5G, new opportunities or new threats?

The acronym 5G refers to the fifth generation of technologies and standards for wireless communication that are expected to revolutionize the world of telecommunications and virtually all sectors due to the significant improvement over its predecessor 4G and even over other established technologies.
To put ourselves in a situation, we are talking about an increase in the transmission speed from 1200 Mbit / s from the most advanced 4G standard to 10000-20,000 Mbit / s and with latencies that can be reduced from 20 ms to an imperceptible 1-2 ms .

When we add to this the increase in devices that can be connected per square kilometer, the wide bandwidth, nearly 100% coverage and the energy savings on devices, it is safe to say that we have a great opportunity to find new ones Business models, but also with a great opportunity for new threats and headaches.
A few weeks ago, AdaptiveMobile Security revealed the details of a serious security vulnerability in the 5G architecture related to network slicing.
Network slicing consists of running multiple logical networks as independent operations that adapt to the unique needs of each network within the same physical infrastructure.
We’re talking about one of the most interesting features of 5G networks, especially in the corporate sector, and this vulnerability could allow data access and denial-of-service (DDoS) attacks, exposing customers to malicious cyberattacks.
At the moment, this issue is not that worrying as it was found at a very early stage in its implementation and work is already underway to resolve it. In addition, there are currently not many telephone providers who offer or can offer network slicing in their networks.
It is impossible to believe that this problem and those that may be to come will stop the steady progress of 5G, but we should ask ourselves: will we be ready to secure these networks when they become widespread and economical and? get social? Engine? Be an environment conducive to new and more complex cybersecurity problems? Can any issues that arise from implementation and maintenance overshadow the benefits? For better or for worse, all of these questions are answered in a timely manner. (Rubn Rodríguez, DLTCode consultant)

Copyright © Grupo Edefa SA Reproduction, in whole or in part, of this article is prohibited without permission and prior authorization from the publisher.

Back to top button