Will 5G make us more vulnerable to cyber attacks?
The new generation of 5G mobile networks is beginning to be increasingly deployed in countries around the world, bringing promises about the bright future of a seamless and seamless connectivity standard between all the utilities of the technological world, with the advantage of reliability, high stability, large capacity and especially unprecedented low latency.
However, besides the obvious benefits mentioned above, security issues with 5G are also factors that should be paid more attention. We've talked a lot about the economic benefits 5G brings to every individual and business, and rarely spends time talking about the security risks this connectivity standard causes. These could be new, more sophisticated threats, more difficult to control, related to things we have known even recently.
Identify 5G security holes
According to a study by security firm Acckey with the participation of more than 2,600 business and technology executives in 12 key industrial sectors in Europe, North America and Asia-Pacific, there are up to 62% of these people fear that 5G will make their companies more vulnerable to cyber attacks. The root cause of this concern lies in the security issues stemming from the virtualized nature identified by the software of 5G compared to the hardware platform of previous LTE mobile communications standards.
The central role of 5G in the IoT world is a set of strengths and weaknesses in which endpoint systems are localized and sometimes beyond the control of security platforms. The 5G network promises to bring positive points in device connectivity, authentication, and encryption, but the flip side is the underlying security gaps in those processes.
The nature of the way signals and data are routed in a 5G / IoT network can lead to Mobile Network (MNmap) mapping, where an attacker can map devices connected to the network, Identify each device and associate it with a specific person. They then deploy Man-in-the-middle (MiTM) attacks that help them gain control of device information before security systems can detect and block it.
In addition, there are supply chain security challenges with platform components that address inherent security holes. This can be clearly seen in backlink vulnerabilities thought to be intentionally built in mobile networks based on equipment from some big manufacturers like Huawei.
The backdoors will allow malicious agents to gain a target location, eavesdrop on calls and facilitate them to spread ransomware over 5G networks targeting mobile carriers.
Other vulnerabilities mentioned in the field of wireless and IoT include SIM SIMing, authentication key exchange protocol (AKA) and a series of backdoor vulnerabilities of the base station.
IoT in all areas, from smart homes, medical devices, machine to machine (M2M) to smart cities, power grids and autonomous vehicles are all vulnerable targets. All of these provide an attacker with multiple ways to gain unauthorized access or control over connected IoT devices and transfer data over 5G networks.
However, everything can be solved if we have an accurate and comprehensive understanding of the problem we are facing. 5G network security is still a 'wild west' with everything changing day by day, so businesses need to be proactive in building limited scenarios to cope with security risks. Collaborate with IoT / IT security experts to help them plan from scratch. Systems must be carefully designed for security to optimize safety inspection effectiveness, provide a reliable and protected product.
You should read it
- Israel launches the world's first cybersecurity network
- Network security guide before vulnerability 196
- Guidelines for securing computer network systems
- Awareness and experience - the most important factor in every network security process
- 7 mistakes make Internet security at risk
- Endpoint Detection and Response threats, an emerging security technology
- Officially released TLS 1.3, promising a faster, safer Internet world
- 4 problems difficult for network security 2013
May be interested
- Common types of cyber attacks target seniorscybercrime targeting the elderly is a major problem worldwide. there are many reasons for this group to fall victim to online fraud. the majority of the elderly access technology era slower than young people
- What are Volumetric Attacks? How to Detect and Prevent Them Effectivelyvolumetric attacks are a type of cyber attack that falls under the category of ddos (distributed denial of service). attackers will send large amounts of unwanted data to a specific target in order to overload that system.
- Defeat China's largest hacker training furnacechinese police have closed the website to recruit thousands of members and provide training on cyber attacks and malicious code.
- Game industry - an attractive target for cyber criminalsthe explosive growth of the unseen gaming industry has caused this billion-dollar industry to 'get' more attention from cyber criminals.
- How to Be More Vulnerable in Relationshipsmany people struggle to be vulnerable in relationships because it means opening themselves up to rejection or ridicule. but not allowing yourself to be vulnerable with friends and loved ones can lead to you missing out on deep personal...
- What is cyber bullying? How to prevent cyber bullyingabusers and social problems have been around for a long time, but technology now gives them a whole new platform that is in line with their actions.
- More than 1.7 billion cyber attacks in 2013mobile is a fast growing it sector. in 2013, security issues around mobile devices have reached a new level of increase in both quantity and quality. if 2011 was the year the mobile malware started to attract attraction to hackers, then in 2013, these malicious software became more complete and sophisticated.
- How Being Vulnerable Leads to a Healthy and Fulfilling Relationshipto be vulnerable with a partner means showing them your true self, including your fears, dreams, and emotions. find out how vulnerability in relationships will take them a step further.
- Another large Data Center service provider became a victim of ransomwareransomware appears to be redirecting attacks to major data centers on a global scale.
- What do you know about the first 'cyber attack' in the world?temporarily restraining the 'contemplative' reality of today's global cyber security, we try to go back too much to the early days of the concept of 'cyber attack'. do you know when the world's first cyber attack occurred?