Need to know: 5G and cybersecurity

By Paddy Smith
What are the risks associated with incoming 5G technologies? Are we taking them seriously enough? And what can we do to improve 5G cybersecurity...

According to the BPI Network, 94 per cent of telecoms operators and industry experts expect security challenges to escalate with the advent of 5G networks. Here’s why.

5G and IoT

Concerns about security related to the internet of things (IoT) is nothing new. The more devices connected to the network, the more attack surface is available to cyber threats. And the job of keeping all those devices monitored and protected increases the complexity of any cybersecurity operation. 5G is likely to usher in an explosion of IoT use cases.

Amplification of threat with 5G

It’s not great if your smart fridge gets pwned, but there’s probably a limit to how much damage will be done by such an attack. 5G threatens to amplify the problem by introducing network attached devices with greater potential to create injury or death if they are breached. Healthcare and connected cars are obvious examples.

Could that sort of 5G attack happen?

Yes. And, in the case of smart cities, it could create big problems. While not 5G specific, Florida’s water supply was recently attacked in a breach that allowed the cybercriminal(s) to adjust the lye levels in the water to dangerously high levels. A human operator overrode the hack and no harm was done, but it’s a demonstration of what might be in store for power networks, telecoms and other infrastructure.

5G multi-protocol risks

Different standards – 3G, 4G LTE, 5G – operate simultaneously with devices switching between them depending on availability. Without vulnerabilities being addressed across all the technologies, there is a risk of cybersecurity breaches when devices switch.

Cybersnooping in 5G

There has been considerable concern that nation-state actors might use 5G components to snoop on data. For that reason, some Western countries are stripping Chinese-made equipment from their 5G networks, believing that companies such as Huawei and ZTE may be acting on behalf of the Chinese government.

The good news in 5G cybersecurity

For all that, 5G’s architecture can provide greater visibility into network traffic, making it easier to spot anomalies. And network slicing can create virtual private channels on the network, increasing security and control. Ericsson recently launched RAN slicing


Featured Articles

TECH LIVE LONDON: An overview of the hybrid technology show

We take a look at the first day of Tech Live London with insights from technology leaders from companies such as IBM, Microsoft and Vodafone

TECH LIVE LONDON: Begins tomorrow at 10am!

Our marquee technology event is nearly here. There's still time to claim your free ticket (worth £295). Look forward to welcoming you to the Tobacco Dock!

Executive Q&A: Marc Lueck, CISO EMEA, Zscaler

As we prepare to welcome the Zero Trust leaders to TECH LIVE LONDON this June 23-24, we take the opportunity to chat to Zscaler CISO of EMEA, Marc Lueck

TECH LIVE LONDON: Registering, networking and logistics

Digital Transformation

New speaker from Infosys announced for TECH LIVE LONDON!

Digital Transformation

New speaker from Bernadette announced for TECH LIVE LONDON!

Digital Transformation