{"title":"5G and the Future of Security in ICT","authors":"D. Soldani","doi":"10.1109/ITNAC46935.2019.9078011","DOIUrl":null,"url":null,"abstract":"This work analyzes the most significant root cause categories of Telecoms security incidents over the recent years, prominent initiatives to mitigate the identified cyber security threats and associated risks, and joint efforts on cyber security standards and certification frameworks, ongoing globally. The benefits of 5G requirements, technologies, new threat landscape, system assets and security control zone, and enhanced solutions to product, deployment and operation, and application security are then presented. Reduction of national dependency on any one supplier -irrespective of its country of origin -and a more competitive, sustainable and diverse Telecoms supply chain, along with proper risk mitigation and transparency measures is the most effective solution to 5G, and beyond, cyber security.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNAC46935.2019.9078011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
This work analyzes the most significant root cause categories of Telecoms security incidents over the recent years, prominent initiatives to mitigate the identified cyber security threats and associated risks, and joint efforts on cyber security standards and certification frameworks, ongoing globally. The benefits of 5G requirements, technologies, new threat landscape, system assets and security control zone, and enhanced solutions to product, deployment and operation, and application security are then presented. Reduction of national dependency on any one supplier -irrespective of its country of origin -and a more competitive, sustainable and diverse Telecoms supply chain, along with proper risk mitigation and transparency measures is the most effective solution to 5G, and beyond, cyber security.