• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

NSA, CISA Warn Against Threats to 5G Network Slicing

You are here: Home / General Cyber Security News / NSA, CISA Warn Against Threats to 5G Network Slicing
December 15, 2022

The Nationwide Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have unveiled new recommendations pertaining to the security challenges associated with 5G network slicing and how to mitigate them.

According to the document, a network slice is “an stop-to-close rational network that delivers precise network capabilities and attributes to fit a user’s demands.”

Although multiple network slices operate on a solitary actual physical network, the recommendations clarify network slice customers are authenticated for only a one network location, enabling information and security isolation.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“This type of architecture intensely depends on a Network-as-a-Company (NaaS) model, combining Infrastructure-as-a-Services with network and security products and services, which improves the operational effectiveness and resiliency of the 5G infrastructure,” reads the guideline.

“Within a 5G architecture, the plan is to supply the entire NaaS so that distinctive client segments can be competently supported.”

Irrespective of this significant amount of security, however, the NSA and CISA have warned that network-slicing menace vectors exist and span throughout plan and expectations, source chain and method architecture.

“Network slicing can be tricky to regulate, and the slices add complexity to the network,” reads the report.

“While there are standards defining specs for how network operators develop their 5G network, there are not clear requirements for how network operators need to build and put into practice security for network slicing.”

According to the doc, inappropriate network slice administration may permit attackers to access knowledge from distinctive network slices or deny entry to licensed people.

Much more exclusively, the report mentions Denial of Provider (DoS) attacks, Guy-in-the-Center (MitM) attacks and configuration attacks.

“Although network slicing is not solely exceptional to 5G, it is a critical component for the reason that 5G technical specs call for network slicing as a essential part and hence demand network operators to undertake security procedures that can mitigate threats like all those explained in this paper, DoS, MitM attacks, and configuration attacks,” reads the information.

Due to the fact of these threats, the NSA and CISA have explained the monitoring and maintenance of a network slice are paramount to identifying and mitigating attacks.

“For much more strong security, network operators must look at procedures, as referenced in this paper, these kinds of as zero believe in, multi-layer security, cross-area answers, post-quantum cryptography, and isolation,” the agencies concluded.

More information about cyber-attacks towards 5G networks is obtainable in a modern explainer by Tim Hardwick, managed remedies and consulting lead of EMEA at Spirent.


Some areas of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Loan Scam Campaign ‘MoneyMonger’ Exploits Flutter to Hide Malware
Next Post: Senate Approves Bill Banning TikTok From US Government Devices Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Russian Turla Hackers Hijack Decade-Old Malware Infrastructure to Deploy New Backdoors
  • WhatsApp Unveils Proxy Support to Tackle Internet Censorship
  • Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub
  • Blind Eagle Hacking Group Targets South America With New Tools
  • US Family Planning Non-Profit MFHS Confirms Ransomware Attack
  • Microsoft Reveals Tactics Used by 4 Ransomware Families Targeting macOS
  • Dridex Malware Now Attacking macOS Systems with Novel Infection Method
  • Cyber attacks on UK organisations surged 77% in 2022, new research finds
  • WhatsApp to combat internet blackouts with proxy server support
  • The IT Pro Podcast: Going passwordless

Copyright © TheCyberSecurity.News, All Rights Reserved.