Best Security Practice In An Era of 5G and Cloud Platforms - A guest Post by Ralf Llanasas | SansSQL

Tuesday, April 9, 2019

Best Security Practice In An Era of 5G and Cloud Platforms - A guest Post by Ralf Llanasas

Greater potential brings greater security responsibilities

The real world application of 5G is bound to trigger security issues that might not be evident in labs and test beds. As 5G promises customers, businesses, and service providers unparalleled potentials, so too does it hold unparalleled security lapses that will give way to cyber-attacks.

5G will envelop a vast array of technology platforms, from mobile devices to WiFi, Bluetooth, IoT infrastructures, etc., and security provisions need to cater to all of these. The technology’s low to zero latency also improves cloud performance, driving more industries, devices, and applications to become even more cloud dependent, if not completely.

An increasing number of functionalities across various industries are migrating to the cloud
More applications, more loopholes

A number of studies have recently raised red flags over 5G security gaps yet to be resolved. One such is the UK Government’s 5G Testbeds and Trials program conducted in collaboration with the University of Surrey’s 5G Innovation Center and three ongoing testbed programs -- AutoAir, 5G RuralFirst, and Worchestershire 5G.

Peter Claydon, project director of AutoAir, states that, “Since the age of 2G, mobile networks have been some of the most secure things on the planet, helped by the fact that each one is controlled by a single network operator.” He points out that this is different with 5G because the technology “opens up mobile networks allowing network operators to provide ‘slices’ of their networks to customers.” The result of such a scenario is therefore more open entry points for attacks.

In another similar study conducted by a team of researchers from the Technical University in Berlin, ETH Zurich, and SINTEF Digital Norway, it was found that 5G opens up glaring security lapses in Authentication and Key Agreement (AKA). AKA provides a security protocol used by phones to securely communicate with mobile networks. These security lapses in AKA over the 5G airwaves can allow cybercriminals to intercept calls and text messages on phones, as well as steal other sensitive data.

These studies, along with many others, have led to insights on the best security practices in an era of 5G and cloud computing. Before determining solutions, however, its best to zero in on what exactly the key challenges of 5G are.

Key security challenges

5G introduces a fundamental change in the relationship between networks, human machine interface, and end users. The key security challenges that attend such a reconfiguration include:
  • Exposure of critical facilities: With IoT networks woven through facilities such as power grids, elevators, door locks, water systems, autonomous vehicles, etc., 5G exposes our critical infrastructures to unprecedented risks.
  • Workload migration: Migration of workloads to 5G edge-computing exposes businesses to the combined risks of endpoint computing and cloud computing, given that the businesses need to monitor thousands of computing nodes in the process.
  • Hybrid computing eroding perimeters: With 5G, the idea of the perimeter as IT professionals know it, has been turned on its head. On 5G, different wireless networks will converge, and several aspects of business processes, health care, and the everyday lives of individuals will be locked into a system of hybrid computing where massive amounts of data are harvested to monitor and optimize odds and ends functionality.

Best Security Practices for the New Industrial Era

Some key target areas for security solutions
5G applications

The best way to address these security challenges is through unrelenting efforts from the onset, rather than waiting until these issues snowball into serious problems. With the lessons learned from the implementation of previous generations of wireless networks, businesses can put adequate preemptive measures in place to tackle these challenges. 

The difference, though, lies in what’s going to be increasing reliance on cloud platforms and 5G’s ‘slices’ of networks phenomenon. These expose loopholes, but they can be plugged to some extent with the right security practices.

The following is a rundown of some best practices for the new industrial era, where cloud platforms have become so significant:
  • Threat intelligence upgrades: This can serve both in risk mitigation and damage control. It can help prevent new attacks from recurring, and can also help prepare for threats as they evolve. It entails leveraging on Machine Learning and AI, and replacing traditional security architectures with more advanced security products.
  • Segmenting networks: Businesses can mitigate the cyber security risks which their critical resources are exposed to by using effective strategies to segment devices, apps, workflow and transactions.
  • Deploying compatible solutions: Putting together only solutions that are compatible with each other not only helps avoid further complications down the line, but also allows for the collection of data that can easily be used to identify and address risks across various parts of an organization.
  • Reinforcing access control: With more people and devices accessing 5G airwaves, businesses need to deploy a zero-trust principle where every single request for network access is thoroughly validated and authenticated.
  • Deploying MSSPs: Managed Security Service Providers (MSSP) give businesses a highly efficient and cost-effective option for outsourcing their 5G security responsibilities.
Final Words
5G and cloud computing is set to generate a new wave of innovation, taking productivity to new dimensions across various industries. The low to zero latency of the fifth generation mobile network technology enables a wide range of devices to stand alone, where previous networks caused them to remain tethered to other devices. This standalone capability is a result of cloud platforms, as most applications will be cloud dependent. 

