The Chinese New Year is getting closer and closer, and the Spring Festival Gala, which is a must-have for the Chinese New Year, is also being intensively prepared. As we all know, at the Shenzhen venue this year, 5G network transmission of 4K ultra-high-definition content will be historically realized! This is the first 5G network 4K transmission in my country. Although this is good news brought by 5G, we have to raise such a question: "Is 5G really safe?"
In the scenario of connecting everything built by 5G+IoT, people and things, people and things, and things and things will all be connected at high speed through 5G networks, which also gives hackers and malicious codes more attack opportunities, bringing fatal impacts on mobile office security, sensitive data, and even national infrastructure. Therefore, eliminating security risk concerns under 5G networks is of particular significance for the rapid development of the era of the Internet of Everything. The impact of 5G As 5G becomes more widely used, several things will happen in the future:
Examples of 5G and IoT For example, enhanced communication services in connected cars will go far beyond the set of interactions that already exist in in-car IoT devices such as brakes, environmental monitors, GPS, and even entertainment systems. Real-time connections between drivers and businesses enable financial transactions such as paying for fuel, ordering food at a drive-through restaurant, or paying tolls. Infrastructure-based IoT communications will enhance traffic management and enable features such as autonomous highway driving. Likewise, there are significant implications for healthcare and the medical Internet of Things. 5G speeds will enable real-time data transmission, supporting remote surgery, tracking of other connected medical devices (including wearable medical IoT), and analysis of tests and scans by remote professionals. These advances will not only allow patients to access the best doctors in the world, but will also extend medical care to remote areas where medical resources are scarce. Security implications for 5G and IoT These new connected environments also have serious consequences for security. The biggest challenge is the exponential growth of cyberattacks due to the rapid expansion of IoT devices and edge-based computing, followed by the fact that these devices are not necessarily connected to a central network and are not convenient for centralized management. With billions of IoT devices interconnected in a mesh edge environment, any device can become the weakest link in the security chain and put the entire enterprise at risk. To meet this challenge, we need to think about some fundamental changes in how networks and security are approached.
Although these are just a few of the security risks brought about by the adoption and deployment of 5G networks, this is the beginning of a new era of networks. Security also needs to address the following scenarios:
Where to Start Many organizations clearly underestimate the potential impact of the 5G revolution and the role it will play in the next round of the digital economy. However, there are several things organizations can do now to prepare. The most effective way is to transition traditional, isolated point defense products to an integrated, automated and open security fabric using open APIs and common standards. This approach also requires combining single-pane management and control with security technology that can be applied across multiple environments such as traditional networks, SD-WAN, multi-cloud, highly mobile endpoints and IoT devices for consistent visibility and control. |
<<: Ten questions about the issuance of 5G temporary licenses: how far is 5G?
>>: A brief discussion on the application and suggestions of IPv6 in enterprise transformation
This article is reprinted from the WeChat public ...
The Industrial Ethernet market will grow from a c...
They say honeymooning in Niagara Falls sets you u...
While we’re all so used to 404 Not Found pages, a...
Some people say that 2G brought us mobile Interne...
As one of the most important infrastructures, fib...
According to IDC's Global Ethernet Switch and...
HostUS is a foreign hosting company founded in 20...
The first time to share information about ProfitS...
As networks move toward automation and intelligen...
China Unicom is currently actively promoting the ...
Megalayer is a foreign hosting company establishe...
RAKsmart has upgraded its July discount plan. In ...
There are ten thousand ways for us to live in pea...
[Shenzhen, China, April 17, 2019] Today, during t...