Listen to this blog
In this digital age, with the rapid transformation and advancement of technology, we need to ensure security both personally and organisationally.
With that, comes the question – what is IoT?
Evolution and Improvement of Mobile Networks
To understand current day security, we need to look back a couple of decades:
- 1980s: Evolution started with a well-known company to this day, Motorola. Initially called the ‘cellular technology’, 1G was limited only to a few mobile networks and had limited possibilities. It was entirely analogue.
- 1990s: From the 80s to the 90s, we shifted to 2G, where technology of General Packet Radio Service (GPRS), Global System for Mobile (GSM), Code Division Multiple Access (CDMA), functionalities like delta services, and SMS carrier services were introduced which increased the inter-operability between mobile networks that was priorly absent but still needed improvement.
- 2000s: The era of the millennium was witnessed from the 00s with the dawn of 3G. The 4G and introduction of new mobile operators from 2013 saw a revolutionary high-speed internet that shaped everyone’s lives. Data intensive tasks such as video-calling, gaming, and live streaming were enabled by high-speed internet and high bandwidths.
The gamechanger, which is still developing, is the 5G. It is the new global wireless standard after 4G that enables a new kind of network which is designed to connect everyone and everything together – including machines. objects, and devices.
Before 5G, even with the existence of internet services, internet was by the people and for the people. With the advent of 5G, the devices that we use day-to-day have turned smart, without needing human interactions for functioning, which is why we call it the ‘Internet of Things (IoT)’. Compared to 3G and 4G, 5G is much more evolved but it also poses certain risks.
What Makes 5G So Special?
Feature | 3G | 4G | 5G |
Data | 500 MB | 500 MB | 500 MB |
Download Time | 5.5 Minutes | 20 Seconds | 1.6 Seconds |
Average Speed | 144 KB/s | 25 MB/s | 300 MB/s |
Bandwidth | 2 MB/s | 200 MB/s | 1 GB/s |
Peak Data Rate | 200 KB/s | 1 GB/s | 20 GB/s |
Getting Into the IoT World
5G has improved not only notworking but also large-scale connectivity. For example, in case of fire in areas where firefighters have restricted access to, drones with cameras are deployed for a better view.
IoT refers to the physical devices and sensors that capture and share data with other devices, can take decisions of what is to be done with the data, and how the data can be utilized.
Examples of IoT Devices
- RFID tags on cars for travelling through toll gates and office premises without manual payment
- Bluetooth Low Energy (BLE) beacon to tag items in a warehouse
- GPS tag attached to vehicles to find real time location
- Fitness trackers that provide health parameters and display it on an individual’s phone
- Smoke sensors that activate the fire department in case of fire and my personal favourite,
- Smartphones
Cybersecurity and Information Security
NIST defines cybersecurity as – “The process if protecting information by preventing, detecting, and responding to attacks”
And information security as – “The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability” which is the CIA triad.
Cybersecurity is not about protecting devices; it is about protecting yourself from scams and cyberfraud.
Cyber security is a major challenge in organizations because it takes years and decades to build the reputation and justice a few minutes of cyber-crime can ruin it forever.
Security Challenges of 5G
Though 5G provides connectivity, higher bandwidth, and higher speeds, when many devices are connected to a single network there are higher chances of unauthorised personnel entering the network and disrupting it causing bigger damage this is possible due to many reasons for security protocols default passwords and weak authentication. For example, in the old Diehard movies, hackers hack the city system including the power grids and get the entire city’s traffic system under control.
How can it be avoided?
- Proper security protocols
- Strong passwords
- Multifactor authentication
- Network slicing: technology that came with 5G that allows the network operator to create a virtual isolated network within the same infrastructure to run multiple networks in a single switch it relies on software defined networking.
Let’s understand network slicing with an example: In organizations, there are desktops used by employees, confidential servers used by administrators, and IoT devices like smart lights fire detection devices and security system. All these devices can be connected to a single switch and multiple VLANs can be created so that the devices do not interrupt other devices but also communicate with each other. The smart lights do not interact with desktops and the security system does not interact with smart lights. This is network slicing. With the expansion of networks that can be connected on a single 5G connection, there is also an increase in misuse by people who want to attack it. We can avoid it by:
- Entry points should be secured
- Firewalls should be enabled with proper configuration
- Data watermarking and digital signatures
- Privacy checks on information processing and accessing
You might find this relevant Exploring the scope of Cybersecurity with MUJ’s online MCA program
The Critical Role of Cybersecurity Professionals
As the 5G and IoT landscape evolves, the demand for skilled cybersecurity professionals is experiencing expansive growth. There are significant career opportunities in cybersecurity.
Cybersecurity career goals and roadmap
- For freshers
- Cybersecurity analyst: Monitor networks, detect vulnerabilities, and implement security measures.
- Security auditor: Evaluate IT infrastructure for security compliance and operational efficiency.
- Network security engineer: Specialize in protecting computer networks and networked devices.
- Penetration tester (Ethical hacker): Simulate cyberattacks to identify weaknesses in systems before they can be exploited. You can work in Red Teams (offense) or Blue Teams (defense).
- Application security tester: Test apps for vulnerabilities before deployment or procurement.
- For upskilling professionals
- Gain practical experience: Work independently or as part of a team within your organization.
- Collaborate with peers: Networking with professionals in other cybersecurity roles can broaden your skill set.
- Get certified: Choose industry-recognized certifications that align with your goals.
- Stay curious and hands-On: Constant learning and real-world practice are key to mastering the craft.
- Regardless of your experience level, the following is the most essential:
- Interpersonal skills: Communication, empathy, and teamwork are vital in collaborative environments.
- Stay updated: Attend events to learn new things and have the zest to learn to master the art of learning.
You may like to know Cybersecurity Essentials for BCA/MCA Students
Conclusion: Embracing Security as a Core Principle
The integration of 5G and IoT presents both immense opportunities and significant cybersecurity challenges. A security-first mindset is crucial. By proactively understanding these challenges and implementing robust security measures, we can pave the way for a more secure and connected future.
Explore our online programs to become future-ready
View All Courses