How much responsibility do operators have for the rise in hacking?

5G technology is on the threshold of widespread adoption. Consumers and companies are excited about the operational benefits of a more robust mobile connection, but the move to 5G networks is not without risk. Service providers and manufacturers of 5G-enabled devices play a critical role in the success and sustainability of this wireless network deployment.

However, due to inherent software vulnerabilities, the 5G application ecosystem may pose a serious security risk not only to individuals but also to the country. For example, a network’s attack surface is the total number of access points a hacker can use. Rather than the current centralized hardware-based and hub-and-spoke designs found in 4G, 5G’s dynamic software-based systems have multiple traffic routing points. Multiple unregulated entry points into the network allow hackers to track location and access cellular reception of registered users.

One of the main concerns is that 5G’s dynamic software-based systems have multiple traffic routing points, rather than the current centralized hardware-based and hub-and-spoke designs found in 4G. This means there are more entry points for cybercriminals, which increases the risk of cyberattacks.

Additionally, the increased use of connected devices via the Internet of Things (IoT) also increases the risk of cyber attacks. IoT devices can be vulnerable to attacks and used as entry points to access larger networks.

Responsibility of Operators

Telecom companies have an important responsibility for the cyber security of their users. For example, the telecommunications company Telefonica states that cyber security is one of the most strategically important aspects and one of the main systemic risks facing society. At Telefónica they invest in strengthening the resilience of digital infrastructures and the solutions they offer to their customers. They are working to build trust and promote the digitization of our societies and economies.

READ  Proptech Ladam Academy Opens Advanced Course on Tokenization and Blockchain Technology

However, it is important to take into account that telecommunications companies have no responsibility for the design or management of third-party applications and cannot control the functions provided by the applications in terms of cybersecurity.

Government is responsible

Governments play an important role in protecting their citizens against cyber attacks. According to a McKinsey report, more than 100 governments have developed national cybersecurity strategies to combat the cybersecurity risks facing their citizens, businesses, and critical infrastructure. The report identifies five common elements of successful national strategies: a dedicated national cybersecurity agency, a national critical infrastructure security plan, a national incident response and recovery plan, a national cybersecurity awareness and education strategy, and a public-private national cybersecurity strategy. . together with

Governments can improve their cybersecurity by moving away from the shared secret model and adopting solutions that are easier for consumers and employees to use. This includes using multi-factor authentication, implementing measures to prevent phishing and other attacks, and promoting safe practices among users.

See also: 5G Americas brings together more than 50 ICT experts at event on connectivity

Also see: Demand for software outstrips supply of skilled talent

Also See: Disney+ Loses 15 Million Subscribers in Six Months

Dodaj komentarz

Twój adres e-mail nie zostanie opublikowany. Wymagane pola są oznaczone *