Daily News Bytes

Chapter 7: 5G Cyber Security Challenges

stylish_lining

Introduction:

  • 5G refers to the fifth generation of mobile networks. After 1G, 2G, 3G, and 4G networks, it is a new global wireless standard.
  • It provides a new type of network capable of connecting nearly everyone and everything, including machines, objects, and gadgets.
  • Internet speeds in the 5G high-band spectrum have been tested to reach as high as 20 Gbps (gigabits per second), while the greatest internet data speed in 4G has been reported at 1 Gbps in most circumstances.

5G geopolitics

  • Given the potential for 5G technology to impact our digital future and deliver economic transformation, it is not unexpected that top tech giants have worked hard to get the 'first mover' advantage.
  • There are fears that China will weaponize 5G technology by coercing Chinese telecom companies to disclose consumer data with the government or even force them to shut down 5G networks during times of geopolitical turmoil.
  • In recent years, the United States has led a push to oppose China's telecom companies' dominance in the 5G industry.
  • There have been initiatives to bring like-minded and leading democratic states together to collectively address the technological threat posed by authoritarian countries such as China and Russia.

 

5G and the Cyber Threat Environment

  • Given the potential role that 5G will play in national development and economic progress, it is undeniably an essential infrastructure. As a result, 5G communication networks will be a lucrative target for cyberattacks, including sabotage.
  • Because of the increased speeds and capacity, 5G need more access points and network edges, which connect the local network or device to the internet.
  • This transfers many fundamental network operations to the network's edges, closer to the end user, making it difficult to enforce security compliance and ensure trusted third-party providers.

The Way Forward:

  • 5G opens up new possibilities for digitalization and prosperity, yet the technology and network are inherently insecure. As a result, countries like India that are implementing 5G must have a cyber resiliency plan in place.
  • Much is dependent on the various ecosystem members' cyber and information-security rules. Organisations connecting to the 5G network must be aware of the expanding threat landscape, implement appropriate security policies, assess their threat posture, and secure their digital infrastructure. Because threat actors continue to target developing vulnerabilities, this will require continual patching and upgrading.
  • End-user awareness will be a vital component of this resiliency. Their cyber hygiene, or understanding of safe practises in cyberspace, might assist individuals in dealing with dangers and protecting oneself.

Other Related News

29 March,2023

India's National Older Persons Policy

A Central Sector Scheme of the Integrated Program for Senior Citizens is operate by the Ministry of Social Justice and Empowerment (IPSrC). Data About Old Person The percentage of seniors in the
Share It

Newsletter Subscription


ACQ IAS
ACQ IAS