Need to know: 5G and cybersecurity

By Paddy Smith
Share
What are the risks associated with incoming 5G technologies? Are we taking them seriously enough? And what can we do to improve 5G cybersecurity...

According to the BPI Network, 94 per cent of telecoms operators and industry experts expect security challenges to escalate with the advent of 5G networks. Here’s why.

5G and IoT

Concerns about security related to the internet of things (IoT) is nothing new. The more devices connected to the network, the more attack surface is available to cyber threats. And the job of keeping all those devices monitored and protected increases the complexity of any cybersecurity operation. 5G is likely to usher in an explosion of IoT use cases.

Amplification of threat with 5G

It’s not great if your smart fridge gets pwned, but there’s probably a limit to how much damage will be done by such an attack. 5G threatens to amplify the problem by introducing network attached devices with greater potential to create injury or death if they are breached. Healthcare and connected cars are obvious examples.

Could that sort of 5G attack happen?

Yes. And, in the case of smart cities, it could create big problems. While not 5G specific, Florida’s water supply was recently attacked in a breach that allowed the cybercriminal(s) to adjust the lye levels in the water to dangerously high levels. A human operator overrode the hack and no harm was done, but it’s a demonstration of what might be in store for power networks, telecoms and other infrastructure.

5G multi-protocol risks

Different standards – 3G, 4G LTE, 5G – operate simultaneously with devices switching between them depending on availability. Without vulnerabilities being addressed across all the technologies, there is a risk of cybersecurity breaches when devices switch.

Cybersnooping in 5G

There has been considerable concern that nation-state actors might use 5G components to snoop on data. For that reason, some Western countries are stripping Chinese-made equipment from their 5G networks, believing that companies such as Huawei and ZTE may be acting on behalf of the Chinese government.

The good news in 5G cybersecurity

For all that, 5G’s architecture can provide greater visibility into network traffic, making it easier to spot anomalies. And network slicing can create virtual private channels on the network, increasing security and control. Ericsson recently launched RAN slicing

Share

Featured Articles

How Apple Says it is Using Siri to Protect User Data

Apple prioritises privacy in Siri through on-device processing, minimal data collection and advanced security protections for users

WEF: How AI Will Reshape 86% of Businesses by 2030

A new WEF report predicts that AI and automation will create 170 million jobs while displacing 92 million roles as companies adapt to technological change

Why Apple is Appealing to its Investors over DEI Programmes

Tech giant Apple seeks investor support over NCPPR calls to scrap its DEI programmes, whilst competitors Meta and Amazon seek to reduce their own schemes

How the UK Plans to Become the World’s AI Leader

Digital Transformation

Why AWS is Committing $5bn to Thailand Cloud Infrastructure

Data & Data Analytics

The Impact of Meta’s New Policies on Social Media Worldwide

Digital Transformation