However, this also takes cyber security threats to new heights, and businesses need to embrace the prospects of 5G with cautious optimism. By implementing the best security practices outlined above, businesses can position themselves to reap the tremendous benefits of 5G without exposing their assets to a slew of cyber threats.

About Ralf Llanasas
Ralf is a technology blogger, he writes about the latest mobile phones and technology news. He currently works at as a content manager and his writings can be seen on various technology blogs. He also loves taking pictures when free.


rohini said...

Thanks writer.For emphasizing this, we hope you can share more knowledge, regards!
Dell Tablet Service center in chennai | tab service center in chennai | 100% genuine tablet parts | Tablet display replacement in chennai | Tablet Water damage service in chennai | Tablet glass replacement in chennai | 100% genuine tablet parts | Tablet Service center in chennai | Tablet unlocking service in chennai | Acer tablet service centre in chennai

prestige elysian said...

Information provided by you is very helpful and informative. Keep On updating such information.

prestige elysian

oveiya said...

Nice post. Thanks for sharing the valuable information. it’s really helpful. Who want to learn this blog most helpful. Keep sharing on updated posts…
mean stack online training

sasitamil said...

You blog post is just completely quality and informative. Many new facts and information which I have not heard about before. Keep sharing more blog posts.

ReactJS Online Training

rithiaanandh said...

This is an awesome post. Really very informative and creative contents. This concept is a good way to enhance knowledge. I like it and help me to development very well. Thank you for this brief explanation and very nice information. Well, got good knowledge.
Sql server dba online training

gowsalya said...

Good Post! Thank you so much for sharing this pretty post, it was so good to read and useful to improve my knowledge as updated one, keep blogging.
msbi online training

Rithika sri said...
This comment has been removed by the author.
Rithika sri said...

Fifth-generation wireless (5G) is the latest iteration of cellular technology, engineered to greatly increase the speed and responsiveness of wireless networks. ... 5G will also enable a sharp increase in the amount of data transmitted over wireless systems due to more available bandwidth and advanced antenna technology.
qlik sense online training

priya said...

It's interesting that many of the bloggers to helped clarify a few things for me as well as giving.Most of ideas can be nice content.The people to give them a good shake to get your point and across the command

Tableau online training

Kiruthiprabha said...

Great post! I am actually getting ready to across this information, It’s very helpful for this blog.Also great with all of the valuable information you have Keep up the good work you are doing well..
Oracle DBA Online Training

Tony Chew said...

Apakah Anda termasuk orang yang ingin mendapatkan banyak keuntungan dari Bermain Di Situs BandarQQ Online? Jika benar, Anda harus tahu betul panduannya.
bandar ceme terbaik
paito warna terlengkap
syair sgp

gowsalya said...

Awesome! Education is the extreme motivation that open the new doors of data and material. So we always need to study around the things and the new part of educations with that we are not mindful.
msbi online training

rithiaanandh said...

Wonderful bloggers like yourself who would positively reply encouraged me to be more open and engaging in commenting.So know it's helpful.
Sql server dba online training

Vishal DurgaIT said...
This comment has been removed by the author.
poshe said...

This is an Amazing Post. Thanks for that. Keep up the great Post. All the Best!! International Safety Courses in Chennai
NEBOSH PSM Course in Chennai
Nebosh IGC Course in Chennai
Nebosh Courses In Chennai
Industrial Diploma SafetyCourse In Chennai

anonymous said...

I really enjoyed your blog Thanks for sharing such an informative post.Looking For Some More Stuff.

shuttering works

anonymous said...

I really enjoyed your blog Thanks for sharing such an informative post.Looking For Some More Stuff.

best seo company in bangalore SSS digital Marketing

Amazon Web Services said...

That was a great message in my carrier, and It's wonderful commands like mind relaxes with understand words of knowledge by information's.
java training in Bangalore

olivermir said...

