5G and its Cybersecurity Implications for Enterprises
|出版商||Frost & Sullivan||商品編碼||951788|
|出版日期||內容資訊||英文 38 Pages
|5G和5G網絡安全對企業的影響 5G and its Cybersecurity Implications for Enterprises|
|出版日期: 2020年07月21日||內容資訊: 英文 38 Pages||
完整的5G網絡實施將高速連接許多設備，並有望通過提供超低延遲和大帶寬為組織和企業帶來許多好處。公司將採用5G來最大化物聯網，雲端，大數據和AI，以推動他們的轉型之旅。隨著5G的普及，支持5G的SD-WAN和網狀網絡的採用率將大大提高。 5G還帶來了更多的安全風險，因為在犯罪中可以利用虛擬化漏洞等5G網絡漏洞。 5G連接了許多設備，從企業中使用的傳統設備到OT和商業環境中使用的IoT設備，從而擴大了潛在的攻擊面。預計基於物聯網的DDoS攻擊和利用端點/設備應用程序中的漏洞的其他攻擊將受到威脅。
The Sophisticated 5G Environment Drives the Need for Scalable, Integrated, and Automated Security
The 5G network is expected to bring about numerous benefits to organizations and enterprises once it is fully implemented, as it will connect a large number of devices at high speed, and offer ultralow latency and massive bandwidth. Industries, such as healthcare, logistics, energy and power, ICT, and others will be leading adopters of the 5G network. 5G will drive smart city/smart nation, smart healthcare, logistics, smart factories, and smart transportation initiatives. Enterprises will embrace 5G to make the most of IoT, cloud, Big Data, and AI which will drive their transformation journeys. 5G will complement these technologies and gradually replace other costly conventional network services. As 5G becomes more popular, the adoption rate of 5G-enabled SD-WAN and mesh networks will increase significantly. 5G also presents more security risks, as criminals may be able to exploit flaws in the 5G network, such as virtualization vulnerability.
As 5G connects numerous devices, from conventional devices used in enterprises to IoT devices used in OT and commercial environments, the potential attack surface expands. Compromised IoT-based DDoS attacks and other attacks that exploit endpoint/device application vulnerabilities are expected to increase. To tackle 5G-related security challenges, businesses and network operators will adopt a shared security model, similar to public cloud security. DDoS protection is likely to become the most important component of 5G security, as the number of devices connecting to a network grows each day. As these devices are often vulnerable to exploitative attacks, organizations will have to invest more in vulnerability management capabilities to prevent volumetric DDoS attacks. A conventional security approach may not offer adequate protection when bandwidth usage increases. Therefore, organizations will seek scalable and automated security solutions with AI-/ML-powered threat detection-and-response capabilities.