3G及びLTEネットワークにおける無線セキュリティ市場動向(2014-2019)...市場調査レポートについてご紹介

【英文タイトル】Wireless Security in 3G and LTE Networks: Market and Forecast 2014 - 2019

▼当市場調査レポートの詳細内容確認、お問い合わせ及びご購入申込は下記ページでお願いします。▼マーケットレポート

【レポートの概要(一部)】

1.0 EXECUTIVE SUMMARY 11
2.0 INTRODUCTION 12
3.0 EVOLUTION OF LTE: GLOBAL PERSPECTIVE 15
3.1 TRANSITION FROM 2G TO 3G AND NOW LTE 15
3.2 LTE TO LTE ADVANCED 16
3.3 WIRELESS NETWORK: GLOBAL MARKET SCENARIO: 17
3.4 LTE: GLOBAL MARKET SCENARIO: 17
3.5 COMPARISON OF LTE USERS BY REGION 18
3.6 WORLDWIDE LTE DEPLOYMENT STATUS: 19
4.0 LTE MARKET PROJECTION 2014 – 2019 20
4.1 MOBILE PHONE SUBSCRIPTION AND MOBILE TECHNOLOGY SUBSCRIPTION 20
5.0 WIRELESS SECURITY COMPARISON: UTMS (3G) VS. LTE (4G) 22
5.1 INTRODUCTION TO WIRELESS SECURITY 22
5.2 SECURITY ARCHITECTURE: UTMS (3G) AND LTE (4G) 22
5.3 WHY WIRELESS SECURITY IS DIFFERENT IN LTE 24
5.4 WIRELESS SECURITY VULNERABILITY: A BURNING ISSUE FOR MOBILE DEVICES 25
5.5 SECURITY RISKS IN WIRELESS DEVICES: 26
5.6 FACTS ABOUT SECURITY ISSUES IN MOBILE ENVIRONMENT 27
5.7 DOMAIN NAME SYSTEM (DNS) AND LTE SECURITY 28
6.0 WIRELESS SECURITY THREATS ON MOBILE: LTE PATTERN 29
6.1 WIRELESS LTE CYBER THREAT LANDSCAPE 29
6.2 WEB SECURITY THREAT 30
6.3 SECURITY THREATS AND BUSINESS IMPACTS 30
6.4 CATEGORY POSED THREATS 32
6.5 PLATFORM POSED THREATS 33
6.6 LTE THREAT AGENTS TRENDS 33
7.0 WIRELESS LTE DEVICE MARKET PROJECTIONS 2014-2019 35
7.1 OVERALL WIRELESS DEVICE MARKET FORECAST: 35
7.2 REGIONAL WIRELESS DEVICE MARKET FORECAST 35
7.3 LTE SUBSCRIBED WIRELESS DEVICE USERS MARKET FORECAST: 36
8.0 MOBILE APPLICATION MARKET PROJECTION 2014-2019 37
8.1 MOBILE APPLICATION MARKET: INTRODUCTION 37
8.2 MOBILE APPLICATION MARKET FORECAST 2014 – 2019 38
9.0 MOBILE SECURITY IN IP ENVIRONMENT: LTE PERSPECTIVE 39
9.1 LTE – AN IP BASED NETWORK 39
9.2 TYPES OF MOBILE SECURITY THREATS 40
9.2.1 APPLICATION BASED THREATS 40
9.2.2 WEB BASED THREATS 41
9.2.3 NETWORK BASED THREATS 41
9.2.4 PHYSICAL THREATS 42
9.3 MALWARE: BIG THREATS FOR LTE 43
9.4 WIRELESS SECURITY: ENVIRONMENTAL CHANGE OUTLOOK 44
9.5 SIGNALLING DERIVED THREATS: DIAMETER 45
9.6 THIRD PARTY SOURCED THREATS 45
9.7 RAN AND BACKHAUL: WEAK POINTS IN LTE FOR MOBILE “HACTIVISTS” 45
10.0 WIRELESS SECURITY ANALYSIS ON LTE PERSPECTIVE 47
10.1 ANALYSIS OF WIRELESS LTE THREATS 47
