Scotland 5G Centre header logo
  • About
    • Who We Are
      • Who we work with
  • Why Choose 5G
    • Why Choose 5G
    • Services & Facilities
      • Our Innovation Hubs
  • 5G Uses Cases & Projects
    • 5G Use Cases
    • Tay5G Project
      • Digiflec
      • Scotland Re:Design
      • The James Hutton Institute
    • DSIT 5GIR Ayrshire Project – Expression of Interest Application
    • DSIT Project: ONE SCONDA
    • DSIT Project: 5G DU Volution
    • S5GC Projects: University of Strathclyde
    • S5GC Projects: University of Glasgow
    • S5GC Projects: Infralink
  • Guides & Reports
    • Guides & Reports
      • 5G Whisky Distillery Report
  • Understanding 5G
    • Understanding 5G
    • 5G vs 4G
    • Common Misconceptions
  • Events
    • Upcoming Events
  • News/Videos
    • News
    • Videos
  • Contact
    • Contact Us
    Back to Past News

Cyber resilience and 5G must evolve hand-in-hand

5G is, by nature, dynamic and complex. Developments in 5G, artificial intelligence and Internet of Things technologies are leading towards what is being hyped as the era of intelligent connectivity. It will enable new capabilities for transport, entertainment, manufacturing and more, where data will be analysed in real-time to enable instantaneous decision making.

The transformational pay-off of 5G has not yet impacted day to day life for the majority, but analysis from Deloitte suggests that next generation mobile networks could boost Scotland’s GDP by £17 billion and create 160,000 jobs by 2035. Nevertheless, building trust and confidence in the technology will be essential for widespread adoption and delivering this potential. 5G could unlock powerful opportunities for connected, smart industries and communities if built on solid, secure foundations.

We want to make sure everyone understands the transformational impact 5G can have on their lives and as well as dispelling myths and communicating the benefits, users’ trust stems from security and reliability.

Networks must be well protected, not only to ensure the safety of a business’ information but to instil a sense of security with customers. Therefore, cyber security and 5G must work in tandem, as early as possible in the development of network and systems to mitigate the risks. As with any new technology, there are unique cyber security threats that both 5G network operators and users will have to contend with.

With greater use comes potential misuse, and there are three main factors influencing the risks associated with 5G. Firstly, networks are likely to involve many devices and touchpoints, meaning increased risks of weaknesses in the network. As more information is transmitted through the network, there is a wider pool of opportunity for those looking for a route to get in.

There will be a range of services and functions significantly boosted by 5G technology, meaning a variety of devices connected to a network. Some critical roles could be severely disrupted if the wrong person managed to take control of a system – for example industrial machinery or driverless cars.

We also have to consider the nature of the information and data being communicated – if public services such as healthcare move to 5G it could transform the NHS as we know it, but at the same time sensitive and confidential data will be passing through the network.

At the same time, we are faced with hackers who are evolving at a similar pace – or even quicker – than the tools and technology being developed. We cannot afford to underestimate the potential risks of disruption and it cannot be a static exercise either. Threats are continually changing, and we must build in cyber resilience by design and have plans in place to regularly monitor and upgrade the different types of systems.

Those behind cyber-attacks, such as the disruption car manufacturer Honda faced earlier this month, are generally motivated by one of two things: financial gain or the power of information. Largely, this comes as a result of data theft or distributed denial-of-service (DDoS), often using botnets with command and control software to access a network. These types of attack are commonplace in the IT industry, however, the major difference with 5G is that high network speeds mean any data and information can be downloaded quicker than before, potentially before a breach is detected.

To date, the telecoms industry has typically been very trusting of its users, but as 5G expands this expectation needs to change. Designing with this in mind allows engineers to identify weaknesses and build in additional features to manage the risks from the outset, rather than it being an after-thought.

5G is different to anything that has come before; therefore, securing the networks and systems requires a different approach. While there will still be risks associated with the network, security must also be focused on the way the it is used and the nature of the devices that will be connected. 5G has great potential and it could be the catalyst for digitalisation across many industries and public services, but its success ultimately depends on creating trusted, reliable and secure systems.

  • Contact Us
  • Upcoming Events
  • News
  • Careers
  • Branding Guidelines
  • Privacy Policy
  • Cookie Policy
  • 5G Health and Safety

Sign up for our newsletter!

Subscribe
© The Scotland 5G Centre 2019 - 2025

Contact us

Use our online enquiry form
Or email us at:
info@scotland5gcentre.org

In partnership with

Follow us

  • © The Scotland 5G Centre 2019 - 2025
  • Privacy Policy
  • Cookie Policy
  • Website by Infinite Eye

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT