{"id":22732,"date":"2021-04-08T07:51:00","date_gmt":"2021-04-08T07:51:00","guid":{"rendered":"https:\/\/www.experfy.com\/blog\/impact-5g-technology-on-cybersecurity\/"},"modified":"2023-08-26T12:20:10","modified_gmt":"2023-08-26T12:20:10","slug":"impact-5g-technology-on-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/iot\/impact-5g-technology-on-cybersecurity\/","title":{"rendered":"Impact Of 5G Technology On Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"22732\" class=\"elementor elementor-22732\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-2239c3b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2239c3b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3118781\" data-id=\"3118781\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-109dba6 elementor-widget elementor-widget-text-editor\" data-id=\"109dba6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The need to develop an efficient approach to understand, evaluate, and protect critical infrastructure has never been greater. An essential part of the solution lies in new and innovative techniques for modeling and simulating 5G mobile networks.<\/p>\n<p>There is a sense of anticipatory euphoria on the implementation of the 5th generation of mobile connectivity. In no measure is this tech a minor upgrade; once applied, it will dwarf 4G by leaps and bounds with unprecedented levels of connectivity, ultra-reliable low latency communication, and not to mention, efficient energy usage. To give a scale, 4G download speed averages between 14 Mbps to 21 Mbps, depending on the country. But, with 5G, the speed will shoot over 10 Gbps! A huge capability joins this remarkable speed for data transmission, 10 Tbps, and a density of 1 million nodes per Km\u00b2 with connection latency shrinking from 50 milliseconds to just one millisecond. To explain the scale of this speed, the human brain takes at least 50 milliseconds to send visual information from the retina to the \u201ctop\u201d of the brain\u2019s visual processing chain and back again in loops that confirm what the eye saw!<\/p>\n<p>In other words, this allows for time reduction in communications and an increase in information transfer rate, furthermore allowing millions of devices to be connected simultaneously.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f140c34 elementor-widget elementor-widget-heading\" data-id=\"f140c34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Is this the new Utopia?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-530558e elementor-widget elementor-widget-text-editor\" data-id=\"530558e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>According to a PwC report, the boost in productivity will add&nbsp; a whopping USD 1.3 trillion to the global GDP by 2030. An increase in productivity resulting from 5G technologies\u2019 deployment will drive businesses and skilled services to new heights. The report projections show that 5G technology, used in conjunction with investments in artificial intelligence (AI) and the internet of things (IoT), can offer the potential for the rethinking of business models, quick and efficient services, and new products, with the gains accelerating as of 2025 as 5G-enabled applications become more widespread. Cloud gaming is another emerging category of applications. The combined capabilities provided by 5G networks and edge computing technologies will enable game streaming services on smartphones to compete with a quality of experience (QoE) on par with PC or console counterparts, making room for innovative, immersive games based on mobility. However, the report is quick to caution that those opportunities will also bring associated cybersecurity risks and require businesses and governments to consider new regulatory approaches focusing on the safe use of the technology.&nbsp;<\/p>\n<p>The potential attack surface expands as 5G connects numerous devices, from IoT devices to conventional devices used in enterprises. Attacks that exploit device application and endpoint vulnerabilities, and compromised IoT-based DDoS attacks, are expected to increase. The new 5G system environments create challenges for network analysis, wired and wireless network planning, and cyber threat analysis. Beyond increased complexity, there are other considerations when operating in 5G environments. Understanding how 4G and 5G networks will function simultaneously in the same environment is crucial for organizations to ensure reliable and secure networks.&nbsp;&nbsp;<\/p>\n<p>The need to develop an efficient approach to understand, evaluate, and protect critical infrastructure has never been greater. An essential part of the solution lies in new and innovative techniques for modeling and simulating 5G mobile networks.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb539c7 elementor-widget elementor-widget-heading\" data-id=\"bb539c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Expanding Attack Surface<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-771c782 elementor-widget elementor-widget-text-editor\" data-id=\"771c782\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>5G has a few significant privacy and <a href=\"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/rising-data-breaches-and-leaks-information-security-folks-need-to-think-ahead-of-the-attackers\/\" target=\"_blank\" rel=\"noreferrer noopener\">security<\/a> wins \u2013 it encrypts identifiers, offers security and privacy gains such as spoofing and anti-tracking features. These capabilities can provide significant benefits such as protecting users from manipulation and other online network threats. But at the same time, 5G has its own set of security challenges. It is expected to boost mobile internet growth for both individual and enterprise use, thereby creating an explosion of IoT connected devices. Because of IoT growth, the attack surface on 5G networks will be immensely greater with a highly complex ecosystem with numerous cyber-attack entry points. One of the major issues with expected IoT growth is that for some devices, primarily for the low-cost and low-powered items, security can be non-existent.&nbsp;<\/p>\n<p>Security holes remain on 5G as devices still connect to older networks. While connected to 5G, users can still be tracked using information that remains unencrypted as it is transmitted due to a flaw in the GSMA standard. Moreover, some flaws in 5G allow for \u201cdowngrade\u201d attacks, and threat actors could use unresolved flaws in the older networks to launch an attack.&nbsp;<\/p>\n<p>Mobile operators will be affected by liabilities in the old <a href=\"https:\/\/www.juniper.net\/documentation\/en_US\/junos-mobility11.2\/topics\/concept\/gtp-mobility-protocols-overview.html\" target=\"_blank\" rel=\"noreferrer noopener\">GTP protocol<\/a> as they embrace 5G&nbsp;<\/p>\n<p>infrastructure. The protocol bugs enable user impersonation, user tracking, fraud attacks, and denial of service. Furthermore, spoofing attacks and mass disruption of the network are some of the protocol vulnerabilities\u2019 results. Users will have to face the same attacks even when they shift to and from 5G networks, despite the protocol containing security features to avoid the attacks.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7f747b elementor-widget elementor-widget-heading\" data-id=\"b7f747b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">In conclusion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41036d6 elementor-widget elementor-widget-text-editor\" data-id=\"41036d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As newer capabilities are made possible with 5G, there is an imminent need to focus on devices and applications\u2019 security. It is not just a matter of network user safety but also national security. To build 5G on top of a weak cybersecurity foundation is akin to the foolish man building his house on sand. As we race ahead in the 21st century, never has before a need arisen, where, not just individual lives, but the economy has seen so many participants, each dependent on the other.<\/p>\n<p>As Fred Langa put it, \u201cJust as drivers who share the road must also share responsibility for safety, we all now share the same global network, and thus must regard cybersecurity as a necessary social responsibility.\u201d&nbsp;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As newer capabilities are made possible with 5G, there is an imminent need to focus on devices and applications\u2019 security.<\/p>\n","protected":false},"author":1103,"featured_media":23605,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[195],"tags":[1487,1488,127],"ppma_author":[3830],"class_list":["post-22732","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","tag-5g-mobile-network","tag-5g-technology","tag-cybersecurity"],"authors":[{"term_id":3830,"user_id":1103,"is_guest":0,"slug":"das","display_name":"Shomiron Das Gupta","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/Shomiron-DAS-GUPTA-150x150.jpeg","user_url":"https:\/\/dnif.it","last_name":"Das Gupta","first_name":"Shomiron","job_title":"","description":"Shomiron Das Gupta is Founder and CEO at DNIF HyperScale SIEM that can ingest, enrich, store and correlate cybersecurity data at petabyte scales."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/1103"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=22732"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22732\/revisions"}],"predecessor-version":[{"id":31625,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22732\/revisions\/31625"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/23605"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=22732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=22732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=22732"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=22732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}