Info Image

SecurityGen Highlights Cyber-security Risks & Solutions for 5G Network Slicing

SecurityGen Highlights Cyber-security Risks & Solutions for 5G Network Slicing Image Credit: Marko Aliaksandr/Bigstockphoto.com

Research from global mobile trade association the GSMA estimates that the market for virtual network slicing among enterprises is projected to be worth USD$300bn by 2025. However, mobile operators who are seeking to use their 5G networks to offer network slicing to business customers must be prepared to take on extra responsibility around cyber-security, according to Dmitry Kurbatov, co-founder and CTO at SecurityGen, the global provider of security solutions and services for the telecom industry.

“Successful network slicing relies on honesty and transparency between operators and businesses on what is the safest, most secure choice that fulfils their connectivity needsThe newer and more complex a technology is, the more potential security threats and vulnerabilities are hidden within it – 5G is no exception,” he explained. “Operators and enterprises alike need to keep this in mind and have a plan for dealing with possible cyber threats and vulnerabilities that might occur when using a virtual slice of a 5G network.”

Kurbatov points to a breach isolation from one slice to another via a shared network resource as the most likely cyber-attack vector via a 5G network slice.

“Businesses should imagine their operator’s 5G network as a co-working space that they share with multiple tenants. Movable partition walls and doors provide privacy and security. These can be placed in different positions depending on who is currently renting space and how much space each tenant needs.”

“Now imagine there’s a window in one partitioned space. It’s left open one night, and hackers are able to enter the space and steal valuable data. If the walls and doors between the partitioned spaces are strong and secure, then the impact of this theft is limited to one single tenant. But if hackers are able to access one slice of the network from another, the damage will be much wider and affect more businesses, and potentially be more serious.”

“While this may sound scary, there are effective cyber-security measures which operators and businesses who opt for 5G network slicing should put in place,” he said. “They need to identify their core assets and what threatens them, and then protect these assets, continuously monitor the security status and be ready with a proactive remediation plan for how to recover and undo any damage that might occur from a breach.”

“Tried and tested IT security frameworks and approaches will work if they’re properly applied to a 5G network slice rollout - but only if they’re supported by a thorough, in-depth understanding of the mobile telecom domain as well,” Kurbatov concluded.

NEW REPORT:
Next-Gen DPI for ZTNA: Advanced Traffic Detection for Real-Time Identity and Context Awareness
Author

Ray is a news editor at The Fast Mode, bringing with him more than 10 years of experience in the wireless industry.

For tips and feedback, email Ray at ray.sharma(at)thefastmode.com, or reach him on LinkedIn @raysharma10, Facebook @1RaySharma

PREVIOUS POST

A1 Telekom Austria Partners with Amdocs to Modernize its Digital Business Systems in Bulgaria

NEXT POST

Nokia, OpenColo Complete Field Trial to Transport 800GE Link Aggregation Group