The “fifth generation” sets up new mechanisms to limit intrusion

Dubai: “The Gulf”
The expansion of 5G networks and technologies and their applications in various institutions, sectors and fields has dictated the application of new mechanisms to protect and keep track of the speed of transmission and processing of large data and information, in order to electronic and cyber attacks avoid which is magnified by the speed and ability of networks and technologies to transmit and generate unlimited volumes of data.

Officials of companies working in data protection confirmed that the UAE has achieved many unprecedented achievements globally in the deployment of 5G networks, as it is the real future of the telecommunications and information technology sector. Global Connectivity Index “The Connectivity Index” issued by “Carphone Warehouse”, which specializes in technology comparisons.

They pointed out that the UAE is third in the world in the general ranking of the “most connected countries” index, which measures the level of connectivity in countries through 4 axes: mobility infrastructure, information technology, global communication and social communication.

UAE leads

According to a survey conducted by YouGov among more than 18,000 subscribers on the trend towards the fifth generation in 17 global markets, the UAE leads regionally and among the first countries in the world in the implementation of fifth generation communication technology, with about half of the survey sample say they use a phone equipped with fifth generation technology. The UAE leads the world in the adoption of the fifth generation.

Denial of service attacks

Emad Fahmy, Director of Systems Engineering in the Middle East at Netscout, says about the data sector obstacles related to the adoption of 5G technology: Traditional network challenges, such as hacker attacks, have to be handled differently with 5G networks, where the latter will be core applications are used and a cyber attack can sometimes result in loss of life, loss of revenue or network disruption due to equipment being compromised.

Regarding the most famous attacks or parties that have exploited fifth generation technology, Fahmy said: The most common attack against fifth generation networks is distributed denial of service (DDoS) attacks, which can be carried out by bots and enterprise networks.

“New 5G use cases involve performing mission-critical activities, latency gaming can be extremely damaging to business, and malicious attacks can spread quickly and cause delays or outages.”

Regarding the extent to which the high speed of the fifth mountain technologies contributes to the repetition of electronic and cyber attacks, Fahmy said: Although the speed of the fifth generation technology is not directly related to the repetition of attacks, it can cause them to spread much faster than what happens now within the current networks. Furthermore, due to network interconnection, there are many entry points for attacks, making 5G networks highly potential targets for threat actors.

data centers

In turn, Ashraf Yahya, General Manager of Eaton Middle East, said in response to the increasing adoption of 5G technologies and its impact on data centers and how operators of these centers are preparing for this technology: To reduce the cost of bandwidth, should companies will switch to asynchronous data. And because 5G now works in tandem and uses cloud data, for long-term success it means that higher levels of data must be processed securely and without latency.

5G requires more data and faster speeds to achieve extremely low latency, and it will be necessary to combine 5G computers with “edge” computers, meaning that data is processed close to the presence of customers.

He added that the 5G data must be transmitted to a high-bandwidth data center, and then sent back to the processed data. Because this is a time-sensitive process, the edge network must be physically close to the applications to reduce latency to 1 millisecond or less, as required by the 5G specification and thus traditional server room designs that previously housed computing and telecommunications equipment that required Wireless. to be reevaluated.

Yahya emphasized the need to find newer and more economical ways to bring networks closer together, and Eaton suggests the continuous development of the fifth generation network and data processing centers close to customers to achieve results with higher efficiency and better provision of energy density.

Use cases

For his part, Femi Oshiga, Vice President of Service Providers for the Middle East, Africa and Asia Pacific at CommScope, on his view of the implementation of 5G technologies and the challenges behind it explained that there are many challenges despite the enormous benefits that 5G has. give.

And one of the challenges was use cases like: How to monetize 5G and we see many new sectors that will overcome this kind of challenge.

Oshiga pointed out that private networks, artificial intelligence and the Internet of Things play a crucial role in relatively bridging the gaps in electronic attacks, and fortunately, there are also available solutions provided by specialized companies as a solution to all the challenges we face at the level of introducing fifth generation technology, and the “Mosaic” solution from CommScope offers these challenges.

Leave a Comment