<p>Many organizations increasingly rely on 5G technologies for mobile communications, making any 5G security weaknesses of interest to attackers. The good news is that <a href=”https://www.techtarget.com/searchnetworking/tip/5G-security-Everything-you-should-know-for-a-secure-network”>5G standards have significantly improved cybersecurity</a> for mobile communications overall. Even so, threat actors inevitably still target 5G devices, networks and services.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1′)</script>
</div>
</div>
<p>While mobile network operators are responsible for countering many of these threats through their own security controls, <a href=”https://www.techtarget.com/searchnetworking/tip/Top-5G-use-cases-for-business-include-fixed-wireless-healthcare”>organizations that use 5G services</a> should still consider how bad actors could use the technology against them. What follows are my top insights on 5G security threats for enterprise CISOs, based on a <a href=”https://www.nccoe.nist.gov/5g-cybersecurity#project-promo”>series</a> of 5G cybersecurity white papers I co-authored for NIST’s National Cybersecurity Center of Excellence. </p>
<section class=”section main-article-chapter” data-menu-title=”Top 5G security threats”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Top 5G security threats</h2>
<p>Major 5G cybersecurity threats tend to fall into the following three categories: threats against 5G services and infrastructure, attacks against 5G devices and unavailability of 5G networks.</p>
<h3>1. Threats against 5G services and infrastructure</h3>
<p>Mobile network operators follow 5G standards in their implementations, but those standards do not require operators to implement or enforce all defined cybersecurity features. Attackers might take advantage of resulting gaps to target devices using 5G services.</p>
<p>For example, attackers might use 5G to spy on users’ geographic locations. Each 5G user, or “subscriber,” is assigned a unique subscription permanent identifier (SUPI). Some 5G implementations transmit unprotected SUPIs, which can enable eavesdroppers
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: