The paper considers Global System for Mobile Communications, which plays the important role in contemporary society and carries new forms of dialog in the modern world. It is shown, that GSM-nets play two roles: firstly, they serve as communication tools for people who are in any point of world, and secondly, they can be used as tools for confidential data theft due to the old technology for telephone exchange setting, created as early as in the 1970s.
Attacks using SS7 are often executed by hackers. After all, the attacker does not have to be close to the subscriber, and the attack can be made from anywhere on the planet. Therefore, to calculate the attacker is almost impossible, through this vulnerability can be hacked through almost any phone in the world. It will not be difficult to eavesdrop on conversations, intercept SMS, get access to the mobile Bank, social networks because of the vulnerability in the SS7 telephone infrastructure, through which service commands of cellular networks are transmitted. Due to the fact that the vulnerability with the Protocol SS7 is on the side of the operator, protection from such an attack is impossible. Until mobile operators are able to abandon this technology, this threat in the field of information security will remain relevant.
Information security audit is an independent assessment of the current state of information security, determinig the level of its compliance with certain criteria, and providing results in the form of recommendations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.