Whoi, excellent, t wondered just how to cure icne. ind found your webstte by google, dtscovered todiy t'm i ltttle obvtous i greit deil. t’ve ilso idded RSS ind sive your webstte. keep us updited. Links Locksmith Services Located is the best Locksmith Jacksonville FL

Admin said...

BA Exam Result - BA 1st Year, 2nd Year and 3rd Year Result

Bsc Exam Result - Bsc 1st Year, 2nd Year and 3rd Year Result

John said...


pattinsonrobert said...

Hello! I simply would wish to give a huge thumbs up to the wonderful info you’ve got here for this post. I will be returning to your website to get more detailed soon. bandar ceme

mohemmad Thariq said...

Very good and informative article. Thanks for sharing such nice article, keep on updating such good articles.
Adobe photoshop training Institute in Chennai | Adobe photoshop training Institute in Madipakkam

mohemmad Thariq said...

Very good and informative article. Thanks for sharing such nice article, keep on updating such good articles.
MS Office training in Chennai | MS Office training in Madipakkam

joseph k said...

Awesome post. Really you are shared very informative concept... Thank you for sharing. Keep on updating...
MCSA exam center in Chennai | MCSA exam center in pallikaranai

joseph k said...

Awesome post. Really you are shared very informative concept... Thank you for sharing. Keep on updating...
UI Path training center in Chennai | UI Path training center in pallikaranai

joseph k said...

Very good and informative article. Thanks for sharing such nice article, keep on updating such good articles.
Adobe Photoshop training center in Chennai | Adobe Photoshop training center in Velachery

joseph k said...

Very good and informative article. Thanks for sharing such nice article, keep on updating such good articles.
MS.Excel Training center in Chennai | | MS.Excel Training center in Velachery

joseph k said...

Very good and informative article. Thanks for sharing such nice article, keep on updating such good articles.
PCB Design training in Chennai | | PCB Design training in Besant Nagar

Mohemmad Thariq said...

Advanced ethical Hacking course in Chennai | Advanced ethical Hacking course in Besant Nagar

Certified Ethical Hacking Training in Chennai | Certified Ethical Hacking Training in Chennai

Anonymous said...


Thanks for your article.

It Outsourcing Services,
Mobile Application Development,
Cloud Application Development,
Cloud Computing,
It Outsourcing Services,
IOT Solutions,
UI UX Design Company,
Product Engineering Services,
Docker Container


HAMMAD said...

I finally found great post here.I will get back here. I just added your blog to my bookmark sites. thanks.Quality posts is the crucial to invite the visitors to visit the web page, that's what this web page is providing. Penrose

Albert Jhon said...

Stream-Line Cloud PBX Solutions services include Responsive price, Mobile Friendly Cloud Solutions, Customized Cloud and Intranet experiences, keeping in mind best practices and latest technological platforms. IT support

Julia Loi said...

Nice information, valuable and excellent in Job, as share good stuff with good ideas and concepts, lots of great information and inspiration, both of which I need, thanks to offer such a helpful information here.
mobile phone repair in Canton
iphone repair in Canton
cell phone repair in Canton
tablet repair in Canton
ipad repair in Canton
phone repair in Canton
mobile phone repair canton
iphone repair canton
cell phone repair canton
phone repair canton

Julia Loi said...

Positive site, where did u come up with the information on this posting?I have read a few of the articles on your website now, and I really like your style. Thanks a million and please keep up the effective phone repair in Novi
iphone repair in Novi
cell phone repair in Novi
phone repair in Novi
tablet repair in Novi
ipad repair in Novi
mobile phone repair Novi
iphone repair Novi
cell phone repair Novi
phone repair Novi

MtomSEO said...

Some really quality blog posts on this site, saved to fav. tablet mockup

authur said...

I don’t know whether it’s just me or if perhaps everyone else encountering problems with your website. It appears like some of the written text in your posts are running off the screen. Can someone else please provide feedback and let me know if this is happening to them too? This might be a issue with my browser because I’ve had this happen previously. Thank you device mockup

Unknown said...

Emotional attention, self-control, approval, adhere to, patience but also security. These are typically among the issues that Tang Soo Can do, most of the Thai martial art attached to self defense purposes, can show buyers plus instilling in your soul the means not just to maintain with your own eyes on the competency on the very first real danger stains to cure confrontation all in all. app store mock up

Hetuwa Duminda said...

Nice post. I learn something more challenging on distinct blogs everyday. It will always be stimulating to read content off their writers and practice a little something from their store. I’d choose to use some with all the content in my small weblog whether you do not mind. Natually I’ll provide a link on your own internet weblog. Many thanks sharing. apple watch template

Hetuwa Duminda said...

Howdy! Do you know if they make any plugins to safeguard against hackers? I’m kinda paranoid about losing everything I’ve worked hard on. Any suggestions? front end development company

Maria rima said...

Hi there, I discovered your blog per Google bit searching for such kinda educational advise moreover your inform beholds very remarkable for me.

invincible01 said...

Amazing Article,Really useful information to all So, I hope you will share more information to be check and share here.

inplant training
inplant training chennai
inplant training meaning
inplant training certificate
inplant training report
report for inplant training
inplant training certificate format
inplant training meaning in tamil
what is inplant training
inplant training in chennai for mechanical

papa said...

final year project
mini projects for cse
final year projects for cse
final year projects for cse students
final year projects for cse domains
final year projects for cse in data mining
final year projects for cse with source code
final year project for ece
final year project in mechanical engineering
final year project for eee

Christy R. said...

In this digital era UI UX design should be user friendly.Best UI/UX Design Services is offered by Evince Development.

shane lee said...

In short, this is the description of the relation between data science and machine learning. Hopefully, now you have a much better understanding of the two fields. data science course syllabus

Unknown said...

Great Article Cyber Security Projects projects for cse Networking Security Projects JavaScript Training in Chennai JavaScript Training in Chennai The Angular Training covers a wide range of topics including Components, Angular Directives, Angular Services, Pipes, security fundamentals, Routing, and Angular programmability. The new Angular TRaining will lay the foundation you need to specialise in Single Page Application developer. Angular Training

Sargam said...

Get huge discount on Home and Kitchen Appliances,Split and Window Air Conditioner, Mobiles & Laptops online , Television, Speakers & more electronics at best price.
voltas beko refrigerator

Mohd Sharique said...

I genuinely appreciated understanding it. Sitting tight for some more incredible articles like this from you in the nearing days.

Online Training for Big Data
best Apache Spark online course

Vikii said...

Oh, it was a wonderful story, I as a writer-narrator will try to write a unique story similar to them. I am a professional writer who provides the best dissertation writing services here

markson said...

On the off chance that fundamental they can send the traffic to the primary site. Understanding this standard will expand you traffic ten times.

Rehmat King said...

The degrees of freedom for a t critical value calculator by that t-distribution can be derived from the sample size - just subtract one. (degrees of freedom = sample size - 1). You can use this as ...

adrianabell said...

Very interesting. I haven't heard of this yet. On this resource you will also find a lot of interesting and new things about the Internet. I love to develop and look for new items.

Qurist said...

wow that is so interesting and it's a great art. Thanks . online cbd store


Howdy! Do you know if they make any plugins to assist with SEO? I’m trying to get my blog to rank for some targeted keywords but I’m not seeing very good results. If you know of any please share. Cheers! 먹튀검증커뮤니티

Hahaha said...

Really no matter if someone doesn't be aware of after that its up to other users that they will help, so here it takes place 토토사이트추천. said...

This is really helpful post and very informative there is no doubt about it.
바카라사이트 said...

Great blog article. Really looking forward to read more.
온라인카지노 said...

This is one of the best website I have seen in a long time thank you so much.
스포츠토토 said...

All your hard work is much appreciated. This content data gives truly quality and unique information. I’m definitely going to look into it. Really very beneficial tips are provided here and, Thank you so much. Keep up the good works.

Hahaha said...

When I read your article on this topic, the first thought seems profound and difficult. There is also a bulletin board for discussion of articles and photos similar to this topic on my site, but I would like to visit once when I have time to discuss this topic. 먹튀검증업체I think it would be nice if you come to if you can solve my problem.

NOMO said...

What a nice post! I'm so happy to read this. 카지노사이트검증 What you wrote was very helpful to me. Thank you. Actually, I run a site similar to you. If you have time, could you visit my site? Please leave your comments after reading what I wrote. If you do so, I will actively reflect your opinion. I think it will be a great help to run my site. Have a good day.

Unknown said...

Nice knowledge gaining article. This post is really the best on this valuable topic 검증사이트

Unknown said...

I enjoyed reading your post. very nice share. I 안전토토 want to twit this to my followers. Thanks

Unknown said...

I like your blog. i ma happy to read your blog its very informative and your blog is really good and impressive you made it mice 안전토토

jowsaaa said...

This site seems to inspire me a lot. Thank you so much for organizing and providing this quality information in an easy to understand way. I think that a healthy era of big data can be maintained only when such high-quality information is continuously produced. And I, too, are working hard to organize and provide such high-quality information. It would be nice to come in once and get information.

Also visit my site:온라인카지노

Unknown said...

I have a presentation next week. I m looking for such information. Thank you for these fantastic posts. Where can someone else get that type of information? Perfect way to write. 토토커뮤니티

Unknown said...

We still cannot quite believe that I was able to often be any type of those staring at the important points located on your blog post. 안전토토

Unknown said...

I m leaving a comment on a good post. Please continue to give us useful information. 먹튀검증사이트

Dương Dương said...

Hi there, I simply hopped over in your website by way of StumbleUpon. Now not one thing I’d typically learn, but I favored your emotions none the less. Thank you for making something worth reading. 메이저사이트순위

NOMO said...

I like the helpful info you provide in your articles. I’ll bookmark your blog and check again here frequently. I’m quite sure I’ll learn plenty of new stuff right here! Good luck for the next. 먹튀검증업체

unknown said...

This is the perfect post. It helped a lot. If you have time, please come to my site and share your thoughts. Have a nice day. 크레이지슬롯

Unknown said...

I found a web page that contains the photos and videos you want. Hyperlink 먹튀검증커뮤니티

Unknown said...

I found a web page with content that you might find interesting. If you're interested, please click the hyperlink 토토사이트추천

Unknown said...

I feel the same way as the writer. I hope this content will be exposed to many people.스포츠토토사이트

Dung said...

I was impressed by your writing. Your writing is impressive. I want to write like you.스포츠토토사이트 I hope you can read my post and let me know what to modify. My writing is in I would like you to visit my blog.

SEO LOCAL said...

consultar cita sepe
mapamundi con nombres
honorable kill hearthstone
renovar dni elda
mapa de europa con nombres y division politica para imprimir
esquelas vitoria hoy
lectura de cartas gratis online efectiva

Dương Dương said...

Howdy! Do you know if they make any plugins to assist with SEO? I’m trying to get my blog to rank for some targeted keywords but I’m not seeing very good results. If you know of any please share. Cheers! 안전토토사이트

onlinesawari85 said...

Music began playing as soon as I opened up this site, so irritating! best Deep learning experts

Unknown said...

INSANE 먹튀검증업체 BETS! ($4000)

Unknown said...

Youre so right. Im there with you. Your weblog is definitely worth a read if anyone comes throughout it. Im lucky I did because now Ive received a whole new view of this. 먹튀검증사이트

토토사이트 said...

It seems that your site optimization is very complete. I'm sorry it's not related to the post. I am very interested in site optimization. I want to talk about optimization. Thank you for coming with 메이저사이트

토토사이트 said...

There must have been many difficulties in providing this information.메이저사이트 Nevertheless, thank you for providing such high-quality information.

melianalim said...

you will need support or suggestions, write me privately.
I interested in your implementation/use case.
the best kera4d

free vps trial said...

Reliable and affordable VPS and web hosting provider in Sri Lanka. Cheap Web Hosting in Srilanka Plans with ✓Unlimited NVme SSD Space ✓Unlimited Bandwidth ✓Unlimited Websites ✓Free Domain ✓SSL 24x7 and 99.9% Uptime.

Arun said...

I was eager to find this page. I needed to thank you for ones time for this especially awesome read!! I certainly truly preferred all aspects of it and I likewise have you book-set apart to look at new data in your blog.

Whole life insurance vs. term life insurance

Imech Institute Pvt Ltd said...

Thanks for giving amazing and valuable post Ralf Llanasas. keep up good work if you have intrested in Nebosh IGC Course , diploma in fire and safety , IOSH Course

johnhardy said...

He points out that this is different with 5G because the technology, I really love it. Thanks for sharing this blog. Now it's time to avail luxury airport transfer for more information.

Deepika said...

Nice blog, Share more like this.

Selenium Training In Chennai
Selenium Online Training
Selenium Training In Coimbatore

Post a Comment