The challenges of 5G technology are large-scale. To download at a speed of 10-20 Gbps, a constant frequency of up to 300 GHz is required. In addition, we have challenges related to security and privacy in 5G technology.
Powerful signal range requires an incredible infrastructure to make the most of 5G technology. In addition, data-driven services need to be protected with multi-layered security practices.
The huge expectations created around the evolution of the mobile network to its 5th generation revolve around the economy and the millions of jobs that can be created with the technology.
At the same time, it is throwing up numerous challenges related to data security, protection and privacy that need to be addressed to enable 5G technology to truly impact positively on people’s daily lives.
New challenges for data security and privacy with 5G technology
The adoption of 5G technology will fuel innovation using, for example, the Internet of Things (IoT) and Artificial Intelligence (AI), which is often built with basic security controls, creating a larger attack surface.
At the same time, trust in data means that data breaches can cause greater damage. In addition, the post-COVID-19 way of working means that we are likely to be more reliant on those technologies that allow us to work and interact remotely, albeit with less proven safety.
The thing about 5G technology is that it will not be limited to individual customers, as with 2G, 3G and 4G. It’s not just about having a faster mobile network or richer smartphone functions.
5G will also serve vertical industries, from which a wide range of new services will emerge.
As vertical industries are thriving, the Internet of Things (IoT), connected vehicles, augmented and virtual reality, to name just a few, will all require fast and ubiquitous network and data access.
In the context of vertical industries, security demands can vary greatly between services. For example, mobile IoT devices require only light security, while high-speed mobile services require highly efficient mobile security.
The network-based security approach used today to secure the path between communicating parties may not be efficient enough to build differentiated end-to-end security for various technology services.
As 5G technology gains momentum, more people will be able to remotely operate or “talk” to networked devices, for example instructing installations in smart homes
A stricter authentication method, e.g. biometrics, is therefore needed to prevent unauthorized access to devices.
The security and privacy of a system as vast and global as 5G technology cannot be properly built on top of other basic parts of the systems.
Instead, security and privacy features should be integrated into the design of IT solutions from the outset.
Security and privacy requirements are often seen as obstacles in system design, but ignoring them at the outset will not pay off in the long run. Adding resources later is less effective and usually more expensive.
Dialogue between the security, privacy communities and all other parties contributing to 5G technology can begin to solve all these challenges
Now is the time to consider the security of 5G infrastructures as new “virtual” technologies such as Software Defined Networking (SDN) and network virtualization take over.
To do this, the security design of 5G technology will have to consider questions of how to securely isolate, deploy and manage virtual network “slices”.
Another consideration for security designers is to build a security architecture suitable for different access technologies.
Mobile devices have many options in how they access networks. For example, they can connect to networks directly, or through a gateway, or in device-to-device mode.
Networks will also have to be able to detect what type of service a user is using, but detecting the type of service may involve user privacy.
Add it all up and protecting privacy in 5G will also be more challenging.
The basic issues revolving around 5G security at the moment can be summarized as follows:
- Whether 5G security and privacy solutions will cover the service layer in addition to the access layer;
- The role of end-to-end protection mechanisms should be extended to those of previous generations;
- Whether for extended identity protection and location privacy against active attackers.
Whatever the answers, there will be a growing need for secure infrastructure, including rigorous identity management and data protection, as well as a vast array of system-level protections in place to defend against distributed denial of service (DDoS) and other attacks.
Security challenges ahead of 5G technology
The global rollout of the 5G network and the increasing integration with technology products in all forms of daily activities create security challenges for reliable innovation.
The absence of a security and privacy by design mindset will make the 2020s a record period for cyberattacks on connected devices, putting consumer privacy at risk.
This is especially true given the new post-COVID-19 working environment we are entering.
The increase in breaches will result in increased fines for organizations that fail to comply with privacy and security regulations at the federal level, such as the General Data Protection Act (GDPR).
High-tech providers and government organizations must join forces to develop frameworks that promote security, fighting cybercriminals, preserving personal information, data privacy and all the resources that address technology applied to business.
The CipherTrust Data Security Platform solution enables companies to protect their structure against attacks
According to IDC, more than 175 zetabytes of data will be created by 2025, and today more than half of all corporate data is stored in the cloud.
