What’s the big deal?, Telecom News, ET Telecom

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being.

Cyber security for mobile networks: What’s the big deal?By Randeep Raina, CTO, Nokia India

In today’s digital world, where the internet has become a part of life, growing digitalization and networking has also seen incidents of cybercrime and data breach becoming more and more common. Cyber threats are constantly evolving, becoming more sophisticated and harder to detect.

India ranks amongst some of the most cyber attacked countries in the world. As per the Ministry of Electronics and Information Technology, there have been close to 7 lakh cyber-attacks reported in the country in 2020 (till Aug).

Importance of digital trust and key attributes

CSPs are relying on 5G to generate new revenue streams by offering new/ innovative services to end consumers, enterprises, and businesses. Their success depends partly on their ability to build ‘digital trust’ in the eyes of their customers by ensuring that their confidential enterprise or personal data is safe. The security needs will vary with the user and type of service, for example, the security needs of a retailer will be different from those of an enterprise, e.g., financial organization. 5G will allow connecting millions and millions of new IoT end points and devices to the network. The lagging security protection of many IoT devices can offer the opportunities for launching cyber-attacks through a much greater number of access points.

Adaptation, speed, integration and automation have emerged as the key attributes for 5G security. A flexible and adaptive 5G security solution will be needed to be able to respond to the sophisticated cyber-attacks. Integrated security solutions complemented by technologies like AI/ ML, analytics and automation can quickly spot the threat and alert the security apparatus for swift and timely action.

Delivering end to end security

5G architecture is broadly built up of Distributed/ Cloud RAN, Edge Core and Cloud Core. End-to-end security, from the mobile core to the edge of the network to end point devices, is vital to protect the network and associated services.

5G standards were developed on the principle of ‘Secure by Design’- more security features were included in the standards so as to offer an inherent higher level of protection on network level…