Home 5G, EDGE, MIOT CYBERSECURITY

5G, EDGE, MIOT CYBERSECURITY

ENISA NFV Security in 5G
The EU Agency for Cybersecurity (ENISA) continues its excellent effort on 5G security by issuing a report with suggested good practices for the secure deployment of Network Function Virtualisation (NFV) in 5G networks. The report identifies some 60 security challenges for NFV, which it groups in seven categories: Virtualisation or containerisation; Orchestration and management; Administration and access control; New and legacy technologies; Adoption of open source or COTS; Supply chain; Lawful interception (LI). It analyses the relevant security controls and recommends 55 best practices to address these challenges, across technical, policy and organisational facets. Some of the main issues identified are ensuring...
Vodafone Portugal
The attack, discovered on Monday night, impacted the 4g/5g network, TV, voice services, and SMS services provided to more than seven million people. While the company was able to restore 3G services, others remained impacted. It even affected the ATM network of some large banks connected to the Vodafone 4g network. Vodafone called the incident "a deliberate and malicious attack intended to cause damage." Mário Vaz, CEO of Vodafone Portugal, said in a statement that "our absolute priority is the restoration of our services. Our technical teams have been working non-stop from the moment this attack was found to reset the...
FCC
The US Federal Communications Commission (FCC) Chairwoman is asking $5.6B from Congress seeks to reimburse carriers for removing and replacing insecure 5G networking equipment - those made by banned Chinese vendors Huawei and ZTE. Congress had initially set aside $1.9B for the replacement program under The Supply Chain Reimbursement Program created by the Secure and Trusted Communications Networks Act. However, after FCC received 181 applications from carriers, the total cost has been estimated to $5.6B revealing a shortfall of $3.7B. For more information see the FCC press release : CHAIRWOMAN ROSENWORCEL NOTIFIES CONGRESS OF DEMAND TO PARTICIPATE IN THE SECURE AND...
5G EU Report
The EU Court of Auditors issued a special report "5G roll-out in the EU: delays in deployment of networks with security issues remaining unresolved" in which EU auditors are raising an alarm. According to the report, 5G services are seen as essential for a wide range of innovative applications which have the potential to transform many sectors of our economies and improve citizens’ daily lives. 5G is therefore of strategic importance for the entire single market. However, the majority EU member states are not on track with the deployment of their 5G networks and lack a common approach to...
NSA CISA
The US National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) recently released the first of a four part series titled Security Guidance for 5G Cloud Infrastructures. This series of four action-oriented documents is intended to provide guidance on how to move toward zero trust in support of securing 5G. It’s been created as a joint industry and government effort with the support of several large contributors through the NSA’s Enduring Security Framework (ESF). This final release in the series is titled Security Guidance for 5G Cloud Infrastructures - Part IV: Ensure integrity of Cloud Infrastructure with...
NSA CISA
The US National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) recently released the first of a four part series titled Security Guidance for 5G Cloud Infrastructures. This series of four action-oriented documents is intended to provide guidance on how to move toward zero trust in support of securing 5G. It’s been created as a joint industry and government effort with the support of several large contributors through the NSA’s Enduring Security Framework (ESF). This third release in the series is titled Security Guidance for 5G Cloud Infrastructures - Part III: Data Protection with the focus...
NSA CISA
The US National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) recently released the first of a four part series titled Security Guidance for 5G Cloud Infrastructures. This series of four action-oriented documents is intended to provide guidance on how to move toward zero trust in support of securing 5G. It’s been created as a joint industry and government effort with the support of several large contributors through the NSA’s Enduring Security Framework (ESF). This second release in the series is titled Security Guidance for 5G Cloud Infrastructures - Part II: Securely Isolate Network Resources with...
