|
3 | 3 | <head> |
4 | 4 | <meta charset="UTF-8"> |
5 | 5 | <meta name="viewport" content="width=device-width, initial-scale=1.0"> |
6 | | - <title>About - Telecom Security Documents</title> |
7 | | - <meta name="description" content="Learn about our mission to provide comprehensive telecommunications security documentation and resources for security professionals, researchers, and industry experts."> |
| 6 | + <title>About - Telecom Security Documents by RFS</title> |
| 7 | + <meta name="description" content="Learn about RFS, a specialized telecommunications security researcher, and their comprehensive collection of security documentation and resources for security professionals, researchers, and industry experts."> |
8 | 8 |
|
9 | 9 | <!-- AdSense --> |
10 | 10 | <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-9236847887178276" crossorigin="anonymous"></script> |
|
20 | 20 | <div class="container"> |
21 | 21 | <a class="navbar-brand" href="index.html"> |
22 | 22 | <i class="fas fa-shield-alt me-2"></i> |
23 | | - Telecom Security |
| 23 | + Telecom Security Documents |
24 | 24 | </a> |
25 | 25 | <button class="navbar-toggler" type="button" data-bs-toggle="collapse" data-bs-target="#navbarNav"> |
26 | 26 | <span class="navbar-toggler-icon"></span> |
|
51 | 51 | <div class="col-lg-8 mx-auto text-center"> |
52 | 52 | <h1 class="display-3 fw-bold text-white mb-4"> |
53 | 53 | <i class="fas fa-users me-3"></i> |
54 | | - About Our Mission |
| 54 | + About RFS |
55 | 55 | </h1> |
56 | 56 | <p class="lead text-white-50 mb-4"> |
57 | | - Empowering security professionals, researchers, and industry experts with comprehensive telecommunications security knowledge and resources |
| 57 | + RFS is a specialized telecommunications security researcher dedicated to advancing the field of mobile network security through comprehensive documentation and analysis |
58 | 58 | </p> |
59 | 59 | <div class="hero-stats"> |
60 | 60 | <div class="row text-center"> |
@@ -144,112 +144,35 @@ <h4>Industry Collaboration</h4> |
144 | 144 | <!-- Team Section --> |
145 | 145 | <section class="team-section py-5 bg-light"> |
146 | 146 | <div class="container"> |
147 | | - <h2 class="section-title text-center mb-5">Our Team</h2> |
148 | | - <div class="row g-4"> |
149 | | - <div class="col-lg-4 col-md-6"> |
150 | | - <div class="team-card"> |
151 | | - <div class="team-avatar"> |
152 | | - <i class="fas fa-user-circle"></i> |
153 | | - </div> |
154 | | - <div class="team-info"> |
155 | | - <h4>Dr. Sarah Chen</h4> |
156 | | - <p class="team-role">Lead Security Researcher</p> |
157 | | - <p class="team-affiliation">Stanford University</p> |
158 | | - <p class="team-bio">Expert in 4G/5G network security with over 15 years of experience in telecommunications security research.</p> |
159 | | - <div class="team-expertise"> |
160 | | - <span class="badge bg-primary">4G Security</span> |
161 | | - <span class="badge bg-primary">5G Security</span> |
162 | | - <span class="badge bg-primary">Network Architecture</span> |
163 | | - </div> |
164 | | - </div> |
165 | | - </div> |
166 | | - </div> |
167 | | - <div class="col-lg-4 col-md-6"> |
168 | | - <div class="team-card"> |
169 | | - <div class="team-avatar"> |
170 | | - <i class="fas fa-user-circle"></i> |
171 | | - </div> |
172 | | - <div class="team-info"> |
173 | | - <h4>Dr. Michael Rodriguez</h4> |
174 | | - <p class="team-role">Protocol Security Specialist</p> |
