Intelligent CIO Europe Issue 76 | Page 52

FEATURE : 5G

THE MAIN CHALLENGE FACING 5G CYBERSECURITY IS THE PERCEPTION THAT 5G IS SIMPLY A FASTER RADIO NETWORK .

including servers , storage , networking and an overarching management system . As a result , it is a complex system that needs protection . Relying on standard hardware and software components also means that cybercriminals are more familiar with the system than with previous implementations that relied on specialised hardware and software .
What unique risks does 5G pose to IoT devices and how can these risks be mitigated ? that has been traditionally hard-wired on site to shift to using 5G . However , many of these devices were not designed to be used in a shared network . Their security design assumes an air-gapped network . Treating 5G as just another network cable may lead to these devices being moved to 5G without being secure enough in a shared environment .
To mitigate these risks , it is essential to understand the security context in which the devices were developed and the security features that 5G might add on top of that . Especially for older equipment , it might make more sense to deploy new versions of the equipment that were developed with self-protection in mind , rather than relying on air-gaps to keep old and unsecure equipment alive . Additionally , understanding the security features of 5G , including network slicing , is essential to ensure their advantages and limitations are well understood .
Could you explain the role of Edge Computing in 5G networks and its implications for cybersecurity ?
Using 5G to connect IoT devices is not riskier than previous generations . In fact , it might enhance IoT device security if they are operated in separate network slices . In pre-5G networks , devices were separated logically , which could be compromised . However , 5G network slices are part of the actual network specification and comparable to physically separated networks .
Higher bandwidth and low latency using 5G TSN ( Time-Sensitive Networking ) may lead to equipment
When discussing Edge Computing in the context of 5G networks , it is important to differentiate between two types : Network Virtual Functions ( NVFs ) and services that benefit from features such as bandwidth and latency .
NVFs are essential components of 5G networks and are used to implement core services that operate the network . They can also be used to provide additional services such as firewalls and global load balancing . The packaging of these auxiliary services is identical to
52 INTELLIGENTCIO EUROPE www . intelligentcio . com