NSA CISA
The US National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) recently released the first of a four part series titled Security Guidance for 5G Cloud Infrastructures. This series of four action-oriented documents is intended to provide guidance on how to move toward zero trust in support of securing 5G. It’s been created as a joint industry and government effort with the support of several large contributors through the NSA’s Enduring Security Framework (ESF). This first release in the series is titled Security Guidance for Cloud Infrastructures Part I: Prevent and Detect Lateral Movement and is...
Syniverse
Syniverse is a critical part of the global telecom infrastructure. It connects 300+ cell phone networks globally and acts as an intermediary for billing records and text messages sent between cell phone networks. In the Securities and Exchange Commission filing Syniverse published last week the company disclosed that in May 2021 it "...became aware of unauthorized access to its operational and information technology systems by an unknown individual or organization." It also revealed that the security breach first started in May 2016 giving the attacker five years of access. Syniverse claims to process more than 740 billion text messages per year...
Securing Society 5.0 Introduction
A term first coined by the Japanese government, “Society 5.0” describes "A human-centered society that balances economic advancement with the resolution of social problems by a system that highly integrates cyberspace and physical space." The fifth evolution of the society, enabled by the fifth generation of cellular networking and cyber-physical systems, imagines technology, things and humans converging to address some of the biggest societal challenges. The concept encompasses Industry 4.0, Fourth Industrial Revolution, Smart-Everything World and other buzzwords of the moment. In the society of the future the more the cyber and physical worlds are combined, the greater the benefits...
Security in 5G Specifications - Controls in 3GPP
The European Union Agency for Cybersecurity (ENISA) released its Security in 5G Specifications Report about key security controls in the Third Generation Partnership Project (3GPP), the main body developing technical specifications for fifth generation of mobile telecommunications (5G) networks. As vendors, system integrators and operators build, deploy and manage 5G networks, the ENISA publication underlines the need for cybersecurity and for the national regulatory authorities in charge of cybersecurity policy development and implementation to have a good understanding of these controls. This new ENISA report is directly driven by the objectives set in the EU toolbox for 5G security - mainly...
Open RAN Security
It's been a year of contradictions for the telecommunications industry. Like most sectors, it has been heavily impacted by the consequences of the Covid-19 pandemic, with a slowdown in global 5G roll-outs being a notable result. Geopolitical conflicts have continued to muddy the market, with governments playing a more active role than ever in setting telecoms-centred policy. At the same time, however, the air is thick with promise and opportunity. Over the last nine months, entire organizations have transitioned to remote working and high-bandwidth video communication. Corporations have accelerated digital transformation initiatives. Online shopping has soared. The appetite for autonomous manufacturing...
5G Cybersecurity Safety
Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind. Born with achromatopsia, a condition of total colourblindness that affects 1 in every 30 000 people, Harbisson's physical faculties are augmented by cyber technology to grant him access to a life of greater meaning and satisfaction. As technological evolution leads to concomitant advances in medical science, we are seeing more and more examples of humans who are integrating devices and sensors into their biological makeup. For some, like those part of the growing "transhumanist" movement, this...
Smart Home Wireless Connectivity
In a recent session on smart building cybersecurity, a student cheekily asked me "How did we ever connect anything before 5G?" At that moment I realized I might have been overdoing my 5G cheerleading recently. To atone, here are the key performance and cybersecurity attributes of the most commonly used connectivity technologies in smart home / smart building use cases... And 5G. If you thought that the "traditional" home life is under heavy attack from digitization of media and constant communication, wait until you learn about the Internet of Things (IoT) and Smart Homes. Our most personal spaces - our homes...
5G Opportunity and Cybersecurity
The human will to innovate is seemingly relentless. The history of our species is one of continual development, with the last 350 years, in particular, representing staggering technological progress. The first industrial revolution mechanized production using natural elements like water. The second revolution used electricity to enable mass production; the third used electronics and information technology to automate production. The fourth industrial revolution unfolding all around us is characterized by an exponential growth in data production and the merging of the physical and digital. Cyber-physical systems (CSPs) like the internet of things (IoT) and industrial control systems (ICS) are capable of...