Page 36 - Cyber Defense eMagazine September 2022
P. 36

5G technology not only helps in improving responsiveness but also helps in increasing the speed of
            wireless  networks.  Additionally,  the  availability  of  advanced  antenna  networks  along  is  helping  5G
            technology to offer 20 GBPS speed to carry and transfer data. The development of smart networks is
            allowing the emergence of smart homes, cities or towns. Thus, the dependency on 5G technology has
            increased massively.

            Although most end user sectors are planning to maximize the use of 5G technology, the potential of cyber
            threats has multiplied more then ever. Thus, the same 5G technology that has opened the doors for
            innovation  in  technology  has  invited more  cyber  threats.  Future Market Insight states  that the  cyber
            security market is expected to register a CAGR of 10.5% by the end of 2032. This is due to cybersecurity
            becoming a necessity across IT industries rather than a want.

            An increase in incidences of computer intrusion (hacking), denial of services and virus deployment has
            become a matter of concern for end user industries. This had led to governmental authorities of different
            countries  to  invest  in  cyber  security  to  save  their  private  and  important  data  from  being  misused.
            Government regulation on  data  privacy  along  with  increasing  number  of  data  centers  are  effectively
            deploying the use of 5G networks to combat cybersecurity threats. This, in turn, not only promises the
            use of 5G networks for better connectivity but also ensures safety from cybersecurity from threats.



            5G Network Services: Securing Internal and External Communications

            Telecom operators deploying 5G networks and edge services are constantly at the receiving end of facing
            cyber threats. This, in turn, affects the confidentiality of data of users and attracts a negative reputation
            for  the  company.  External  and  internal  threats  to  cybersecurity  are  expected  to  grow  owing  to  the
            increasing development of IoT devices. In addition, the modernization of telecom operators to hybrid
            cloud-based architectures has further increased the chances of digital threats in the technology world.
            Thus, companies are planning to deploy 5G networks to prevent enterprises from cybersecurity threats.

            IBM and Palo Alto Networks have collaborated to help operators build secure 5G networks. Through this
            collaboration, the companies are working together to deliver cyber security solutions to enterprise and
            telecom customers around the world. The collaboration of these two companies combine various features
            such  as  automation  spanning  multifunction  network  devices  and  VNFs,  control  plane  security  and
            container security. Thus, the combination of integrated security services and services designed for 5G
            networks and eco systems is helping end user industries to combat cybersecurity threats in more ways
            than one. Furthermore, IBM is working with communication service providers on a “secure by design”
            strategy that will help in building cybersecurity capabilities for every part of the business.



            5G Networks – Protecting Data and Network Intrusion

            Penetration  of  technology  in  nearly  every  sector  of  human  life  has  increased  the  interconnectivity
            between various electronic devices, thus, increasing the chances of cyber security threats. Today, data
            storing and saving have changed drastically. The innumerable options of capturing data and redirecting
            it has increased cybersecurity threats. Although 5G networks have increased accessibility to information




            Cyber Defense eMagazine – September 2022 Edition                                                                                                                                                                                                         36
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   31   32   33   34   35   36   37   38   39   40   41