Daily News Analysis

Chapter 7: 5G Cyber Security Challenges

stylish_lining

Introduction:

  • 5G refers to the fifth generation of mobile networks. After 1G, 2G, 3G, and 4G networks, it is a new global wireless standard.
  • It provides a new type of network capable of connecting nearly everyone and everything, including machines, objects, and gadgets.
  • Internet speeds in the 5G high-band spectrum have been tested to reach as high as 20 Gbps (gigabits per second), while the greatest internet data speed in 4G has been reported at 1 Gbps in most circumstances.

5G geopolitics

  • Given the potential for 5G technology to impact our digital future and deliver economic transformation, it is not unexpected that top tech giants have worked hard to get the 'first mover' advantage.
  • There are fears that China will weaponize 5G technology by coercing Chinese telecom companies to disclose consumer data with the government or even force them to shut down 5G networks during times of geopolitical turmoil.
  • In recent years, the United States has led a push to oppose China's telecom companies' dominance in the 5G industry.
  • There have been initiatives to bring like-minded and leading democratic states together to collectively address the technological threat posed by authoritarian countries such as China and Russia.

 

5G and the Cyber Threat Environment

  • Given the potential role that 5G will play in national development and economic progress, it is undeniably an essential infrastructure. As a result, 5G communication networks will be a lucrative target for cyberattacks, including sabotage.
  • Because of the increased speeds and capacity, 5G need more access points and network edges, which connect the local network or device to the internet.
  • This transfers many fundamental network operations to the network's edges, closer to the end user, making it difficult to enforce security compliance and ensure trusted third-party providers.

The Way Forward:

  • 5G opens up new possibilities for digitalization and prosperity, yet the technology and network are inherently insecure. As a result, countries like India that are implementing 5G must have a cyber resiliency plan in place.
  • Much is dependent on the various ecosystem members' cyber and information-security rules. Organisations connecting to the 5G network must be aware of the expanding threat landscape, implement appropriate security policies, assess their threat posture, and secure their digital infrastructure. Because threat actors continue to target developing vulnerabilities, this will require continual patching and upgrading.
  • End-user awareness will be a vital component of this resiliency. Their cyber hygiene, or understanding of safe practises in cyberspace, might assist individuals in dealing with dangers and protecting oneself.

India’s Import Curbs on Jute Products from Bangladesh

India has imposed immediate restrictions on the import of jute and allied fibre products from Bangladesh. These apply at all Indian land and seaports except Nhava Sheva in Maharash
Share It

GPS Interference

  GPS interference refers to deliberate or unintentional disruption of Global Positioning System (GPS) signals, which are crucial for navigation in aircraft, ships, and ground transport sy
Share It

India’s Civil Nuclear Law Reform:

  India is revising its civil nuclear laws—the Atomic Energy Act (AEA), 1962 and the Civil Liability for Nuclear Damage Act (CLNDA), 2010—to: Attract private and forei
Share It

Secondary Pollutants

A recent study has shed light on an important aspect of India's air pollution crisis: secondary pollutants, which now contribute to nearly one-third of PM2.5 pollution in the country. These pollut
Share It

Myogenesis

Group Captain Shubhanshu Shukla’s Myogenesis experiments on the ISS represent a major leap forward in India’s space research efforts, focusing on the formation and regulation of muscle fib
Share It

Central Sector Scheme of Scholarship for College and University Students (CSSS)

A scholarship scheme under the Pradhan Mantri Uchchatar Shiksha Protsahan (PM-USP) initiative by the Ministry of Education’s Department of Higher Education. It Provides financial assistance to m
Share It

Khasi People

The Meghalaya High Court has admitted a Public Interest Litigation (PIL) concerning the tribal certificate issuance for the Khasi community.This PIL challenges a government decision that has halted th
Share It

Similipal Tiger Reserve

Odisha High Court issued a notice to the Integrated Tribal Development Agency (ITDA) over a ban on Munda tribals from accessing Jayara, a sacred grove inside the tiger reserve.This raised concerns ove
Share It

Begonia nyishiorum

A fascinating new species of flowering plant, Begonia nyishiorum, has been discovered in the East Kameng district of Arunachal Pradesh, further highlighting the rich but underexplored biodiversity of
Share It

Asiatic Wild Dog

Asiatic Wild Dog A new study by the Wildlife Institute of India (WII) has confirmed the return of the dhole (Asiatic wild dog) to Kaziranga-Karbi Anglong Landscape (KKAL) in Assam, after being beli
Share It

Newsletter Subscription


ACQ IAS
ACQ IAS