- In an analog cellular structure, what is needed to establish valid authentication?
- What is a rogue base station?
- What is snarfing and how does it work?
- Is there such a thing as legal eavesdropping? Give an example.
- How does cellular authentication work? Briefly explain the process.
- Describe GSM security goals and how does SMS meet those goals. Be specific.
Sample Solution