Technological change manifests a new danger zone because the experience is missing to completely understand what has been unleashed.
This is certainly true with the new 5G broadband as its rollout continues in the United States and around the world.
A recent report outlined the most challenging security mechanisms 5G networks need to meet. Cross-layer security headed the list. This refers to a unified framework needed to coordinate different security methods for each security layer, such as applications or the Internet of Things (IoT).
End-to-end security also ranked high. Cybersecurity experts warn there needs to be a secure connection for the communication paths between the user and the core network due to the distributed nature of 5G networks.
Cross-domain security is also critical. 5G networks create a massive amount of novel use cases with unique requirements. Since the vertical market will only grow in order to fulfill those novel use cases, the report calls for cooperation between those in the 5G system to enact integrated security solutions that go across domains.
Additionally, the concept of secure-by-design should not be overlooked according to the report. As the 5G network changes and evolves, security must be built into the design during development.
5G Security and IoT
Unquestionably, the No. 1 security concern is the Internet of Things expansion, which is made possible by the faster, more stable 5G broadband technology. This vulnerability was confirmed by the Wipro cybersecurity report, which referred to IoT as “one major avenue for attack.”
The report pinpointed the healthcare industry, especially after the healthcare industry was the target of 40% of data breaches in 2017 – a time when IoT connected devices numbered much fewer than today. Cybersecurity personnel believe the need for ever-stronger security is particularly critical in healthcare because of the enormous potential of medical identity theft, invasion of health privacy and medical data management.
Another sector that is receiving considerable cybersecurity scrutiny is power and energy now that interconnected IoT devices will soon make up a large portion of the new smart grid. A report from @NavigantRSRCH emphasizes the urgency for greater cybersecurity due to the growing adoption of IoT devices, which is increasing the number of vectors and surfaces for cybersecurity attacks against utilities.
Others call on smart managers to develop smart strategies for protecting smart grids from potentially devastating threats to IoT assets. Clearly, no longer can managers rely on an old-school reactive approach to security. They and their security teams must adopt the latest proactive and predictive tools and methodologies to keep devices and systems safe.
Learn more about the impact of 5G on security vulnerabilities. Tonex offers a comprehensive, 5-day course, 5G Security Training / 5G Wireless Security Training.
For more information, questions, comments, contact us.