To handle the complexity of where data is stored, CipherTrust Data Security Platform provides strong capabilities to protect and control access to sensitive data in databases, files, and containers. Specific technologies include:
CipherTrust Transparent Encryption
Encrypts data in on-premises, cloud, database, file, and Big Data environments with comprehensive access controls and detailed data access audit logging that can prevent the most malicious attacks.
CipherTrust Database Protection
It provides transparent column-level encryption of structured and confidential data that resides in databases such as credit card, social security numbers, national identification numbers, passwords, and e-mail addresses. Fundamental in the data traffic that should occur with the use of 5G technology.
CipherTrust Application Data Protection
It offers APIs for developers to quickly add encryption and other cryptographic functions to their applications, while SecOps controls the encryption keys.
CipherTrust Tokenization
It offers application-level data tokenization services in two convenient solutions that provide customer flexibility – Token without Vault with dynamic policy-based data masking and Tokenization in Vault.
CipherTrust Batch Data Transformation
Provides static data masking services to remove sensitive information from production databases so that compliance and security issues are alleviated when sharing a database with a third party for analysis, testing, or other processing.
CipherTrust Manager
It centralizes keys, management policies, and data access for all CipherTrust Data Security Platform products and is available in FIPS 140-2 Level 3 compliant physical and virtual formats.
CipherTrust Cloud Key Manager
It offers Bring Your Own Key (BYOK) lifecycle management for many 5G technology infrastructure, platform and software-as-a-service cloud providers.
CipherTrust KMIP Server
It centralizes key management for the Key Management Interoperability Protocol (KMIP) commonly used in storage solutions.
CipherTrust TDE Key Manager
Centralizes key management for encryption found in Oracle, SQL and Always Encrypted SQL.
The portfolio of data protection products that make up the CipherTrust Data Security Platform solution enables companies to protect data at rest and in motion across the entire IT ecosystem and ensures that the keys to this information are always protected and only under your control.
It simplifies data security, improves operational efficiency, and accelerates compliance time. Regardless of where your data resides.
The CipherTrust platform ensures that your data is secure, with a wide range of proven, industry-leading products and solutions for deployment in data centers, either those managed by cloud service providers (CSPs) or managed service providers (MSPs), or as a cloud-based service managed by Thales, a leading security company.
Portfolio of tool that ensures data protection applied to 5G technology
With data protection products from the CipherTrust Data Security Platform, your company can:
Strengthen security and compliance with 5G technology use
CipherTrust data protection products and solutions address the demands of a range of security and privacy requirements, including electronic identification, authentication and trust, Payment Card Industry Data Security Standard (PCI DSS), General Data Protection Act (LGPD), and other compliance requirements.
Optimizes team and resource efficiency
CipherTrust Data Security Platform offers the broadest support for data security use cases in the industry, with products designed to work together, a single line for global support, a proven track record of protecting against evolving threats, and the industry’s largest ecosystem of data security partnerships.
With a focus on ease of use, APIs for automation, and responsive management, the CipherTrust Data Security Platform solution ensures that your teams can quickly deploy, secure, and monitor the protection of your business.
In addition, professional services and partners are available for design, implementation, and training assistance to ensure fast and reliable implementations with minimal staff time.
Reduces total cost of ownership
The CipherTrust Data Security Platform data protection portfolio offers a broad set of data security products and solutions that can easily scale, expand to new use cases, and have a proven track record of protecting new and traditional technologies, including impacting the use of 5G technology.
With CipherTrust Data Security Platform, companies can prepare their investments for the future while reducing operating costs and capital expenditures.
About Eval
With a track record of leadership and innovation dating back to 2004, Eval not only keeps up with technological trends, but we are also in an incessant quest to bring news by offering solutions and services that make a difference to people’s lives.
With value recognized by the market, EVAL’s solutions and services meet the highest regulatory standards of public and private organizations, such as SBIS, ITI, PCI DSS, and LGPD. In practice, we promote information security and compliance, increase companies’ operational efficiency, and reduce costs.
Innovate now, lead always: get to know Eval’s solutions and services and take your company to the next level.
Eval, safety is value.