The Chinese New Year is getting closer and closer, and the Spring Festival Gala, which is a must-have for the Chinese New Year, is also being intensively prepared. As we all know, at the Shenzhen venue this year, 5G network transmission of 4K ultra-high-definition content will be historically realized! This is the first 5G network 4K transmission in my country. Although this is good news brought by 5G, we have to raise such a question: "Is 5G really safe?"
In the scenario of connecting everything built by 5G+IoT, people and things, people and things, and things and things will all be connected at high speed through 5G networks, which also gives hackers and malicious codes more attack opportunities, bringing fatal impacts on mobile office security, sensitive data, and even national infrastructure. Therefore, eliminating security risk concerns under 5G networks is of particular significance for the rapid development of the era of the Internet of Everything. The impact of 5G As 5G becomes more widely used, several things will happen in the future:
Examples of 5G and IoT For example, enhanced communication services in connected cars will go far beyond the set of interactions that already exist in in-car IoT devices such as brakes, environmental monitors, GPS, and even entertainment systems. Real-time connections between drivers and businesses enable financial transactions such as paying for fuel, ordering food at a drive-through restaurant, or paying tolls. Infrastructure-based IoT communications will enhance traffic management and enable features such as autonomous highway driving. Likewise, there are significant implications for healthcare and the medical Internet of Things. 5G speeds will enable real-time data transmission, supporting remote surgery, tracking of other connected medical devices (including wearable medical IoT), and analysis of tests and scans by remote professionals. These advances will not only allow patients to access the best doctors in the world, but will also extend medical care to remote areas where medical resources are scarce. Security implications for 5G and IoT These new connected environments also have serious consequences for security. The biggest challenge is the exponential growth of cyberattacks due to the rapid expansion of IoT devices and edge-based computing, followed by the fact that these devices are not necessarily connected to a central network and are not convenient for centralized management. With billions of IoT devices interconnected in a mesh edge environment, any device can become the weakest link in the security chain and put the entire enterprise at risk. To meet this challenge, we need to think about some fundamental changes in how networks and security are approached.
Although these are just a few of the security risks brought about by the adoption and deployment of 5G networks, this is the beginning of a new era of networks. Security also needs to address the following scenarios:
Where to Start Many organizations clearly underestimate the potential impact of the 5G revolution and the role it will play in the next round of the digital economy. However, there are several things organizations can do now to prepare. The most effective way is to transition traditional, isolated point defense products to an integrated, automated and open security fabric using open APIs and common standards. This approach also requires combining single-pane management and control with security technology that can be applied across multiple environments such as traditional networks, SD-WAN, multi-cloud, highly mobile endpoints and IoT devices for consistent visibility and control. |
<<: Ten questions about the issuance of 5G temporary licenses: how far is 5G?
>>: A brief discussion on the application and suggestions of IPv6 in enterprise transformation
iWebFusion is a website of H4Y, a well-establishe...
[[326825]] We'll cover the different 5G speed...
The evolution of mobile communication networks is...
[[426836]] OSPF OSPF is an IGP and a Link-State p...
Ericsson and Swisscom have signed an expanded 5G ...
Today, from wearable devices to smart homes to in...
Now everyone is talking about 5G, just like when ...
Since the promotion of 5G mobile phones and packa...
[51CTO.com original article] On December 18, 2019...
On April 12-13, 2017, the 2017 Asia Pacific CDN S...
The day before yesterday, we shared the news of R...
[Original article from 51CTO.com] In order to ena...
TmhHost is a Chinese hosting company founded in 2...
LocVps is a long-established Chinese hosting comp...
The case shared in this issue is related to VRRP ...