5G is smart. Now let’s make it secure
Fifth-generation (5G) wireless technology promises to deliver wonderous new capabilities ranging from smart cities, to smart factories, smart cars, and more. Moving from promise to reality will require those networks to be secure. The technology that enables 5G, however, brings with it two compounding cybersecurity challenges. First, the “virtualization” in software of network functions previously performed by hardware introduces the potential to hack that software. At the same time, the wireless industry has seized on virtualization as the basis for new protocols that will open the market to new providers of network components, thus further expanding potential attack vectors.
The “smart” future rests on secure network pathways, yet the United States has not addressed the need for regulatory oversight of a common approach to 5G cybersecurity.
On December 15, join the Center for Technology at Brookings for a discussion focusing on the multiple cybersecurity paradoxes represented by 5G, such as the paradox of ending reliance on single source suppliers, like Huawei, while opening the door to other cyber threats. It will explore the cybersecurity ramifications of 5G and propose a plan for national cybersecurity oversight, including a plan for funding the network implementation of security requirements.
Viewers can submit questions for speakers by emailing events@brookings.edu or via Twitter at @BrookingsGov by using #Secure5G.
Legal Disclaimer:
EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.
