Page 50 - Cyber Defense eMagazine forJune 2021
P. 50

The Solution to Overcoming Cyber Threats in A 5g World

                      Optical Wireless Communciations (Owc) Will Be Key For Maximizing Security

              By Michael Abad-Santos, Senior Vice President of Business Development and Strategy,
                                                       BridgeComm

            Nearly 6 billion Internet of Things (IoT) devices were in service worldwide at the end of 2020, according
            to Gartner. But mobile operators aren’t the only ones chasing that opportunity. Hackers are, too.
            Each additional IoT device creates another potential back door for hackers to steal identities, financial
            records and other confidential information, or take control of vehicles and critical infrastructure such as
            public  water  supplies.  All  of  these  cyber  attacks  have  been  around  for  years,  but  there  are  several
            reasons why 5G significantly increases the opportunities and vulnerabilities:
               •  5G  is  more  than  just  an  evolutionary  step,  like  4G  was  for  3G.  It’s  a  fundamentally  different
                   architecture based on virtualized, highly distributed, software-defined infrastructure. All of this
                   creates a steep learning curve for both operators and their vendors. It’s inevitable that they’ll
                   overlook many of the cyberattack vectors that the 5G architecture enables.
               •  Private networks will be even more common in 5G than they are in 4G. Owned by factories and
                   other  enterprises,  private  5G  networks  are  potential  back  doors  into  operator  networks.  For
                   example, a hacker could target an enterprise network not to attack the IoT devices that use it, but
                   rather as a route into the mobile operator’s 5G network and the IoT endpoints, smartphones and
                   other devices that use it.
               •  5G relies heavily on application programming interface (APIs) to support service functions. This
                   architecture lays the foundation for API-enabled hacks like the one used to target SolarWinds.








            Cyber Defense eMagazine – June 2021 Edition                                                                                                                                                                                                50
            Copyright © 2021, Cyber Defense Magazine.  All rights reserved worldwide.
   45   46   47   48   49   50   51   52   53   54   55