10.1.1 LTE NETWORKS: AN ACCESS POINT AND THREAT FOR APPLICATIONS 47
10.1.1 LTE NETWORKS: REGIONAL DISTRIBUTION OF MOBILE APPLICATION USERS 48
10.1.2 MOBILE USER AWARENESS OF WIRELESS SECURITY 2013 – 2019 48
10.2 WIRELESS LTE THREATS MARKET STATUS AND OUTLOOK 49
10.2.1 WIRELESS LTE THREATS AND OPPORTUNITIES 49
10.2.2 OUTLOOK OF WIRELESS LTE NETWORKS THREATS 49
10.2.1 GLOBAL LTE CONNECTIONS 50
11.0 LTE WIRELESS NETWORK – COUNTRY-WISE ANALYSIS 51
11.1 LTE SECURITY AWARENESS 2014 – 2019 51
11.1.1 USA 51
11.1.2 UNITED KINGDOM 51
11.1.3 SOUTH KOREA 52
11.1.4 AFRICA 52
11.1.5 AUSTRALIA 53
11.1.6 BRAZIL 53
11.1.7 CANADA 54
11.1.8 BELGIUM 54
11.1.9 FRANCE 55
11.1.10 GERMANY 55
11.1.11 RUSSIA 56
11.1.12 MIDDLE EAST 56
11.1.13 JAPAN 57
11.1.14 CHINA 57
11.1.15 INDIA 58
11.2 LTE NETWORK PROVIDER MARKET SHARE 58
11.2.1 USA 58
11.2.2 UNITED KINGDOM 59
11.2.3 AFRICAN REGION 59
11.2.4 MIDDLE EAST REGION 60
11.2.5 SOUTH KOREA 60
11.2.6 JAPAN 61
11.2.7 RUSSIA 61
11.2.8 GERMANY 62
11.2.9 AUSTRALIA 62
11.2.10 HONGKONG 63
11.2.11 CHINA 63
11.2.12 INDIA 64
11.2.13 GLOBAL TOP 10 SERVICE PROVIDER OF LTE NETWORK SUBSCRIBER BASE 64
12.0 DISTINCTIVE INITIATIVE TO PREVENT WIRELESS INCIDENT 65
12.1 UNIQUE MOBILE SECURITY BY BRITISH FIRM 65
12.2 WIRELESS LTE THREAT IDENTIFICATION THROUGH PREVENTION APPLICATION 66
12.3 MOBILE SECURITY AGAINST ANTIVIRUS AND THEFT 66
13.0 LTE STAKEHOLDERS AND VENDOR MARKET SHARE 67
13.1 REGIONAL LTE DEPLOYMENT 2014 67
13.2 VULNERABILITY % SMARTPHONE VS. TABLET DEVICE 2014 – 2019 67
13.3 WIRELESS ANTIVIRUS VENDORS MARKET SHARE 2013 68
13.4 WIRELESS SECURITY COMPANY MARKET SHARE 2013 68
13.5 LTE INFRASTRUCTURE COMMERCIAL BY VENDORS 69
13.6 LTE SUPPORTING TABLET AND SMARTPHONE MANUFACTURERS 69
14.0 KEY OPINION LEADERS VIEW ON LTE SECURITY MARKET 71
14.1 LOWELL MCADAM, CEO, VERIZON 71
14.2 DAN HESSE, CEO, SPRINT 71
14.3 JOHN T CHAMBER, CEO, CISCO 71
14.4 VINCE STECKLER, CEO, AVAST 72
14.5 STEVE BENNET, CEO, SYMANTEC 72
15.0 CASE ANALYSIS 73
15.1 DROIDDREAM MALWARE: SPOILING YOUR DREAM 73
15.2 BAD NEWS: REAL BAD NEWS FOR MOBILE USERS 74
15.3 HACKING YOUR MONEY: BANKING FRAUDS OVER MOBILE 74
15.3.1 UK BANKS ATTACKED USING MALWARE: £1M FRAUD 74
15.3.2 EUROGRABBER ATTACK 75
15.4 THANKS GIVING: BIG DAY FOR HACKERS 75
15.4.1 INTRODUCTION: HACKERS TARGETING SHOPPERS’ SMARTPHONES 75
15.4.2 HOW THE SMARTPHONE ATTACKED 76
