Guideline to backup my personal computer
I just received a message. How can I be sure that this message is coming from my network and not from someone else trying to send me false information or that this message hasn’t been modified by someone in the network?
Can someone beside me hear my communications and, especially, can he understand them?
How can the network verify that a terminal that attaches gives its valid identity, in other words that the IMSI has not been modified ?
What happens when I turn my terminal on? How are the security mechanisms organized?
What is the architecture of the 4G network? We have seen the principal elements, but we can ask ourselves if all these pieces are connected directly to each other. And, do all the pieces of equipment communicate with each other?
can I use my terminal freely on any network? How is network access controlled?
When I consult a server using my smartphone, or a Web site, what do the packets that arrive at my terminal pass through?
How is it possible that I can communicate pratically everywhere?
What are the visible elements of a mobile network such a 4G network? Are there other elements that I don't see?