You are currently viewing Cybersecurity & 5G Networks

Cybersecurity & 5G Networks

The unfolding of the coronavirus pandemic has forced millions of users to transition to working from home at an unprecedented pace. The idea that working remotely would become ordinary in just a matter of weeks has brought about extraordinary changes in the digital world. The strain on computer networks and cloud based services has soared at an exceptional scale. The rising demand in cloud computing and wireless connectivity has presented large vulnerabilities to hacking, ransomware attacks and other cybercrimes during the pandemic. 

Critical business assets and functions are significantly more exposed to opportunistic and targeted cyberattacks by criminal organizations and nations-states seeking to take advantage of rising vulnerabilities. The shift to work from home has exposed networks to be more vulnerable and cloud dependent, as shifting overnight from centralized servers to decentralized wireless connectivity jeopardizes users to be more susceptible to cyberattacks. 

Reshaping the digital landscape and building robust digital infrastructure will be one of the key challenges ahead. Ensuring solid cybersecurity and resilient frameworks will be key in the new normal and in the increasing digital economy. 

The Threats and Opportunities of 5G Technology

The astounding innovations being developed in 5G networks and wireless connectivity are bringing a light exciting and promising growth opportunities for the business world. It is well-known that the rise in 5G networks has the vast potential to boost a wide range of industries – from supply chain; to international transactions & cryptocurrencies; to e-commerce and wireless broadband – but the threats that the technology brings about are still underestimated and lacking formal policies and regulations. 

As reported in an investigation carried out by the Brookings Institution, 5G networks have the ability to move away from centralized hardware-based switching to distributed software-defined digital routing. In theory, this shift enables the network to be predominantly faster but more vulnerable. Previous networks, including 3G and 2G, were hub-and-spoke designs in which everything came to hardware choke points where cyber hygiene could be practiced. In the 5G software defined network, however, that activity is pushed outward to a web of digital routers throughout the network, thus denying the potential for choke point inspection and control. 

The disadvantage of 5G technology it’s that they further complicate cyber vulnerability by virtualizing  software network functions, which were formerly performed by physical appliances. These activities are commonly based on the language of Internet Protocol and operating systems. These standardized building block protocols and systems have proven to be valuable tools for protecting digital networks. The key challenge for 5G will be to guarantee the security and reliance of the network. The shift from hardware to software means that an attacker that gains control of the software managing the network can gain access to the entire network, simply from hacking the artificial intelligence that manages the software. 

Second, the great expansion of bandwidth that makes 5G possible creates additional avenues of attack. Physically, low-cost, short range, small-cell antennas deployed throughout urban areas become new targets. These central elements of the 5G infrastructure creates larger exposure to cyber crimes. The large amount of cells deployed throughout, which is the principal element for the rise of smart cities and the Internet of Things (IoT), embodies a crucial risk for cyber attacks. The vulnerability created by attaching tens of billions of hackable smart devices to the network is the fundamental threat and opportunity arising from IoT, according to Fabio Rugge, author of the Global Race for Technological Superiority. The rapid connectivity and digital infrastructure requires building safe anti-fraud systems and robust regulations. 

Strategies for 5G & Cybersecurity

Fifth-generation networks are undoubtedly a great field of potential and growth, as it is for global interconnectedness and integration. It is important to recognize, however, that they also encompass a multidimensional cybersecurity vulnerability and that it requires a redefined cyber strategy. 

Companies must recognize and be held responsible for a new cyber duty of care. This could be achieved by establishing a rewards-based incentive policy, opposite to a penalty-driven policy, in order for companies to adhere to cybersecurity policies with more ease. Traditionally, the common law has established that companies who provide products and services have a duty of care to identify and mitigate potential harms that could result from their products or services. Governments have the responsibility to guarantee the safety of users and therefore the need to encourage corporate leaders to adhere to a culture of social responsibility. An incentive-reward mechanism, whether in monetary, regulatory or in other forms works as a stimulus for companies to promote cybersecurity and reliability. Companies who meet the cyber hygiene standards and regulations should be treated differently than other non-complying entities, regardless of their power, wealth or dimension. 

According to the World Economic Forum, a new cybersecurity regulatory paradigm with an incentive-reward mechanism should be developed to ensure the security, robustness and reliance of future 5G networks and wireless broadbands. It will allow replacing detailed compliance instructions left over from the industrial era with regular cybersecurity engagements between the regulatory entities, government bodies and companies. A multilateral and transparent approach would enable anticipating possible cyberattacks and promote greater integrity and inclusiveness. Therefore, the framework must ensure that companies investing ahead of failure to address risk factors are rewarded. This is only fair if companies that do step up to their responsibilities are treated differently from companies that do not comply. A rewards-based policy would amplify the value of cyber duty of care participation, especially when others fall short. It would also provide forward-looking incentive for risk reduction and a more useful feedback loop when breaches occur. 

The future of wireless technology holds the promise of total connectivity and great interconnectedness. It has the potential to increase connection speed up to 100 times faster than 4G, lag-time lowered by a factor of five, mobile data volumes thousand times greater than current networks, and lower drain on batteries for remote cellular devices. It promises to open the world to smart cities, driverless cars, improved health care with registered health data, and a full picture of the potential of the Internet of Things that is set to revolutionize entire industries. It is clear that 5G technology has powerful interesting resources to bring into action and empower innovations across the economy, but it also embraces a larger susceptibility to cyberattacks and surveillance. Developing secure cybersecurity regulatory strategies that ensure the safety of users and do not inhibit innovations is fundamental. A multilateral and transparent approach from businesses, government and institutions will be key for the success in cybersecurity and 5G technology.