175 | | - <p class="team-affiliation">MIT Computer Science</p> |
176 | | - <p class="team-bio">Specialist in SS7 and signaling protocol security with extensive experience in telecom fraud detection.</p> |
177 | | - <div class="team-expertise"> |
178 | | - <span class="badge bg-success">SS7 Security</span> |
179 | | - <span class="badge bg-success">Protocol Analysis</span> |
180 | | - <span class="badge bg-success">Fraud Detection</span> |
181 | | - </div> |
182 | | - </div> |
183 | | - </div> |
184 | | - </div> |
185 | | - <div class="col-lg-4 col-md-6"> |
186 | | - <div class="team-card"> |
187 | | - <div class="team-avatar"> |
188 | | - <i class="fas fa-user-circle"></i> |
189 | | - </div> |
190 | | - <div class="team-info"> |
191 | | - <h4>Dr. Emily Wang</h4> |
192 | | - <p class="team-role">Hardware Security Expert</p> |
193 | | - <p class="team-affiliation">Carnegie Mellon University</p> |
194 | | - <p class="team-bio">Expert in SIM card security, baseband processor vulnerabilities, and hardware attack vectors.</p> |
195 | | - <div class="team-expertise"> |
196 | | - <span class="badge bg-warning">SIM Security</span> |
197 | | - <span class="badge bg-warning">Hardware Attacks</span> |
198 | | - <span class="badge bg-warning">Baseband Security</span> |
199 | | - </div> |
200 | | - </div> |
201 | | - </div> |
202 | | - </div> |
203 | | - <div class="col-lg-4 col-md-6"> |
204 | | - <div class="team-card"> |
205 | | - <div class="team-avatar"> |
206 | | - <i class="fas fa-user-circle"></i> |
207 | | - </div> |
208 | | - <div class="team-info"> |
209 | | - <h4>Dr. James Wilson</h4> |
210 | | - <p class="team-role">Threat Intelligence Lead</p> |
211 | | - <p class="team-affiliation">GSMA Security</p> |
212 | | - <p class="team-bio">Leading threat intelligence initiatives and developing security frameworks for mobile networks.</p> |
213 | | - <div class="team-expertise"> |
214 | | - <span class="badge bg-info">Threat Intelligence</span> |
215 | | - <span class="badge bg-info">MoTIF Framework</span> |
216 | | - <span class="badge bg-info">Mobile Security</span> |
217 | | - </div> |
218 | | - </div> |
219 | | - </div> |
220 | | - </div> |
221 | | - <div class="col-lg-4 col-md-6"> |
222 | | - <div class="team-card"> |
223 | | - <div class="team-avatar"> |
224 | | - <i class="fas fa-user-circle"></i> |
225 | | - </div> |
226 | | - <div class="team-info"> |
227 | | - <h4>Dr. Lisa Thompson</h4> |
228 | | - <p class="team-role">IoT Security Specialist</p> |
229 | | - <p class="team-affiliation">NIST Cybersecurity</p> |
230 | | - <p class="team-bio">Specialist in IoT security challenges and 5G network slicing security implementation.</p> |
231 | | - <div class="team-expertise"> |
232 | | - <span class="badge bg-secondary">IoT Security</span> |
233 | | - <span class="badge bg-secondary">Network Slicing</span> |
234 | | - <span class="badge bg-secondary">5G Security</span> |
235 | | - </div> |
236 | | - </div> |
237 | | - </div> |
| 147 | + <div class="row"> |
| 148 | + <div class="col-lg-8 mx-auto text-center"> |
| 149 | + <h2 class="section-title mb-4">RFS Team</h2> |
| 150 | + <p class="lead text-muted mb-5"> |
| 151 | + RFS is a specialized telecommunications security researcher with expertise across all aspects of mobile network security, from 2G to 5G networks, protocol analysis, hardware security, and threat intelligence. |
| 152 | + </p> |
238 | 153 | </div> |
239 | | - <div class="col-lg-4 col-md-6"> |
240 | | - <div class="team-card"> |
