Threat Modeling: The Key to Dealing With 5G Security Challenges




With 5G reshaping the smartphone market, 5G security needs to keep up. Almost one in three smartphones sold in the first quarter of 2021 can connect to a 5G network. That’s just one year after the world’s first commercial 5G network emerged in South Korea. Such growth helped annual shipment numbers of 5G-enabled smartphones exceed 200 million units in just one year. That’s four times as long as it took 4G to reach the same milestone. With that growth comes risks, too.


An Overview of 5G Security Risks


The U.S. Cybersecurity & Infrastructure Security Agency (CISA) examined three such threat vectors as part of the Enduring Security Framework’s 5G Threat Model Working Panel. First, it took a look at Policy and Standards. It found networks could be more open to digital attacks if network operators fail to implement optional 5G security controls. Next, 5G Systems Architecture, another threat vector identified by CISA, shows some built-in problems. Threat actors could exploit vulnerabilities affecting devices and infrastructure to disrupt networks and steal critical data exchanged between users.


The last threat vector, Supply Chain, is of major concern to businesses and agencies themselves because it’s a double-edged sword. On one side, 5G enables users to share data more quickly with new tech that 4G networks can’t handle. On the other, this contributes to making networks more complex, meaning it’s easier for thr ..

Support the originator by clicking the read the rest link below.