According to cybersecurity professionals, 5G protection needs to be edge to edge from the Internet of Things side across the core enterprise network and out to branch offices and multiple public clouds.
To accomplish this, everything connected to the enterprise ecosystem needs identification and to have its state of security or vulnerability identified. Following this, all requests for access to network resources should also be verified, validated and authenticated to ensure an effective security defense.
This is not a simple solution. However, for it to work, MNOs will need to cooperate even more closely with their IT departments to ensure 5G networks and software has built-in, end-to-end security upfront.
Code-based attacks on civilian and military infrastructures pose one of the great new challenges for security policy. Political decision-makers, the security industry and media pundits are increasingly warning of a “cyberwar” that could throw the economy and society into unpredictable turmoil.
Many cybersecurity professionals believe we need to rethink our security culture. For governments, the greatest challenge lies in helping private network operators, businesses and banks to secure their networks – if necessary, by introducing appropriate legislation. In general, decisions concerning the security of civilian networks should not be left primarily to the military and intelligence agencies.
It’s vital for policymakers to understand that cybersecurity issues arise because of three factors taken together:
- The presence of malevolent actors in cyberspace
- Societal reliance on IT for many important functions
- The inevitable presence of vulnerabilities in IT systems that malevolent actors can take advantage of
Despite these factors, however, we still expect information technologies to do what they are supposed to do and only when they are supposed to do it, and to never do things they are not supposed to do. Fulfilling this expectation is the purpose of cybersecurity.
Want to learn more? Tonex offers 5G Cybersecurity for Policymakers Training Workshop, a 2-day course where participants will learn about 5G networks, 5G network and system vulnerabilities, security threats, mitigation and policy principles for 5G deployment and cybersecurity policies. The 5G cybersecurity workshop discusses analysis and development of 5G policies and standards to serve as the foundation for securing 5G services and infrastructure.
For more information, questions, comments, contact us.