241 | | - <div class="team-avatar"> |
242 | | - <i class="fas fa-user-circle"></i> |
| 154 | + </div> |
| 155 | + <div class="row"> |
| 156 | + <div class="col-lg-8 mx-auto"> |
| 157 | + <div class="team-card text-center"> |
| 158 | + <div class="team-avatar mb-4"> |
| 159 | + <i class="fas fa-shield-alt fa-4x text-primary"></i> |
243 | 160 | </div> |
244 | 161 | <div class="team-info"> |
245 | | - <h4>Dr. Carlos Rodriguez</h4> |
246 | | - <p class="team-role">Infrastructure Security</p> |
247 | | - <p class="team-affiliation">Mobile Security Labs</p> |
248 | | - <p class="team-bio">Expert in base station security, GPON networks, and physical infrastructure protection.</p> |
249 | | - <div class="team-expertise"> |
250 | | - <span class="badge bg-dark">Base Stations</span> |
251 | | - <span class="badge bg-dark">GPON Security</span> |
252 | | - <span class="badge bg-dark">Infrastructure</span> |
| 162 | + <h3>RFS</h3> |
| 163 | + <p class="team-role">Telecommunications Security Researcher</p> |
| 164 | + <p class="team-bio"> |
| 165 | + RFS specializes in telecommunications security research, covering 2G, 3G, 4G, and 5G networks, |
| 166 | + SS7/Diameter protocols, SIM card security, baseband vulnerabilities, and emerging threats in mobile infrastructure. |
| 167 | + Focus on practical security analysis, threat assessment, and providing actionable insights for the telecom industry. |
| 168 | + </p> |
| 169 | + <div class="team-expertise mt-4"> |
| 170 | + <span class="badge bg-primary me-2">2G/3G/4G/5G Security</span> |
| 171 | + <span class="badge bg-success me-2">Protocol Analysis</span> |
| 172 | + <span class="badge bg-warning me-2">Hardware Security</span> |
| 173 | + <span class="badge bg-info me-2">Threat Intelligence</span> |
| 174 | + <span class="badge bg-secondary me-2">Network Infrastructure</span> |
| 175 | + <span class="badge bg-dark me-2">Fraud Detection</span> |
253 | 176 | </div> |
254 | 177 | </div> |
255 | 178 | </div> |
@@ -345,8 +268,8 @@ <h5>LinkedIn</h5> |
345 | 268 | <div class="container"> |
346 | 269 | <div class="row"> |
347 | 270 | <div class="col-lg-4 mb-4"> |
348 | | - <h5><i class="fas fa-shield-alt me-2"></i>Telecom Security</h5> |
349 | | - <p class="text-muted">Comprehensive collection of telecommunications security documentation, research papers, and resources for security professionals, researchers, and industry experts.</p> |
| 271 | + <h5><i class="fas fa-shield-alt me-2"></i>Telecom Security Documents</h5> |
| 272 | + <p class="text-muted">Comprehensive collection of telecommunications security documentation, research papers, and resources by RFS for security professionals, researchers, and industry experts.</p> |
350 | 273 | <div class="social-links"> |
351 | 274 | <a href="#" class="text-muted me-3"><i class="fab fa-twitter fa-lg"></i></a> |
352 | 275 | <a href="#" class="text-muted me-3"><i class="fab fa-linkedin fa-lg"></i></a> |
@@ -383,7 +306,7 @@ <h6>Newsletter</h6> |
383 | 306 | <hr class="my-4"> |
384 | 307 | <div class="row align-items-center"> |
385 | 308 | <div class="col-md-6"> |
386 | | - <p class="mb-0 text-muted">© 2024 Telecom Security. All rights reserved.</p> |
| 309 | + <p class="mb-0 text-muted">© 2024 Telecom Security Documents. All rights reserved. | Research by RFS</p> |
387 | 310 | </div> |
388 | 311 | <div class="col-md-6 text-md-end"> |
389 | 312 | <a href="#" class="text-muted me-3">Privacy Policy</a> |
|
0 commit comments