The security pain points staring at telecom operators' networks are set to rise with the deployment and development of 5G technology. For instance, US-based AT&T currently faces nearly 10 billion security incidents a day.
The onset of new technology architecture as well as the prevalence of software-defined networking (SDN) and network functions virtualization (NFV) have subsequently poised to increase network elements vulnerabilities.
With the evolving nature of network architecture, the 5G brings in more security threats unlike the previous generation of technology, and poses an ultimate risk as a multitude of services such as e-health, e-education and connected cars are set to become a mainstay.
However, the service providers, anticipating the network vulnerability, have already started to strategise in order to ensure optimum network safety, but a deadly threat looms at devices side that may also pose a life-threatening challenge.
The technology transition from 2G to finally a low-latency 5G would now offer ubiquitous connectivity enabling machine-to-machine or M2M communications\u2014 making a wide array of applications and devices to go live and talk with each other.
The bigger risk, however, is on the device front. The penetration of diverse devices and a bunch of utility applications are all set to capture, store and stream personal data seamlessly across locations, not only making data privacy at the epicenter but also device ecosystem unpreparedness to thwart attacks from multiple entry points has emerged as a key challenge.
The ecosystem is at a very nascent stage and the stakeholders are now readying their strategies in sync with a variety of Internet of Things (IoT) devices poised to cater to a whole lot of utility applications in sectors such as healthcare, education, agriculture, and home automation.
Cisco Systems that offers telecom networking portfolio believes that the security architecture must continue to evolve to discourage evident threats, and prescribes that threat intelligence must be at the core of an effective 5G security strategy.
Advanced malware, according to it, should be fixed that would require specially-designed tools to spot the stuff meant to evade basic filters, in addition to behavior-based checks on endpoints that are equally critical.
DNS or domain name system as a major threat route requires intelligence, and anomaly detection by using big data and machine learning to ascertain threats not covered by basic filters are some of the must-do tasks.
In the first half of 2019, the quantum of 5G devices grew rapidly, according to the UK-based group which attributed telecom service providers\u2019 aggressive commercial deployments of next-generation of services worldwide.
The GSA has identified 13 device form factors that have already marked their presence, and that includes cellphones, hotspots, laptops, modules, customer premise equipment (CPE), IoT routers, switches, drones, and USB terminals.
Back in India, the commercial 5G deployments are apparently no closer as the pilot initiatives with a trial spectrum are yet to kick start by the three dominant telecom carriers\u2014Reliance Jio Infocomm, Vodafone Idea and Bharti Airtel.
While India embarks on an ambitious 5G roadmap, it\u2019s high time for device ecosystem to come together and bring in fool-proof products to ride on next-generation of networks.","blog_img":"","posted_date":"2019-08-29 14:07:08","modified_date":"2019-09-09 13:04:26","featured":"0","status":"Y","seo_title":"Securing the devices in 5G era","seo_url":"securing-the-devices-in-5g-era","url":"\/\/www.iser-br.com\/tele-talk\/securing-the-devices-in-5g-era\/3748","url_seo":"securing-the-devices-in-5g-era"}">
电信技术的第五代,通常称为5 g细胞通讯中一个里程碑就在拐角处出现网络安全问题而争论全球不排除印度旨在到2020年推出的下一代网络。
安全痛点盯着电信运营商的网络将上升5 g的部署和开发技术。例如,美国AT&T目前面临近100亿一天安全事故。
出现新的技术架构以及软件定义网络的流行(SDN)和网络功能的虚拟化(NFV)随后将增加网络元素的漏洞。
网络体系结构的演化性质,5 g带来更多的安全威胁与前一代技术,并提出一种终极风险e-health等多种服务,作为连接汽车将成为主流。
然而,服务提供者,预测网络的脆弱性,已经开始strategise为了确保最佳网络安全,但在设备方面致命的威胁迫在眉睫,也可能造成危及生命的挑战。
技术从2 g到最后一个低延迟5 g现在将提供无所不在的连接使机器对机器或M2M通信——使各种应用程序和设备去生活和互相交谈。
然而,更大的风险是在设备上。不同设备的普及率和一群实用应用程序都将捕获、存储和流个人数据无缝跨地点,不仅在震中数据隐私,而且设备生态不意挫败来自多个入口点的攻击已成为一个关键的挑战。
生态系统是在一个非常新兴的阶段和涉众现在准备他们的策略与各种物联网同步(物联网)设备准备迎合很多实用程序应用于行业,如医疗、教育、农业和家庭自动化。
思科系统公司提供电信网络组合相信安全架构必须继续发展阻碍明显威胁,和规定,威胁情报必须有效的5 g安全战略的核心。
先进的恶意软件,根据它,应该是固定的,要求特别设计工具发现的东西为了逃避基本过滤器,除了行为检查端点也同样重要。
DNS或域名系统作为主要威胁路线需要智慧,利用大数据和异常检测和机器学习确定威胁没有被纳入到基本的过滤器是一些必做的任务。
在2019年上半年,5 g的量子设备迅速增长,据英国集团由于电信服务提供商的激进的商业部署下一代全球服务。
GSA已经确定了13个设备已经标志着他们的存在形式因素,包括手机、热点地区,笔记本电脑,模块,客户前提设备(CPE)、物联网路由器、交换机、无人机、USB终端。
回到印度,商业5 g部署显然是没有更近的试点计划试验谱尚未启动的三大电信carriers-Reliance Jio Infocomm,沃达丰的想法和Bharti Airtel。
而印度开始一项雄心勃勃的5 g路线图,是时候为设备生态系统一起,把骑在下一代网络的可靠产品。
免责声明:作者的观点仅和ETTelecom.com不一定订阅它。乐动体育1002乐动体育乐动娱乐招聘乐动娱乐招聘乐动体育1002乐动体育ETTelecom.com不得负责任何损害任何个人/组织直接或间接造成的。
The security pain points staring at telecom operators' networks are set to rise with the deployment and development of 5G technology. For instance, US-based AT&T currently faces nearly 10 billion security incidents a day.
