The Power and Potential of 5G

Author: ISACA
Date Published: 1 March 2021

Cellular network technology has evolved at an exceptional, nearly unpredictable pace, growing from the voice-only system it once was to the impressive voice, text and data 5G technology of today. 5G technology can revolutionize Internet of Things (IoT) systems that link specialized devices, gather data in real time, and store and process that data. The higher capacity and faster processing times of 5G allow IoT system users to experience improved connectivity and faster network speeds.

To secure the network, the 5G security architecture dictates that network functions in the inner circles of the user’s device are more trusted than those in the outer circles. This keeps sensitive data and encryption keys from higher-trust network functions locked away from lower-trust network functions. There are 6 domains of the 5G security architecture:

  1. Network access security
  2. Network domain security
  3. User domain security
  4. Application domain security
  5. SBA domain security
  6. Visibility and configurability of security

To offer more insight into the benefits and potential risk of 5G technology, ISACA® has released the white paper, 5G Security: Addressing Risk and Threats of Mobile Network Technologies. This white paper explores the 6 domains of 5G security and identifies common sources of risk while referencing the 5G security features designed to mitigate them. 5G Security: Addressing Risk and Threats of Mobile Network Technologies was written with professional security technologists in mind, especially those responsible for overseeing IoT and other emerging technologies.

To read ISACA’s 5G Security: Addressing Risk and Threats of Mobile Network Technologies, download the white paper from the ISACA bookstore.