Telecommunications Security Glossary

Key terms and definitions in telco security

This glossary provides definitions for key terms used in telecommunications security. Browse the full list below.

5G
The fifth generation of cellular network technology, offering faster speeds, lower latency, and more reliable connections on smartphones and other devices.
APT (Advanced Persistent Threat)
A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.
DDoS (Distributed Denial of Service)
An attack where multiple compromised systems are used to target a single system, causing a denial of service for users of the targeted resource.
Diameter
A protocol used in 4G/LTE networks for authentication, authorization, and accounting (AAA), replacing SS7 in modern mobile networks.
Encryption
The process of encoding information in such a way that only authorized parties can access it, crucial for protecting sensitive data in telecommunications.
Firewall
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
IMSI (International Mobile Subscriber Identity)
A unique number associated with all GSM and UMTS network mobile phone users, stored in the SIM card.
IPX (IP eXchange)
A telecommunications interconnection model for exchanging IP-based traffic between service providers' networks.
MFA (Multi-Factor Authentication)
An authentication method that requires two or more independent ways to identify a user, enhancing security beyond just a password.
MITM (Man-in-the-Middle) Attack)
An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
Network Slicing
A feature of 5G networks that allows multiple virtual networks to be created on top of a common shared physical infrastructure.
SIEM (Security Information and Event Management)
A system that collects and analyzes log data from various sources in a network to detect and respond to security threats.
SIP (Session Initiation Protocol)
A signaling protocol used for initiating, maintaining, and terminating real-time sessions that include voice, video, and messaging applications.
SS7 (Signaling System No. 7)
A set of telephony signaling protocols used in telecommunications to set up and tear down telephone calls, as well as other services.
VoLTE (Voice over LTE)
A standard for high-speed wireless communication for mobile phones and data terminals, including IoT devices and wearables, that utilizes IP technologies.
Zero Trust
A security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.