User login

Weekly Report




Answered some of the questions I had regarding the mobile core, which nows means I can attempt to define where I want to go a bit more. Might need to look at getting some hardware setup to actually look for potential attack vectors. My current thinking is that a firewall and correctly configured network shouldn't allow any traffic into secure areas, which would make core security a trivial exercise in network security. However this doesn't mean that there are no other attack vectors, which I will also need to investigate