Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.937  Word version:  17.0.0

Top   Top   Up   Prev   Next
1…   4…   7…

 

4  System Environment for PUCIp. 10

5  PUCI Risk Analysisp. 24

5.1  Generalp. 24

5.2  UC Threats & Scenariosp. 24

5.2.2  General Scenariop. 24

5.2.3  Privacy Violationp. 25

5.2.4  Contentious Incoming Call Service Chargep. 26

5.2.5  Contentious Roaming Costp. 27

5.2.6  Non-disclosure of Call Back Costp. 27

5.2.7  Phishingp. 28

5.2.8  Network Equipment Hijackingp. 28

5.2.9  User Equipment Hijackingp. 29

5.2.10  Mobile Phone Virusp. 29

5.2.11  Sender Impersonation UCp. 30

5.2.12  Unavailability of Service or Degraded Service Qualityp. 30

5.2.13  Negative Service Preconception Leading to Non-adoptionp. 30

5.3  Specific UC threats in non-IMS inter-connectionsp. 31

6  Security Requirementsp. 35


Up   Top   ToC