dc.contributor.advisor | Špelda, Petr | |
dc.creator | La Rosa, Giampaolo | |
dc.date.accessioned | 2021-02-24T10:49:57Z | |
dc.date.available | 2021-02-24T10:49:57Z | |
dc.date.issued | 2021 | |
dc.identifier.uri | http://hdl.handle.net/20.500.11956/124605 | |
dc.description.abstract | The new 5G technology, next generation of telecommunication and mobile network, is all around the world in course of inspection and inquiry for its astonishing novelty, from new services to functions and scalability. However, every technology brings alongside new possibilities and new threats scenarios, especially in this case where the impact on the present network is promised to be massive, with brand new features allowed by 5G, like Internet of Things, widespread virtualization and huge leap forward in rapidity and capability of the mobile transmission. An increase in the network surface, considered as more connections, more devices connected and more traffic load of data, will expand also the possible entry point and fault exploitable by a malevolent actor, raising common concern about the technology. The deployment of such a technology on European soil, especially in some states of the Union, caused uproar and critics primarily in the security field. Following a global trend, but also leading a best practice approach, the EU developed a series of mechanisms and agencies that are challenged to oversees the gradual shift from old 4G LTE to 5G. In this paper a Critical Information Infrastructure Protection (CIIP) framework is used to analyse the criticalities of the new technology. Definition of... | en_US |
dc.language | English | cs_CZ |
dc.language.iso | en_US | |
dc.publisher | Univerzita Karlova, Fakulta sociálních věd | cs_CZ |
dc.subject | 5G | en_US |
dc.subject | cyber security | en_US |
dc.subject | cyber threats | en_US |
dc.subject | cyber risks | en_US |
dc.subject | 5G | cs_CZ |
dc.subject | cyber security | cs_CZ |
dc.subject | cyber threats | cs_CZ |
dc.subject | cyber risks | cs_CZ |
dc.title | The 5G Technology Nexus: Assessing Threats and Risks of Implementation | en_US |
dc.type | diplomová práce | cs_CZ |
dcterms.created | 2021 | |
dcterms.dateAccepted | 2021-02-03 | |
dc.description.department | Department of Security Studies | en_US |
dc.description.department | Katedra bezpečnostních studií | cs_CZ |
dc.description.faculty | Fakulta sociálních věd | cs_CZ |
dc.description.faculty | Faculty of Social Sciences | en_US |
dc.identifier.repId | 214937 | |
dc.title.translated | Technologie 5G: Posouzení hrozeb a rizik implementace | cs_CZ |
dc.contributor.referee | Střítecký, Vít | |
thesis.degree.name | Mgr. | |
thesis.degree.level | navazující magisterské | cs_CZ |
thesis.degree.discipline | International Security Studies | en_US |
thesis.degree.discipline | Mezinárodní bezpečnostní studia | cs_CZ |
thesis.degree.program | Politologie | cs_CZ |
thesis.degree.program | Political Science | en_US |
uk.thesis.type | diplomová práce | cs_CZ |
uk.taxonomy.organization-cs | Fakulta sociálních věd::Katedra bezpečnostních studií | cs_CZ |
uk.taxonomy.organization-en | Faculty of Social Sciences::Department of Security Studies | en_US |
uk.faculty-name.cs | Fakulta sociálních věd | cs_CZ |
uk.faculty-name.en | Faculty of Social Sciences | en_US |
uk.faculty-abbr.cs | FSV | cs_CZ |
uk.degree-discipline.cs | Mezinárodní bezpečnostní studia | cs_CZ |
uk.degree-discipline.en | International Security Studies | en_US |
uk.degree-program.cs | Politologie | cs_CZ |
uk.degree-program.en | Political Science | en_US |
thesis.grade.cs | Výborně | cs_CZ |
thesis.grade.en | Excellent | en_US |
uk.abstract.en | The new 5G technology, next generation of telecommunication and mobile network, is all around the world in course of inspection and inquiry for its astonishing novelty, from new services to functions and scalability. However, every technology brings alongside new possibilities and new threats scenarios, especially in this case where the impact on the present network is promised to be massive, with brand new features allowed by 5G, like Internet of Things, widespread virtualization and huge leap forward in rapidity and capability of the mobile transmission. An increase in the network surface, considered as more connections, more devices connected and more traffic load of data, will expand also the possible entry point and fault exploitable by a malevolent actor, raising common concern about the technology. The deployment of such a technology on European soil, especially in some states of the Union, caused uproar and critics primarily in the security field. Following a global trend, but also leading a best practice approach, the EU developed a series of mechanisms and agencies that are challenged to oversees the gradual shift from old 4G LTE to 5G. In this paper a Critical Information Infrastructure Protection (CIIP) framework is used to analyse the criticalities of the new technology. Definition of... | en_US |
uk.file-availability | V | |
uk.grantor | Univerzita Karlova, Fakulta sociálních věd, Katedra bezpečnostních studií | cs_CZ |
thesis.grade.code | B | |
uk.publication-place | Praha | cs_CZ |
uk.thesis.defenceStatus | O | |