Lead Machine Pink 160x1200

Lead Machine Pink 160x1200

iTWire TV 705x108

Tuesday, 26 October 2021 22:31

What exactly is 5G security and why is it essential?

By George Tsoukas, Gigamon
George Tsoukas, ANZ Manager, Gigamon George Tsoukas, ANZ Manager, Gigamon

GUEST OPINION by George Tsoukas, ANZ Manager, Gigamon: New technology always brings a host of worries about its negative potential, and 5G is no different. Although there are many legitimate 5G security concerns to address and discuss, it’s worth first clarifying the false claim that 5G causes health problems.

It doesn’t — 5G technology is not harmful to humans. With that out of the way, we’ll discuss what 5G is, what security risks it faces, and how experts are working to ensure 5G security.

What Is 5G? The term 5G stands for the fifth generation of cellular mobile network. In terms of architecture and protocols, the 5G radio access network (RAN) and 5G core are quite different from 4G LTE. The 5G RAN uses new radio frequency (RF) protocols, offers broader and higher frequency band spectrum, and has an open distributed architecture.

The 5G core differences include SDN with control and user-plane separation (CUPS); disaggregation offering many more discrete control and orchestration functions, virtualisation, and microservices (that is, containers); HTTP/2 (not GTP-C) control plane; TLS 1.3 encrypted control plane; and multi-access edge compute (MEC).

These all represent significant changes, and while in some cases they look to help with security, in other cases they open up a potential for more vulnerabilities and even lack of visibility. The new 5G core is required to help fulfill the expectations that 5G promises; the high-band spectrum alone is not sufficient to fulfill this.

5G is expected to be roughly 100 times faster than the current 4G network, in part because the networks are built on a high-band spectrum, rather than mid-band. This speed boost will bring upgrades to everything from cloud robotics to healthcare.

One major downside of this lower latency network, however, is the range and penetration. The lower power and higher frequency signals don’t travel as far and have a harder time getting through walls, which is why it might take a little longer for 5G to become a standard feature of most mobile device services.

There is a major advantage to this high-band adoption lag, though: experts have more time to find solutions to 5G security concerns.

Many of the things that make 5G so appealing, like the decreased latency and increased bandwidth, are also threats to security. Security threats include:

# New technology – New advances in technology often mean new problems. And given that 5G is not only new but also very different from 4G, this means that while experts can predict some security weaknesses, others may not become apparent until a breach has already occurred.

# Increased points of access – 5G allows for more access points. Every additional hardware point of contact creates another potential opening for attackers to access the network. That means all access points will need to be monitored on a physical and digital level.

# Internet of Things (IoT) – The speed of 5G lends itself well to use with IoT devices. That said, an increase in connected machines can also mean an increase in 5G security risks. Smaller IoT devices like thermostats often have weaker security, and a breach in one of these devices can mean the entire system is compromised.

# Speed – 5G is fast enough to be considered for use in remote surgery and self-driving cars, but that also means it could be harder to track and prevent attacks. At the same time, this critical and sensitive data transmission will require even higher levels of security to prevent breakage in communication, malicious behaviour or snooping/stealing information.

# Disaggregated architecture – As mentioned, 5G’s disaggregated architecture means that network functions are able to operate freely from the underlying system hardware, allowing for improved control and visualisation. However, the downside is that rather than relying on a single, overarching security approach, each of these components will need to have its own security measures ‘baked in’.

Of course, these are just some of the risks to 5G security. Keeping services and connected devices secure is rarely, if ever, a 100 percent guarantee.

Solutions for 5G security

Although the 5G network poses new and unique threats, there are already ways to help ensure better 5G security:

# Increased defence for individual mobile and IoT devices

# Zero Trust combined with a foundation of software security

End-to-end visibility

# Threat analytics

For optimal 5G security, networks should be treated as a Zero-Trust environment, where it cannot be taken for granted that connected devices will have sufficient security or vulnerability protection. So the first step should be ensuring adequate visibility across the network with appropriate security monitoring, threat detection, and mitigation processes in place even before devices are connected to the 5G network.

Keeping 5G networks secure will be a group effort, involving network providers, cyber security experts, and customers themselves. As a second line of defence in conjunction with Zero Trust, a foundation of software security for mobile and IoT devices will need to be developed in tandem with network providers and cybersecurity firms.

Even innocuous IoT devices like smart fridges should be equipped with high-level security. What’s more, precautions should be in place to ensure a breach in lesser IoT machines won’t lead to unauthorised access of sensitive information.

Next, end-to-end visibility is vital for monitoring any system, but it’s especially necessary in 5G security, where there are so many points of access for malicious actors to target.

This monitoring should extend across all layers of the network, including the physical network cells and data planes. Effective monitoring will also provide vital information for understanding new attacks. Combined with mitigation procedures, this will provide a more effective defence against potential incursions.

Threat analytics is a useful way to track and even predict attacks. Ideally, these analytics systems would be able to enact preventative measures to stop a breach from occurring. These programs offer vital information in the ongoing process of defending devices on a 5G network.


Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinatrs and campaigns and assassistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

INTRODUCING ITWIRE TV

iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.

SEE WHAT'S ON ITWIRE TV NOW!

BACK TO HOME PAGE
Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments