{"id":19151,"date":"2021-09-01T19:44:18","date_gmt":"2021-09-01T19:44:18","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19151"},"modified":"2023-03-01T19:18:10","modified_gmt":"2023-03-01T19:18:10","slug":"5g-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/","title":{"rendered":"Cybersecurity Risks of 5G \u2013 And How to Control Them"},"content":{"rendered":"\n<p><span style=\"font-weight: 400;\">5G is on the cusp of widespread adoption.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Consumers and organizations are enthused about the operational benefits of more robust mobile connectivity, but the shift to <\/span><a href=\"https:\/\/www.baselinemag.com\/mobility\/the-pros-and-cons-of-5g-infrastructure.html\"><span style=\"font-weight: 400;\">5G networks<\/span><\/a><span style=\"font-weight: 400;\"> doesn&#8217;t come without risks. Service providers and 5G-enabled device manufacturers both have critical roles to play in the success and sustainability of this wireless network rollout. Beyond that, network administrators must be aware of 5G-enabled <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/\"><span style=\"font-weight: 400;\">vulnerabilities<\/span><\/a><span style=\"font-weight: 400;\"> and prepare for threat actors seeking to take advantage of a changing ecosystem.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Here we&#8217;ll discuss the most significant risks posed by 5G, how U.S. agencies are approaching the shift, what makes 5G different, and an analysis of deployment to date.<\/span><\/p>\n\n\n\n<div style=\"height:2px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6ecd705d91\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6ecd705d91\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#What-Are-the-Cybersecurity-Risks-of-5G\" title=\"What Are the Cybersecurity Risks of 5G?\">What Are the Cybersecurity Risks of 5G?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#NTIA-and-CISA-Memos-from-the-Feds\" title=\"NTIA and CISA: Memos from the Feds\">NTIA and CISA: Memos from the Feds<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#What-is-5G-How-is-5G-Different\" title=\"What is 5G? How is 5G Different?\">What is 5G? How is 5G Different?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#Objectives-for-5G-Implementation\" title=\"Objectives for 5G Implementation\">Objectives for 5G Implementation<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#Analyzing-Progress-and-Whats-To-Come\" title=\"Analyzing Progress and What&#8217;s To Come\">Analyzing Progress and What&#8217;s To Come<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What-Are-the-Cybersecurity-Risks-of-5G\"><\/span><span style=\"font-weight: 400;\">What Are the Cybersecurity Risks of 5G?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Exposing the Internet of Things (IoT) Universe<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Consumer electronics, business, network appliances, and industrial IoT (IIoT) devices are all driving the exponential growth of IoT systems. 5G technology will improve some IoT use cases, thereby adding to the proliferation of IoT devices \u2013 a phenomena individuals and organizations aren&#8217;t prepared to fully defend in the immediate future.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">IoT products are <\/span><a href=\"https:\/\/www.esecurityplanet.com\/cloud\/iot-device-risk-to-enterprises\/\"><span style=\"font-weight: 400;\">notoriously vulnerable<\/span><\/a><span style=\"font-weight: 400;\"> appliances because the build prioritizes ease of use and connectivity. Whether it&#8217;s a misconfiguration or inadequate security or <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\"><span style=\"font-weight: 400;\">patching<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/\"><span style=\"font-weight: 400;\">new vulnerabilities<\/span><\/a><span style=\"font-weight: 400;\"> found in IoT systems seem to make the news every week.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Unfortunately, threat actors can also take advantage of 5G&#8217;s enhanced connectivity, executing network attacks faster than ever before. Hackers can spread <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\"><span style=\"font-weight: 400;\">malware<\/span><\/a><span style=\"font-weight: 400;\"> via IoT networks, disrupt <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/supply-chain-flaws-found-in-python-package-repository\/\"><span style=\"font-weight: 400;\">supply chains<\/span><\/a><span style=\"font-weight: 400;\"> in development, and use a fleet of routers as an IoT botnet to launch a <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/types-of-ddos-attacks\/\"><span style=\"font-weight: 400;\">DDoS<\/span><\/a><span style=\"font-weight: 400;\"> attack.<\/span><\/p>\n\n\n\n<p><b>Also Read: <\/b><a href=\"https:\/\/www.esecurityplanet.com\/threats\/cloudflare-mirai-botnet-ddos-attack\/\"><span style=\"font-weight: 400;\">Cloudflare Fended Off Mirai Botnet DDoS Attack<\/span><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Network Slice Compromise<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">One benefit of 5G technology that enterprises are sure to take advantage of is creating private wireless networks in a process dubbed &#8220;network slicing.&#8221; By multiplexing virtualized and independent logical networks on a physical network, organizations can isolate network segments to specific client verticals.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">SAP National Security Services (NS2) CISO Ted Wagner told <\/span><i><span style=\"font-weight: 400;\">eSecurityPlanet<\/span><\/i><span style=\"font-weight: 400;\"> that network slicing &#8220;adds complexity, which may lend itself to insecure implementation. There are no secure implementation guides or standards for network operators. Insecure implementations may result in unauthorized access to threat actors and potential data breaches.&#8221;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">In instances where network administrators operate several slices, including shared and dedicated network functions, this hybrid approach creates a deficiency in mapping between the application and transport layer identities. To be successful, an attacker must gain access to the 5G Service Based Architecture. From there, the risks posed are data access and a DoS attack on other network slices.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Another attack vector to be aware of is the prospect of CUPS hijacking. The CUPS model, or Control and User Plane Separation, isn&#8217;t new, but it shows how 5G relies on more virtualized workloads and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/cloud-security-companies\/\"><span style=\"font-weight: 400;\">cloud-based systems<\/span><\/a><span style=\"font-weight: 400;\">. Because CUPS enables network slicing and can distribute resources throughout the network, its compromise also presents a severe risk.<\/span><\/p>\n\n\n\n<p><b>Also Read:<\/b> <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-implement-microsegmentation\/\"><span style=\"font-weight: 400;\">How to Implement Microsegmentation<\/span><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Give and Take: NFV, SDN, and Microservices<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Network Functions Virtualization (NFV) is a virtualized network infrastructure where typical network functions \u2013 like <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\"><span style=\"font-weight: 400;\">firewalls<\/span><\/a><span style=\"font-weight: 400;\">, routing, and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/sd-wan-security\/\"><span style=\"font-weight: 400;\">SD-WAN<\/span><\/a><span style=\"font-weight: 400;\"> \u2013 can be installed as software through abstraction. NFV consists of virtual machines or <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/container-and-kubernetes-security-vendors\/\"><span style=\"font-weight: 400;\">containers<\/span><\/a><span style=\"font-weight: 400;\"> and offers reduced costs, flexibility, faster deployment, and automation capabilities.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">So how does NFV relate to 5G? Using virtualization, NFV systems enable network slicing. Like so much else, virtualization comes with inherent risk, as several systems could be running and controlled on a single physical device.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Complementary to NFV, software-defined networking (SDN) separates the control plane from the forwarding plane. Great for microservices developing and deploying 5G, SDN also poses threats to the network like traffic spoofing and forwarding device attacks. <\/span><a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-to-control-api-security-risks\/\"><span style=\"font-weight: 400;\">API security<\/span><\/a><span style=\"font-weight: 400;\"> will be a critical concern, as APIs linking microservices across multiple virtualized systems are vulnerable to compromise. This instance can result in NFV data breaches, resource exhaustion, or DDoS attacks.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Attacks at the Network Edge<\/span><\/h3>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-edge-computing\/\"><span style=\"font-weight: 400;\">Edge computing<\/span><\/a><span style=\"font-weight: 400;\"> is the relatively new focus on traffic as close as possible to the client device and user. Naturally, IoT devices and the advanced connectivity via 5G are essential parts of edge computing&#8217;s evolution. And on the edge security front, secure access to devices, safe application use, <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\"><span style=\"font-weight: 400;\">threat detection<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\"><span style=\"font-weight: 400;\">vulnerability management<\/span><\/a><span style=\"font-weight: 400;\">, and patching cycles are all edge security objectives.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Addressing concerns with multi-access edge computing (MEC), Wagner added, &#8220;The lack of a trusted computing environment of 5G components into the MEC could introduce unmitigated risk.&#8221;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">One such threat posed for 4G that remains a source of concern for 5G is rogue base station (RBS) threats. Also known as international mobile subscriber identity (IMSI) catchers, an RBS spoofs a cell phone tower and diverts cell phone traffic to its desired location. This man-in-the-middle (MiTM) technique places the attacker between the mobile client and the mobile network. They can steal sensitive information, tamper with data, track users, execute packet injections, or cause DoS for 5G services.<\/span><\/p>\n\n\n\n<p><b>Also read:<\/b> <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/\"><span style=\"font-weight: 400;\">Mobile Malware: Threats and Solutions<\/span><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"NTIA-and-CISA-Memos-from-the-Feds\"><\/span><meta charset=\"utf-8\"><span style=\"font-weight: 400;\">NTIA and CISA: Memos from the Feds<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">In a year where cybersecurity&#8217;s gotten its share of major media attention, the U.S. federal government is actively seeking opportunities to assist private and public organizations in meeting the cyber challenges of today.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The NTIA and CISA published reports defining the national strategy for effectively developing and implementing 5G infrastructure and the threat vectors posed by this change.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">National Strategy to Secure 5G (NTIA)<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">The National Telecommunications and Information Administration (NTIA) released its <\/span><a href=\"https:\/\/www.ntia.gov\/5g-implementation-plan\"><i><span style=\"font-weight: 400;\">National Strategy to Secure 5G<\/span><\/i><\/a><span style=\"font-weight: 400;\"> implementation plan starting in January. The program includes four initiatives for U.S. interests now and in the years to come:<\/span><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><b>Facilitate domestic rollout of 5G: <\/b><span style=\"font-weight: 400;\">Research and develop advanced communications to maintain 5G leadership and incentivize and leverage trusted supply chain partners<\/span><\/li>\n\n\n\n<li><b>Assess and identify 5G Infrastructure security principles:<\/b><span style=\"font-weight: 400;\"> Evaluate risks and vulnerabilities of domestic\/international suppliers, 5G infrastructure, and supply chains<\/span><\/li>\n\n\n\n<li><b>Address 5G risks to U.S. infrastructure in deployment<\/b><span style=\"font-weight: 400;\">: Identify incentives and policies to close gaps, build economic viability, and incorporate the private sector<\/span><\/li>\n\n\n\n<li><b>Promote responsible global development of 5G<\/b><span style=\"font-weight: 400;\">: Engage diplomatically with international partners to ensure risk mitigation, standards, collaboration, and more<\/span><\/li>\n<\/ol>\n\n\n\n<p><b>Also read:<\/b> <a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\"><span style=\"font-weight: 400;\">Best Third-Party Risk Management (TPRM) Tools<\/span><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">5G Infrastructure Threat Vectors (CISA)<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">In May, the ever-growing Cybersecurity and Infrastructure Security Agency (CISA) published a white paper entitled, <\/span><a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/potential-threat-vectors-5G-infrastructure_508_v2_0%20%281%29.pdf\"><i><span style=\"font-weight: 400;\">Potential Threat Vectors to 5G Infrastructure<\/span><\/i><\/a><span style=\"font-weight: 400;\">. Together, the report outlines established 5G threat vectors and threat scenarios for 1) policy and standards, 2) supply chains, and 3) 5G system architectures.<\/span><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h4 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Policy and Standards<\/span><\/h4>\n\n\n\n<p><span style=\"font-weight: 400;\">Global standards set for 5G must be open, transparent, and consensus-driven. Untrusted proprietary technologies that fail to meet these standards pose lingering threats to their clients and inefficiencies. Within telecommunications, standards bodies should be more vigilant in mandating optional security controls that reduce the risk of cyberattacks.<\/span><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h4 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Supply Chains<\/span><\/h4>\n\n\n\n<p><span style=\"font-weight: 400;\">Information and communications technologies (ICT) have a diverse supply chain vulnerable to added exposure when adopting 5G infrastructure machinery and systems. With billions of devices in the prospective 5G pool, the threat of malicious counterfeit or inherited components from compromised vendors or tools enables the spread of malware.<\/span><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h4 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">5G Systems Architecture<\/span><\/h4>\n\n\n\n<p><span style=\"font-weight: 400;\">While it&#8217;s still the early days of 5G deployment, there&#8217;s already much to learn about the threats posed. A list of sub-threat vectors exists for the network architecture, including network slicing, multi-access edge computing (MEC), spectrum sharing, software-defined networking (SDN), and the switch from 4G legacy communications to 5G networks.<\/span><\/p>\n<\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/09\/ESP_Evolution_transparent-01.png\" alt=\"A graphic showing how wireless networks evolved over the years in terms of bandwidth, frequency, latency, and average speed. 5G is the newest generation of telecommunication networks for wireless devices.\" class=\"wp-image-19155\" width=\"726\" height=\"542\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP_Evolution_transparent-01.png 2560w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP_Evolution_transparent-01-300x224.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP_Evolution_transparent-01-1024x764.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP_Evolution_transparent-01-768x573.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP_Evolution_transparent-01-1536x1146.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP_Evolution_transparent-01-2048x1528.png 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP_Evolution_transparent-01-150x112.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP_Evolution_transparent-01-696x519.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP_Evolution_transparent-01-1068x797.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP_Evolution_transparent-01-1920x1433.png 1920w\" sizes=\"(max-width: 726px) 100vw, 726px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What-is-5G-How-is-5G-Different\"><\/span><span style=\"font-weight: 400;\">What is 5G? How is 5G Different?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">4G LTE (Long-Term Evolution) and 5G NR (New Radio) are examples of radio access networks (RAN), where wireless device data can move from receiver to mobile core network services like the internet. Both protocols are owed to the Generation Partnership Project (3GPP), a consortium of international telecommunications standards organizations.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The above graphic shows how wireless capabilities like latency, average data transfer speeds, and bandwidth have changed over time.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Exponential growth in capabilities like lower latency, more substantial bandwidth, and higher average speeds present a new world of opportunities for mobile connectivity. Today&#8217;s RANs, using 5G frequencies, open the door for service providers to offer cloud gaming, <\/span><a href=\"https:\/\/www.enterprisenetworkingplanet.com\/news\/going-beyond-5g-what-to-expect-from-a-6g-future\/\"><span style=\"font-weight: 400;\">extended reality<\/span><\/a><span style=\"font-weight: 400;\"> (XR), and autonomous device management.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">How 5G Goes Beyond 4G<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">5G adds a number of advancements over 4G:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Data transfer rates up to 10 Gbps<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">A new generation of satellites offering 100% coverage of Earth<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Lower latency that increases speeds from 20-50 milliseconds to less than 10ms<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Shorter frequencies and more band types mean 1000x bandwidth per unit area<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Up to 90% more energy efficient per traffic unit (<\/span><a href=\"https:\/\/www.nokia.com\/about-us\/news\/releases\/2020\/12\/02\/nokia-confirms-5g-as-90-percent-more-energy-efficient\/\"><span style=\"font-weight: 400;\">Nokia<\/span><\/a><span style=\"font-weight: 400;\">)<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">5G can support up to 1 million devices per square kilometer, up from 4G&#8217;s 4,000 devices<\/span><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Objectives-for-5G-Implementation\"><\/span><span style=\"font-weight: 400;\">Objectives for 5G Implementation<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">In September 2019, former FCC chairman Tom Wheeler and retired Rear Admiral David Simpson, USN, wrote <\/span><a href=\"https:\/\/www.brookings.edu\/research\/why-5g-requires-new-approaches-to-cybersecurity\/\"><i><span style=\"font-weight: 400;\">Why 5G requires new approaches to cybersecurity<\/span><\/i><\/a><span style=\"font-weight: 400;\"> for the Brookings Institute. Two years later, we reflect on their insights then and what&#8217;s changed.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">At the time, implementation was on the horizon, while today, we are amidst 5G deployment globally. With federal officials&#8217; recent uptick in cybersecurity strategy, the two overarching recommendations Wheeler and Simpson made were reasonably prudent.&nbsp;<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Incentivizing a Cyber Duty of Care<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Companies everywhere must develop a culture where cyber risk receives treatment as an essential corporate duty \u2013 and further, organizations get rewarded for such behavior. To accomplish this, proposed solutions included:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Proactive investment in cyber risk reduction for organizations of all sizes<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Utilizing <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-ai-is-redefining-cybersecurity\/\"><span style=\"font-weight: 400;\">cognitive technologies<\/span><\/a><span style=\"font-weight: 400;\"> to combat more complex, software-based attacks<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Transparent access to up-to-date indicators of compromise (IoC) and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\"><span style=\"font-weight: 400;\">threat intelligence<\/span><\/a><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">More and robust cybersecurity processes to meet the needs of 5G network complexity<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Inserting security into the <\/span><a href=\"https:\/\/www.esecurityplanet.com\/applications\/devsecops\/\"><span style=\"font-weight: 400;\">DevOps<\/span><\/a><span style=\"font-weight: 400;\"> cycle, including design, deployment, and sustainment<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Implementing the NIST Cybersecurity Framework for best practices (see graphic below)<\/span><\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/09\/ESP.NISTCybersecurityFramework.png\" alt=\"A graphic image showing the 5 core functions provided by the NIST Cybersecurity Framework are 1. Identify, 2. Protect, 3. Detect, 4. Respond, and 5. Recover.\" class=\"wp-image-19154\" width=\"655\" height=\"651\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.NISTCybersecurityFramework.png 2560w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.NISTCybersecurityFramework-300x298.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.NISTCybersecurityFramework-1024x1017.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.NISTCybersecurityFramework-150x149.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.NISTCybersecurityFramework-768x763.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.NISTCybersecurityFramework-1536x1525.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.NISTCybersecurityFramework-2048x2034.png 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.NISTCybersecurityFramework-696x691.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.NISTCybersecurityFramework-1068x1061.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.NISTCybersecurityFramework-1920x1907.png 1920w\" sizes=\"(max-width: 655px) 100vw, 655px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">A New Cyber Paradigm<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">While public and regulatory agencies have long been reactive institutions, the speed of innovation in the digital age requires swifter action. Wheeler and Simpson&#8217;s second point was traditional public institutions must do the work to meet the prospects of an ever-digital society. These considerations include:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Mandate standards for non-government suppliers considering integrated supply chains<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Increase inspection and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-certifications\/\"><span style=\"font-weight: 400;\">certification<\/span><\/a><span style=\"font-weight: 400;\"> of critical network and infrastructure devices<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Enhance consumer transparency about cyber risks with spec standards and labeling<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Recognize market shortcomings and develop incentives for cyber duty of care adoption<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Continue oversight and participate in the secure development of 5G with 3GPP<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Establish a more effective public-private partnership for collective security<\/span><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Analyzing-Progress-and-Whats-To-Come\"><\/span><span style=\"font-weight: 400;\">Analyzing Progress and What&#8217;s To Come<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Two years later, there&#8217;s much to cheer about and concerns that remain. Touching on the authors&#8217; recommendations, here is where we stand today:<\/span><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Progress Points<\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Rapid increases in cybersecurity spending, with <\/span><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2021-05-17-gartner-forecasts-worldwide-security-and-risk-managem\"><span style=\"font-weight: 400;\">Gartner<\/span><\/a><span style=\"font-weight: 400;\"> forecasting total security and risk management spending to exceed $150 billion in 2021 (up 12.4% from 2020)<\/span><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-cybersecurity-software\/\"><span style=\"font-weight: 400;\">Cybersecurity<\/span><\/a><span style=\"font-weight: 400;\"> products and service providers are inserting AI and ML into security capabilities to meet attacks of growing complexity<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">U.S. federal agencies like <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/\"><span style=\"font-weight: 400;\">CISA<\/span><\/a><span style=\"font-weight: 400;\"> gain authority with rising cyberattacks requiring public support, an increasing budget from Congress, and political lobbying<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">DevOps is increasingly adopting cybersecurity to establish DevSecOps processes<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">The announcement of the U.S. <\/span><a href=\"https:\/\/www.cisa.gov\/news\/2021\/08\/05\/cisa-launches-new-joint-cyber-defense-collaborative\"><span style=\"font-weight: 400;\">Joint Cyber Defense Collaborative<\/span><\/a><span style=\"font-weight: 400;\"> at Black Hat 2021 is promising for a growing collective response to cybersecurity threats<\/span><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">To Be Continued<\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Last December, the U.S. Congress passed the <\/span><a href=\"https:\/\/www.esecurityplanet.com\/cloud\/the-iot-cybersecurity-act-of-2020-implications-for-devices\/\"><span style=\"font-weight: 400;\">IoT Cybersecurity Act<\/span><\/a><span style=\"font-weight: 400;\"> applying to government contractors, but regulation for industry vendors remains inefficient<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Transparency for consumers is a work in progress that would mean more federal policies or standards relating to product specifications, labeling, and proper use of devices<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">While beneficial, NIST and CISA frameworks are only recommendations and do not hold organizations accountable to a cyber duty of care<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Critical network and infrastructure devices continue to lack inspection and certification designations that could curb vulnerabilities<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Lack of rewards-based system for organizations meeting cybersecurity objectives<\/span><\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<p><span style=\"font-weight: 400;\">In June, the Ericsson <\/span><a href=\"https:\/\/www.ericsson.com\/en\/mobility-report\/reports\/june-2021\"><span style=\"font-weight: 400;\">Mobility Report<\/span><\/a><span style=\"font-weight: 400;\"> projected over 580 million devices would have 5G subscriptions. By 2026, that number grows to near 3.5 billion 5G mobile subscriptions covering every region of the globe. Though full implementation won&#8217;t be fully realized for some time, CSPs and public and private stakeholders are all responsible for the sustainable development, deployment, and maintenance of 5G networks.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Between now and then, we continue to learn and develop adequate security systems to defend the next generation of wireless networks. Efforts like to shore up <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\"><span style=\"font-weight: 400;\">identity<\/span><\/a><span style=\"font-weight: 400;\">, leverage <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\"><span style=\"font-weight: 400;\">zero trust<\/span><\/a><span style=\"font-weight: 400;\"> frameworks, and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/mobile\/oauth\/\"><span style=\"font-weight: 400;\">authenticate<\/span><\/a><span style=\"font-weight: 400;\"> devices will remain best practices for the immediate future.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Also Read: <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-security-tools\/\"><span style=\"font-weight: 400;\">Top Enterprise Network Security Tools for 2021<\/span><\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6ecd702205-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ecd702205\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ecd702205\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ecd702205\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ecd702205\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ecd702205\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ecd702205\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>5G is on the cusp of widespread adoption. Consumers and organizations are enthused about the operational benefits of more robust mobile connectivity, but the shift to 5G networks doesn&#8217;t come without risks. Service providers and 5G-enabled device manufacturers both have critical roles to play in the success and sustainability of this wireless network rollout. Beyond [&hellip;]<\/p>\n","protected":false},"author":250,"featured_media":19152,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[18,15,16],"tags":[3790,980,563,10106],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31784,90,378,377,140,502,303,286,287,141,375,289],"class_list":["post-19151","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile","category-threats","category-trends","tag-cybersecurity","tag-ddos","tag-iot","tag-wireless-network","b2b_audience-awareness-and-consideration","b2b_product-5g-wireless-protocol-technology","b2b_product-cloud-development-mobile-services","b2b_product-endpoint-security","b2b_product-gateway-and-network-security","b2b_product-mobile","b2b_product-mobile-commerce","b2b_product-mobile-malware","b2b_product-mobile-security","b2b_product-mobile-service-providers","b2b_product-networking","b2b_product-security-management","b2b_product-wireless-protocol-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Risks of 5G \u2013 And How to Control Them | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"5G is the next-generation wireless network presenting opportunities and concerns for cybersecurity. Learn more now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Risks of 5G \u2013 And How to Control Them | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"5G is the next-generation wireless network presenting opportunities and concerns for cybersecurity. Learn more now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-01T19:44:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-01T19:18:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.Cybersecurity5G-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sam Ingalls\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/SamIngalls\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Ingalls\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/\"},\"author\":{\"name\":\"Sam Ingalls\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\"},\"headline\":\"Cybersecurity Risks of 5G \u2013 And How to Control Them\",\"datePublished\":\"2021-09-01T19:44:18+00:00\",\"dateModified\":\"2023-03-01T19:18:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/\"},\"wordCount\":2047,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.Cybersecurity5G-scaled.jpg\",\"keywords\":[\"cybersecurity\",\"DDOS\",\"IoT\",\"wireless network\"],\"articleSection\":[\"Mobile\",\"Threats\",\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/\",\"name\":\"Cybersecurity Risks of 5G \u2013 And How to Control Them | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.Cybersecurity5G-scaled.jpg\",\"datePublished\":\"2021-09-01T19:44:18+00:00\",\"dateModified\":\"2023-03-01T19:18:10+00:00\",\"description\":\"5G is the next-generation wireless network presenting opportunities and concerns for cybersecurity. Learn more now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.Cybersecurity5G-scaled.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.Cybersecurity5G-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Satellites will be a key component of 5G adoption worldwide that will expand connectivity but also poses new cybersecurity risks. Read more to learn what they are and how to prepare.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Risks of 5G \u2013 And How to Control Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\",\"name\":\"Sam Ingalls\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"caption\":\"Sam Ingalls\"},\"description\":\"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/singalls\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls\"],\"url\":\"https:\/\/www.esecurityplanet.com\/author\/singalls\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Risks of 5G \u2013 And How to Control Them | eSecurity Planet","description":"5G is the next-generation wireless network presenting opportunities and concerns for cybersecurity. Learn more now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Risks of 5G \u2013 And How to Control Them | eSecurity Planet","og_description":"5G is the next-generation wireless network presenting opportunities and concerns for cybersecurity. Learn more now.","og_url":"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/","og_site_name":"eSecurity Planet","article_published_time":"2021-09-01T19:44:18+00:00","article_modified_time":"2023-03-01T19:18:10+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.Cybersecurity5G-scaled.jpg","type":"image\/jpeg"}],"author":"Sam Ingalls","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/SamIngalls","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sam Ingalls","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/"},"author":{"name":"Sam Ingalls","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2"},"headline":"Cybersecurity Risks of 5G \u2013 And How to Control Them","datePublished":"2021-09-01T19:44:18+00:00","dateModified":"2023-03-01T19:18:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/"},"wordCount":2047,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.Cybersecurity5G-scaled.jpg","keywords":["cybersecurity","DDOS","IoT","wireless network"],"articleSection":["Mobile","Threats","Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/","url":"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/","name":"Cybersecurity Risks of 5G \u2013 And How to Control Them | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.Cybersecurity5G-scaled.jpg","datePublished":"2021-09-01T19:44:18+00:00","dateModified":"2023-03-01T19:18:10+00:00","description":"5G is the next-generation wireless network presenting opportunities and concerns for cybersecurity. Learn more now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.Cybersecurity5G-scaled.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.Cybersecurity5G-scaled.jpg","width":2560,"height":1707,"caption":"Satellites will be a key component of 5G adoption worldwide that will expand connectivity but also poses new cybersecurity risks. Read more to learn what they are and how to prepare."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Risks of 5G \u2013 And How to Control Them"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2","name":"Sam Ingalls","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","caption":"Sam Ingalls"},"description":"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.","sameAs":["https:\/\/www.linkedin.com\/in\/singalls\/","https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls"],"url":"https:\/\/www.esecurityplanet.com\/author\/singalls\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19151"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19151"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19151\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19152"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19151"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19151"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19151"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}