The Chinese New Year is getting closer and closer, and the Spring Festival Gala, which is a must-have for the Chinese New Year, is also being intensively prepared. As we all know, at the Shenzhen venue this year, 5G network transmission of 4K ultra-high-definition content will be historically realized! This is the first 5G network 4K transmission in my country. Although this is good news brought by 5G, we have to raise such a question: "Is 5G really safe?"
In the scenario of connecting everything built by 5G+IoT, people and things, people and things, and things and things will all be connected at high speed through 5G networks, which also gives hackers and malicious codes more attack opportunities, bringing fatal impacts on mobile office security, sensitive data, and even national infrastructure. Therefore, eliminating security risk concerns under 5G networks is of particular significance for the rapid development of the era of the Internet of Everything. The impact of 5G As 5G becomes more widely used, several things will happen in the future:
Examples of 5G and IoT For example, enhanced communication services in connected cars will go far beyond the set of interactions that already exist in in-car IoT devices such as brakes, environmental monitors, GPS, and even entertainment systems. Real-time connections between drivers and businesses enable financial transactions such as paying for fuel, ordering food at a drive-through restaurant, or paying tolls. Infrastructure-based IoT communications will enhance traffic management and enable features such as autonomous highway driving. Likewise, there are significant implications for healthcare and the medical Internet of Things. 5G speeds will enable real-time data transmission, supporting remote surgery, tracking of other connected medical devices (including wearable medical IoT), and analysis of tests and scans by remote professionals. These advances will not only allow patients to access the best doctors in the world, but will also extend medical care to remote areas where medical resources are scarce. Security implications for 5G and IoT These new connected environments also have serious consequences for security. The biggest challenge is the exponential growth of cyberattacks due to the rapid expansion of IoT devices and edge-based computing, followed by the fact that these devices are not necessarily connected to a central network and are not convenient for centralized management. With billions of IoT devices interconnected in a mesh edge environment, any device can become the weakest link in the security chain and put the entire enterprise at risk. To meet this challenge, we need to think about some fundamental changes in how networks and security are approached.
Although these are just a few of the security risks brought about by the adoption and deployment of 5G networks, this is the beginning of a new era of networks. Security also needs to address the following scenarios:
Where to Start Many organizations clearly underestimate the potential impact of the 5G revolution and the role it will play in the next round of the digital economy. However, there are several things organizations can do now to prepare. The most effective way is to transition traditional, isolated point defense products to an integrated, automated and open security fabric using open APIs and common standards. This approach also requires combining single-pane management and control with security technology that can be applied across multiple environments such as traditional networks, SD-WAN, multi-cloud, highly mobile endpoints and IoT devices for consistent visibility and control. |
<<: Ten questions about the issuance of 5G temporary licenses: how far is 5G?
>>: A brief discussion on the application and suggestions of IPv6 in enterprise transformation
[[423701]] The large-scale deployment of IPv6 in ...
Here are 8 ways to fix a slow Internet connection...
On November 1, several major domestic operators o...
A few days ago, a netizen left a message asking h...
[[267883]] 1. Seven-layer network model The http ...
V5.NET is a professional independent server renta...
From May 15th to 16th, the "2019 China Petro...
Riverbed, the Application Performance Company, to...
As a low-power wide area network communication te...
According to Zhongguancun Online, relevant person...
Downloading a high-definition movie in the blink ...
Last month, Hostons added a Jacksonville data cen...
IoT drives SD-WAN adoption The Internet of Things...
In the past decade of development of the communic...
On August 9, 2019, Huawei held the "Unleashi...