Talking at the digital (ISC)2 Security Congress Kevin McNamee, director of risk intelligence at Nokia, explored the security implications encompassing the introduction of 5G mobile technology, outlining 5 key techniques 5G is growing the attack floor.
“5G is bringing a good deal to the table in terms of new security features, but I also [want to] mention the draw back – the attack area,” he claimed.
The 1st way in which 5G is widening the attack surface is the huge advancement of IoT gadgets, McNamee ongoing.
“IOT devices are [often] vulnerable, unprotected and unpatched, and with 5G, additional are coming. If they are out there and they are susceptible and visible to unique elements of the network, they are going to be hacked and result in challenges.”
The future 5G security issue that McNanee cited was what he coined “multi-accessibility edge computing.”
With multi-entry edge computing, “you’ve got thousands and thousands of equipment accessing facts centers or spread over the town, and it can turn into pretty a obstacle in terms of management, checking and incident response.
“So whoever’s running these multi-accessibility edge clouds has to take into account how they are managed and keep an eye on them to make sure they are functioning appropriately and not remaining abused,” McNamee included.
Then there is the abuse of 5G bandwidth by way of DDoS attacks, McNamee discussed. “If you are working a enormous selection of cellular equipment, there is the opportunity for attackers to increase their DDoS attack bandwidth.
“It raises the bar with regards to how we defend versus DDoS attacks when there are so a lot of gadgets out there.”
The fourth security issue that McNamee referred to is the opportunity visibility of the 5G IP address house.
“With 5G, if we change to IPv6 default, there’s the opportunity to open up up visibility. If a system is seen from the internet and the network, it would make the attack surface area even larger. So visibility gets a critical thing.”
The final way in which 5G is expanding the attack surface relates to the probable focusing on of ‘slicing’ – a present day way of segregating/isolating person and application communities – in attacks. “Slicing does focus the focus on particular parts of the network,” and that can be exploited by cyber-attackers, McNamee concluded.
Some parts of this posting are sourced from: