Uncategorized

Why 5G Cybersecurity Requires a New Approach


Listen to this article – 3:06 minutes

5G network technology offers a solid foundation for edge computing and the Internet of Things (IoT) to increase business value significantly. Making it less expensive to deliver internet to places without developed infrastructure will help reduce the digital divide and open the door to new opportunities in the government, public, and private sectors. Digital connectivity is soaring to new heights, and while the internet of things devices are expanding, they pose several security challenges. This article at IT Business Edge by Kihara Kimachia speaks about the 5G cybersecurity risks and ways to mitigate them.

5G Cybersecurity Risks

With its super-fast speeds and reduced latency than 4G, 5G promises to revolutionize the internet like never before. According to the Ericsson Mobility Report, by 2027, 5G will account for 50% of all mobile subscribers worldwide. Considering the threat of a vastly expanded attack surface, machine learning manipulation, and parasitic malware, companies must consider the dangers posed by 5G cybersecurity and technology. IoT systems experience defects weekly, whether caused by configuration errors, security gaps, or sluggish patching.

Attackers can launch network assaults faster than ever by taking advantage of 5G’s improved connection. For instance, hackers can leverage flaws to swiftly spread malware over IoT networks, sabotage supply chains, or employ a horde of routers as an IoT botnet to conduct a distributed denial of service (DDoS) assault. A study by (ISC)2 Cybersecurity Workforce Study in 2021 estimated a gap of 2.72 million cybersecurity professionals. Even though so many organizations are turning to machine learning and security automation to fill that gap, they will not be able to cover all risk areas. Using inadequately secured IoT devices, DDoS assaults could cause network resources to become overloaded. Wireless networks, remote devices, personal phones, and third-party apps are all attack surfaces for bad actors.

5G Cybersecurity Features to Mitigate Risk

International mobile subscriber identification (IMSI) catchersIdentity access management (IAM)Transport layer security (TLS) protectionExtensible Authentication Protocol (EAP)Mandatory user plane integrity protectionRobust Security

Furthermore, the author discusses the ideal approach, expertise gap, cybersecurity strategy, and supply chain risk management.

To read the original article, click on https://www.itbusinessedge.com/networking/5g-cybersecurity-risks-and-how-to-address-them/

The post Why 5G Cybersecurity Requires a New Approach appeared first on AITS CAI’s Accelerating IT Success.

Related Articles

Back to top button