Previous Lecture Complete and continue  

  2. Terms used in 5G security