Telco Security

Telecommunications Security Glossary

Comprehensive glossary of telecommunications security terms, protocols, and concepts. Essential reference for understanding mobile network security.

Categories

AllProtocolIdentifierAttackNetwork ElementToolTechnologyAlgorithmCryptographicAddressing
SS7
Signaling System No. 7
Protocol

Legacy signaling protocol used in 2G/3G networks for call setup, SMS delivery, and mobility management. Despite its age, SS7 remains widely deployed and is known for significant security vulnerabilities.

Related Terms:

SIGTRANMAPSCCPTCAP
IMSI
International Mobile Subscriber Identity
Identifier

Unique identifier stored on a SIM card that identifies a subscriber in mobile networks. Consists of MCC (Mobile Country Code), MNC (Mobile Network Code), and MSIN (Mobile Subscriber Identification Number).

Related Terms:

MSISDNIMEITMSISIM
MSISDN
Mobile Station International Subscriber Directory Number
Identifier

The telephone number associated with a mobile subscription. Unlike IMSI, MSISDN is the number users dial to reach a subscriber.

Related Terms:

IMSIE.164GT
SIM Swapping
SIM Card Swapping Attack
Attack

Social engineering attack where an attacker convinces a mobile carrier to transfer a victim's phone number to a SIM card controlled by the attacker, enabling account takeover and 2FA bypass.

Related Terms:

Port-out Fraud2FAAccount Takeover
MAP
Mobile Application Part
Protocol

SS7 protocol layer that provides application-level services for mobile networks, including location updates, SMS delivery, and authentication. Common target for SS7 attacks.

Related Terms:

SS7TCAPSCCP
HLR
Home Location Register
Network Element

Central database containing subscriber information and service profiles. Stores authentication keys, current location, and service subscriptions.

Related Terms:

VLRHSSAuC
VLR
Visitor Location Register
Network Element

Temporary database that stores information about subscribers currently roaming in its area. Works in conjunction with HLR for mobility management.

Related Terms:

HLRMSCSGSN
IMSI Catcher
IMSI Catching Device
Tool

Surveillance device that impersonates a legitimate cell tower to force mobile devices to connect, allowing interception of communications and identification of subscribers.

Related Terms:

StingrayFake Base StationCell Site Simulator
Diameter
Diameter Protocol
Protocol

Authentication, authorization, and accounting protocol used in 4G/5G networks. Successor to RADIUS with enhanced security features, though still vulnerable to various attacks.

Related Terms:

RADIUSS6aS6dAAA
GTP
GPRS Tunneling Protocol
Protocol

Protocol used to carry user data and signaling between network nodes in mobile packet networks. Exists in control plane (GTP-C) and user plane (GTP-U) variants.

Related Terms:

GPRSGTP-CGTP-UGGSNSGW
VoLTE
Voice over LTE
Technology

Technology for delivering voice calls over 4G LTE networks using IP-based protocols. Offers improved call quality but introduces new security challenges.

Related Terms:

IMSSIPRTPVoWiFi
SIMjacker
SIM Toolkit Browser Exploitation
Attack

Sophisticated attack exploiting S@T Browser application on SIM cards via binary SMS to track location, intercept communications, and perform unauthorized operations.

Related Terms:

WIBattackSTKBinary SMSOTA
SIGTRAN
Signaling Transport
Protocol

Protocol suite for transporting SS7 signaling over IP networks, bridging legacy SS7 and modern IP-based infrastructure.

Related Terms:

SS7SCTPM3UAM2UA
SIP
Session Initiation Protocol
Protocol

Signaling protocol for initiating, maintaining, and terminating real-time sessions including VoIP calls and multimedia communications.

Related Terms:

VoIPRTPSDPIMS
COMP128
Compression Algorithm for GSM
Algorithm

Authentication algorithm used in GSM SIM cards. COMP128v1 has known vulnerabilities allowing Ki key extraction, while v2 and v3 offer improved security.

Related Terms:

KiA3/A8MILENAGETUAK
Ki
Authentication Key
Cryptographic

128-bit secret key stored on SIM card and in network authentication center. Used for subscriber authentication and encryption key generation.

Related Terms:

COMP128MILENAGEAuCKc
OTA
Over-The-Air
Technology

Technology for remotely managing and updating SIM cards via SMS or other wireless channels. Can be exploited if not properly secured.

Related Terms:

Binary SMSSIM ToolkitRemote Management
SCCP
Signaling Connection Control Part
Protocol

SS7 protocol layer providing connectionless and connection-oriented network services. Used for routing messages based on Global Titles.

Related Terms:

SS7GTPoint CodeTCAP
Global Title
Global Title Address
Addressing

Address format used in SS7 networks for routing messages. Can be phone numbers, IMSI, or other identifiers translated to destination point codes.

Related Terms:

SCCPPoint CodeGTTSTP
HSS
Home Subscriber Server
Network Element

Central database in 4G/5G networks that stores subscriber profiles and authentication information. Evolution of HLR for LTE/5G networks.

Related Terms:

HLRAuCDiameterS6a