Network security

12345678
Across
  1. 3. sensitive informationon hard drives are destroyed
  2. 6. The network element that can interconnect two gsm network.
  3. 7. application protocol Push which is basically and specially used to encoded message which includes a link to a WAP addreSS
  4. 8. anonymity Designed to protect the user against someone
Down
  1. 1. system for mobile communication which allows users to roam seamlessly between network and separate the user identify from phone equipment
  2. 2. Feasibility of USIM component tested using
  3. 4. Enhanced authentication protocol for 3G security
  4. 5. station controller which allow all control function and physical link between MCS and BTS