metropolitan Area Networks: Wireless LAN Medium Acess Control (MAC) and Physical (PHY) Specifications (1999)
Philippe B (2001) Architecture expérimentale pour la détection d’intrusions dans un système informatique, 86 p
Carin L, Cybenko G, Hughes J (2008) Cybersecurity strategies: the queries methodology. Computer 41. https://doi.org/10.1109/MC.2008.295
Bravard C, Charroin L, Touati C (2017) Optimal design and defense of networks under link attacks. J Math Econ 68:62–79. https://doi.org/10.1016/j.jmateco.2016.11.006
Gold S (2010) Social engineering today: psychology, strategies and tricks. Netw Secur 2010(11):11–14. https://search.proquest.com/docview/787399306?accountid=45049. https://doi.org/10.1016/S1353-4858(10)70135-5
Hamizi M (2017) Social engineering and insider threats, Slideshare.net. https://www.slideshare.net/pdawackomct/7-social-engineeringand-insider-threats. Accessed 08 Aug 2020
Al-Qurishi M, Alrubaian M, Rahman SMM, Alamri A, Hassan MM (2018) A prediction system of Sybil attack in social network using deep-regression model. Futur Gener Comput Syst 87:743–753. https://doi.org/10.1016/j.future.2017.08.030
Harrison B, Svetieva E, Vishwanath A (2016) Individual processing of phishing emails. Online Inf Rev 40(2):265–281. https://search.proquest.com/docview/1776786039
Andress M (2004) Network vulnerability assessment management: eight network scanning tools offer beefed-up management and remediation. Netw World 21(45):48–48, 50, 52. https://search.proquest.com/docview/215973410
Onyema EM, Nwafor CE, Ugwugbo AN, Rockson KA, Ogbonnaya UN (2020) Cloud security challenges: implication on education. Int J Comput Sci Mob Comput 9(2):56–73
Riahla (2009) Introduction à la sécurité informatique. Université de limoge, 56 p
Nmap: the Network Mapper—Free Security Scanner, Nmap.org, 2017. https://nmap.org/. Accessed 20 Jul 2020
Packet Collection and WEP Encryption (2017) Attack & defend against wireless networks—4, Ferruh.mavituna.com. http://ferruh.mavituna.com/paket-toplama-ve-wep-sifresini-kirma-kablosuz-aglara-saldiri-defans-4-oku/. Accessed 21 Jul 2020
Onyema EM, Elhaj MAE, Bashir SG, Abdullahi I, Hauwa AA, Hayatu AS (2020) Evaluation of the performance of k-nearest neighbor algorithm in determining student learning styles. Int J Innov Sci Eng Tech 7(1):91–102
Metasploit Unleashed (2017) Offensive-security.com. https://www.offensive-security.com/metasploit-unleashed/msfvenom/. Accessed 21 Jul 2020
Top 10 Phishing Attacks of 2014—PhishMe, PhishMe (2017). https://phishme.com/top-10-phishing-attacks-2014/. Accessed 19 Jul 2020
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Onyema, E.M., Dinar, A.E., Ghouali, S., Merabet, B., Merzougui, R., Feham, M. (2022). Cyber Threats, Attack Strategy, and Ethical Hacking in Telecommunications Systems. In: Kaiwartya, O., Kaushik, K., Gupta, S.K., Mishra, A., Kumar, M. (eds) Security and Privacy in Cyberspace. Blockchain Technologies. Springer, Singapore. https://doi.org/10.1007/978-981-19-1960-2_2
Download citation
DOI: https://doi.org/10.1007/978-981-19-1960-2_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1959-6
Online ISBN: 978-981-19-1960-2
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)