15.4.3 RESEARCHERS OPINION AND CONCLUSION 76
15.5 WIRELESS THREAT IN CORPORATE ENVIRONMENT 77
15.5.1 INTRODUCTION 77
15.5.2 ATTACK IN CORPORATE ENVIRONMENT: 77
15.6 ONE SIMPLE TRICK COULD DISABLE A CITY’S LTE NETWORK 78
15.6.1 INTRODUCTION 78
15.6.2 FEMTOCELL IS A CONTRIBUTOR IN LTE ATTACKS 78
15.7 HIGH SPEED LTE IS A SOURCE OF ATTACK FOR TERRORIST 79
15.7.1 INTRODUCTION 79
15.7.2 RESEARCHERS QUOTE ON “LTE AS A SOURCE OF TERRORIST ATTACK” 79
15.8 CYBERCRIMINAL’S NETWORK ON MOBILE PAYMENTS 80
15.8.1 INTRODUCTION 80
15.9 MOBILE APPLICATION DOWNLOAD FOUNDATION OF VIRUS DOWNLOAD 81
15.9.1 INTRODUCTION 81
15.9.2 VIRUSES INFILTRATE BY APPLICATIONS DOWNLOADS 82
15.10 MOBILE WIFI HACKING 82
15.11 GAME APPLICATION HACKED SMARTPHONE AND TABLET 82
16.0 CONCLUSION & RECOMMENDATIONS 83
16.1 CONCLUSIONS 83
16.2 TRENDING WIRELESS LTE SECURITY ISSUES IN 2014 83
16.2.1 TARGETED ATTACKS 84
16.2.2 MORE HACTIVISM 84
16.2.3 CYBER ESPIONAGE AND WARFARE 84
16.2.4 BIG BROTHER WATCHING EVEN MORE 84
16.2.5 INCREASE IN MALWARE 85
16.2.6 PRIVACY RIGHTS ERODING 85
16.2.7 CYBER EXTORTION 85
16.2.8 APPLE UNDER ATTACK 86
16.2.9 ANDROID IS EVEN WORSE 86
16.2.10 UN-PATCHED EXPLOITS IN JAVA 86
16.3 VULNERABILITIES IN LTE 86
16.3.1 VULNERABILITY IN LTE SYSTEM ARCHITECTURE 87
16.3.2 VULNERABILITY IN ACCESS AND HANDOVER PROCEDURES 87
16.3.3 VULNERABILITY IN IMS SECURITY AND HENB SECURITY 87
16.4 OTHER LTE SECURITY ISSUES 88
16.5 RECOMMENDATION 88
16.5.1 PROTECTING CORPORATE NETWORK 88
16.6 EXISTING SOLUTIONS FOR LTE SECURITY ISSUES 91
16.7 RECOMMENDATION FOR MOBILE APPLICATION DEVELOPERS 91
16.8 IOS RECOMMENDED SETTINGS FOR WI-FI ROUTERS AND ACCESS POINTS 92
16.9 RECOMMENDED SECURITY FOR MOBILE PAYMENT 92
16.9.1 DETECTING IF CARDHOLDER DATA IS BEING SKIMMED 92
16.9.2 IDENTIFYING AND PROTECTING WLAN FROM UNAUTHORIZED DEVICES 93
16.10 IP NETWORK SECURITY MEASURES: 93
17.0 ACRONYMS 94


【レポート販売概要】

■ タイトル:3G及びLTEネットワークにおける無線セキュリティ市場動向(2014-2019)
■ 英文:Wireless Security in 3G and LTE Networks: Market and Forecast 2014 - 2019
■ 発行日:2014年4月
■ 調査会社:Mind Commerce
■ 商品コード:MCM404283
■ 調査対象地域:グローバル
※当サイトは世界の市場調査レポート紹介サイトです。市場規模、市場動向、市場予測など、多様な分析データを含むグローバル調査レポートをご案内致します。日本国内を含むアジア太平洋、中国、ヨーロッパ、アメリカ、北米、中南米、中東、アフリカ地域などにおける、製品、サービス、技術、企業(メーカー、ベンダー)、市場シェア、市場環境など多様な項目に対応致します。当サイトでご紹介するレポートは「市場調査レポート販売サイトのMarketReport.jp」でお問い合わせ及びご購入可能です。