Are there any new cybersecurity threats that come with 5G technology?


5G technology has long been a source of controversy over health and security concerns. This is particularly true because the introduction of an open, all-software defined network will require a physical and technological overhaul of essential networks and cybersecurity practices, but there are also strong incentives for adoption. 

5G not only paves the way for great progress in the field of cloud-native networks, but also creates opportunities for entirely new commercial services in connection with the increased need for artificial intelligence and data warehouse accessibility. Even so, any major upheaval of the digital environment comes with implementation challenges and this network is open to several cybersecurity concerns. 

Fewer choke points 

For all of the perceived benefits to come from moving to a software-based operating system — namely, a reduced need to upgrade physical infrastructure — the major downside is the diminished presence of choke points. 

As the network currently operates, hardware choke points act as a funnel for all information that passes through them and can be controlled and maintained using cyber hygiene practices. With fewer chokepoints, this activity will be distributed to a network of digital routers, resulting in decentralization of this critical process and ultimately reducing the effectiveness of protective measures against cybersecurity threats. This is a serious concern in and of itself; when combined with the threat leveled by professional hackers dedicated to the game, it opens up the network to many potential security issues in the future. 

More entry points 

With a growing number of devices connected to the Internet of Things (IoT) comes an increase in the number of possible entry points for attackers. This is expected to triple by 2025. Of course, this number has the potential to continue on a path of exponential growth as hackers inevitably become (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by David Burke. Read the original post at: