5G: definition, operation, advantages & disadvantages | Myra
What are the risks associated with 5G?
Of course, there can be no hundred percent security in the 5G network either. Security researchers have already uncovered several vulnerabilities in the network protocols that permitted man-in-the-middle attacks and DoS attacks, among other things. In general, software vulnerabilities are one of the main gateways for cybercriminals. And since software plays a significant role in the 5G infrastructure, the potential risk it poses is also immense.
Backdoors built into network components at the factory or at a later time can also pose a risk, such as permitting data to be spied on or even sabotage attacks to be carried out. In this context, there is also the risk of government interference. As one of the main suppliers of 5G components, Chinese network equipment supplier Huawei has come under criticism in many places.
The United States, for example, is accusing it of taking part in espionage on behalf of the Chinese government. For this reason, Germany’s IT Security Act (IT-SiG 2.0) provides for critical components from suppliers to be subjected to strict scrutiny and for “untrustworthy” manufacturers to be excluded from the 5G network rollout.
As the new cellular standard becomes more widespread, the impact of botnet-based DDoS attacks will inevitably increase. This is because even more IoT devices will be networked at significantly higher data rates via 5G in the future. If they are not adequately secured, cybercriminals will have far more bandwidth at their disposal, which they can misuse for more powerful attacks.