The new 5G network provides a wide range of benefits should enterprises choose to take advantage of it. Conversely, it creates security challenges for these organizations as well.
One of the greatest challenges facing enterprise security teams is a growing lack of visibility into their enterprise network traffic. While these teams can monitor business traffic over their broadband Internet and multiprotocol label switching (MPLS) links, they are blind to traffic flowing directly to cloud resources over the public Internet or the use of mobile networks by company-owned devices.
With 5G, this visibility problem will increase. Higher network speeds and bandwidth on mobile networks will encourage the use of these networks for corporate IoT and mobile devices, increasing the percentage of corporate traffic into which the security team lacks visibility.
In addition to high speeds and increased bandwidth, 5G also offers a 90% reduction in energy consumption, making it an ideal choice for power-constrained IoT devices. As a result, these devices will increasingly be connected to and accessible from the public internet.
IoT devices are notorious for their poor security, which includes the use of default passwords, insecure protocols, and built-in backdoors. Connecting these devices directly to mobile networks, where the company lacks visibility, will make them increasingly vulnerable to attack.
In recent months, Huawei has frequently appeared in the news as countries consider banning the company’s systems from their 5G networks. These decisions are significant and newsworthy because there are few companies manufacturing the systems needed for 5G networks and Huawei is the largest.
With 5G, mobile networking has moved to primarily software-defined networking, meaning that programming errors in 5G systems can have significant impacts on mobile network security. Huawei components are known to have security vulnerabilities, which could potentially enable cyber criminals to exploit the 5G network and connected devices. Other vendors’ products could have similar vulnerabilities or be targeted by supply chain attacks.
The 5G network is designed to move most of the network’s functionality to the edge, within 5G base stations. With 5G, more base stations are required, and they cover a smaller geographic area. This shift to a greater number of more powerful cellular towers makes them a potential target of attack. Alternatively, a fake base station can be used to eavesdrop upon or attack devices using the 5G network.