The onset of new technology architecture as well as the prevalence of software-defined networking (SDN) and network functions virtualization (NFV) have subsequently poised to increase network elements vulnerabilities.
With the evolving nature of network architecture, the 5G brings in more security threats unlike the previous generation of technology, and poses an ultimate risk as a multitude of services such as e-health, e-education and connected cars are set to become a mainstay.
However, the service providers, anticipating the network vulnerability, have already started to strategise in order to ensure optimum network safety, but a deadly threat looms at devices side that may also pose a life-threatening challenge.
The technology transition from 2G to finally a low-latency 5G would now offer ubiquitous connectivity enabling machine-to-machine or M2M communications\u2014 making a wide array of applications and devices to go live and talk with each other.
The bigger risk, however, is on the device front. The penetration of diverse devices and a bunch of utility applications are all set to capture, store and stream personal data seamlessly across locations, not only making data privacy at the epicenter but also device ecosystem unpreparedness to thwart attacks from multiple entry points has emerged as a key challenge.
The ecosystem is at a very nascent stage and the stakeholders are now readying their strategies in sync with a variety of Internet of Things (IoT) devices poised to cater to a whole lot of utility applications in sectors such as healthcare, education, agriculture, and home automation.
Cisco Systems that offers telecom networking portfolio believes that the security architecture must continue to evolve to discourage evident threats, and prescribes that threat intelligence must be at the core of an effective 5G security strategy.
Advanced malware, according to it, should be fixed that would require specially-designed tools to spot the stuff meant to evade basic filters, in addition to behavior-based checks on endpoints that are equally critical.
DNS or domain name system as a major threat route requires intelligence, and anomaly detection by using big data and machine learning to ascertain threats not covered by basic filters are some of the must-do tasks.
In the first half of 2019, the quantum of 5G devices grew rapidly, according to the UK-based group which attributed telecom service providers\u2019 aggressive commercial deployments of next-generation of services worldwide.
The GSA has identified 13 device form factors that have already marked their presence, and that includes cellphones, hotspots, laptops, modules, customer premise equipment (CPE), IoT routers, switches, drones, and USB terminals.
Back in India, the commercial 5G deployments are apparently no closer as the pilot initiatives with a trial spectrum are yet to kick start by the three dominant telecom carriers\u2014Reliance Jio Infocomm, Vodafone Idea and Bharti Airtel.
While India embarks on an ambitious 5G roadmap, it\u2019s high time for device ecosystem to come together and bring in fool-proof products to ride on next-generation of networks.","blog_img":"","posted_date":"2019-08-29 14:07:08","modified_date":"2019-09-09 13:04:26","featured":"0","status":"Y","seo_title":"Securing the devices in 5G era","seo_url":"securing-the-devices-in-5g-era","url":"\/\/www.iser-br.com\/tele-talk\/securing-the-devices-in-5g-era\/3748","url_seo":"securing-the-devices-in-5g-era"},img_object:["","retail_files/author_1605157979_91901.jpg"],fromNewsletter:"",newsletterDate:"",ajaxParams:{action:"get_more_blogs"},pageTrackingKey:"Blog",author_list:"Bhawna Kumari",complete_cat_name:"Blogs"});" data-jsinvoker_init="_override_history_url = "//www.iser-br.com/tele-talk/securing-the-devices-in-5g-era/3748";">