{"id":1788,"date":"2020-07-13T08:00:27","date_gmt":"2020-07-13T08:00:27","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=1788"},"modified":"2021-04-12T03:00:23","modified_gmt":"2021-04-12T03:00:23","slug":"cybersecurity-implications-of-5g-technology","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/","title":{"rendered":"Cybersecurity Implications of 5G Technology"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>Have you experienced the 5G world yet?\u00a0 5G is the successor to the 4<sup>th<\/sup> Generation cellular technology.\u00a0 If you live in an area fortunate enough to already be <a href=\"https:\/\/www.lifewire.com\/5g-availability-world-4156244\" target=\"_blank\" rel=\"noopener noreferrer\">equipped with 5G technology<\/a>, and you own a <a href=\"https:\/\/www.t3.com\/news\/best-5g-phones\" target=\"_blank\" rel=\"noopener noreferrer\">5G device<\/a>, then you have seen this marvelous advancement in action.\u00a0 Even if you do not own a fully \u201c5G compatible\u201d device, if you wander into an area that offers 5G services, you may notice that your network connection in the status bar at the top of your device indicates 5G, and the differences are noticeable.<\/p>\n<p>To the novice phone consumer, 5G is remarkably faster than its predecessor.\u00a0 The full benefits of owning a 5G compatible device include decreased <a href=\"https:\/\/techterms.com\/definition\/latency\" target=\"_blank\" rel=\"noopener noreferrer\">latency<\/a>, increased battery life, and high-capacity bandwidth.\u00a0 To clarify, latency is often confused with bandwidth.\u00a0 Latency is the lag between the sending of a command and the response from the receiving server, whereas bandwidth is the amount of data that can be moved along a communication path over a specified period of time.\u00a0 This is often perceived as \u201cspeed\u201d the most people. \u00a0\u00a0Regardless of the technical distinction, the user experience of latency is one of \u201cslowness\u201d between when an instruction is sent, and when a response is received.\u00a0 Think of it as the difference between the time it takes the information on your fitness tracker to match the display on its corresponding web console.\u00a0 Few things are more damaging to an E-commerce business than the perception that a site is slow and unresponsive.\u00a0 In our hyper-connected world, any slowness can mean the difference between a successful business, and a failed business due to customers visiting the competitor\u2019s faster site.<\/p>\n<p>5G will also enhance the user experience by enabling more devices to connect with no impact to latency, speed, or performance.\u00a0 Similar to some of the early wired technologies, more connections could create bottlenecks that would result in slow response times.\u00a0 Previous cellular technologies suffered the same congestion problems, again, increasing frustration.<\/p>\n<p>The anticipated benefits of 5G include revolutionary changes to multiple services, offering advancements in communications for healthcare, critical infrastructure, and manufacturing.<\/p>\n<p>In healthcare, an <a href=\"https:\/\/slicenet.eu\/5g-ehealth-smart-connected-ambulance-use-case\/\" target=\"_blank\" rel=\"noopener noreferrer\">ambulance<\/a> carrying a patient would have quicker access to health records that could save that patient\u2019s life.\u00a0 Other areas of critical infrastructure, such as the <a href=\"https:\/\/teletimesinternational.com\/2019\/5g-digitalization-oil-gas\/\" target=\"_blank\" rel=\"noopener noreferrer\">oil and gas industry<\/a> and <a href=\"https:\/\/www.business.att.com\/learn\/tech-advice\/how-5g-will-enhance-the-finance-industry.html\" target=\"_blank\" rel=\"noopener noreferrer\">finance<\/a>, will benefit from 5G technology.\u00a0 The entire <a href=\"https:\/\/www.supplychaindive.com\/news\/5g-transform-logistics-supply-chain\/565491\/\" target=\"_blank\" rel=\"noopener noreferrer\">supply chain<\/a> industry will be transformed through 5G as well.<\/p>\n<h2 class=\"navy\">Watch Outs for 5G Technology<\/h2>\n<p>There are, however, some challenges facing 5G networks.\u00a0 A provider cannot just turn on a switch and start transmitting a 5G signal to its clients.\u00a0 The required hardware is different.\u00a0 First, the frequency at which the 5G signal operates is higher than previous cellular technologies, which has caused some to <a href=\"https:\/\/www.howtogeek.com\/423720\/how-worried-should-you-be-about-the-health-risks-of-5g\/\" target=\"_blank\" rel=\"noopener noreferrer\">speculate about health concerns<\/a>.\u00a0 Second, <a href=\"https:\/\/techxplore.com\/news\/2019-11-antenna-technology-extremely-fast-5g.html\" target=\"_blank\" rel=\"noopener noreferrer\">antenna technology<\/a> is advancing, but the demand for faster networking is outpacing those advancements.\u00a0 Third, this higher frequency makes for a somewhat fragile signal strength, requiring more antennas, which need to be spaced at closer distances than the earlier generations of cellular antennas.<\/p>\n<p>Cyber threats are also an area of concern for 5G technologies.\u00a0 Even though the <a href=\"https:\/\/www.forbes.com\/sites\/bobodonnell\/2019\/10\/21\/the-5g-landscape-part-1-infrastructure\/#21489efc27f9\" target=\"_blank\" rel=\"noopener noreferrer\">entire infrastructure is different<\/a> from its predecessors, there are still security holdovers from the earlier communication generations that have not been addressed.<\/p>\n<p>One area of concern is that device capability information is transmitted in advance of the application of any security.\u00a0 Device capability consists of all the characteristics of the mobile device, including various features that may or may not be enabled on the device.\u00a0 This weakness was demonstrated at <a href=\"https:\/\/threatpost.com\/5g-security-flaw-mitm-targeted-attacks\/147073\/\" target=\"_blank\" rel=\"noopener noreferrer\">BlackHat 2019<\/a>.\u00a0 The lack of security at that level opens up a device for a <a href=\"https:\/\/www.techrepublic.com\/article\/man-in-the-middle-attacks-a-cheat-sheet\/\" target=\"_blank\" rel=\"noopener noreferrer\">Man-in-The-Middle attack<\/a> (MiTM).<\/p>\n<p>Most people may consider a \u201cMan in The Middle\u201d (MiTM) attack as unimportant, saying, \u201cso what is the big deal if someone can figure out if I am using voice dialing\u201d.\u00a0 Alternatively, a person may approach the MiTM attack with the attitude of \u201cI have nothing to hide, so I have nothing to fear\u201d.\u00a0 However, attacks against individuals are not necessarily the concern here.\u00a0 It is true that a person should be concerned about a password theft, or banking fraud perpetrated through a Man-in-The-Middle attack. If these types of attacks are amplified, such as was the case in the attack <a href=\"https:\/\/dyn.com\/blog\/dyn-analysis-summary-of-friday-october-21-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">against the DYN DNS service<\/a> in 2016, this is where the threat becomes very concerning.<\/p>\n<p>As stated earlier, 5G can revolutionize some points of critical infrastructure.\u00a0 An attack against that infrastructure through vulnerable 5G devices can result in damage, not only at a massive scale, but also in real-time.\u00a0 For example, Imagine if every cell phone was used to launch an attack against a water treatment plant, or an electrical grid.<\/p>\n<p>Years ago, one security researcher found a flaw in the automated wireless machines used to feed cattle.\u00a0 This research was revealed in a presentation at EC-Council\u2019s \u201cTakeDown Con\u201d, in 2016 at the University of Connecticut.\u00a0 Rather than using that flaw to create chaos, he programmed the feeders to stop in the middle of their feeding rounds and perform a choreographed \u201cdance\u201d in the barnyard.\u00a0 While comical, when these systems become connected on a 5G infrastructure, the potential disruption becomes less amusing, as demonstrated by his next research discovery; he further found that he could also access the vaccination machinery of some cattle ranches.\u00a0 In doing so, he could adjust the antibiotic dosage provided to the animals.\u00a0 Not only is this is a major threat to the food supply chain, but it could be carried out at random, at speeds that would evade detection.<\/p>\n<p>The supply chain of 5G is also threatened in the sourcing of the equipment that will comprise the entire infrastructure.\u00a0 At a <a href=\"https:\/\/www.commerce.senate.gov\/2020\/3\/5g-supply-chain-security-threats-and-solutions\" target=\"_blank\" rel=\"noopener noreferrer\">meeting of the U.S. Senate Committee on Science, Commerce, and Transportation<\/a>, representatives from leading manufacturers stressed the need to properly source the equipment that will compose the 5G infrastructure.\u00a0 A failure to do so could result in security weaknesses at the very core of the systems.<\/p>\n<p>The increased attack surface of 5G could also threaten autonomous vehicle technology.\u00a0 As was demonstrated with the intrusion into an <a href=\"https:\/\/www.forbes.com\/sites\/jamiecartereurope\/2019\/03\/05\/hacked-driverless-cars-could-cause-collisions-and-gridlock-in-cities-say-researchers\/#27b2867e2a09\" target=\"_blank\" rel=\"noopener noreferrer\">automobile\u2019s on-board computer system<\/a>, a simple traffic jam on a major thoroughfare could result in life and death consequences.\u00a0 The <a href=\"https:\/\/www.visualcapitalist.com\/anatomy-smart-city\/\" target=\"_blank\" rel=\"noopener noreferrer\">future of entire cities<\/a> could rely heavily on this new technology, exponentially increasing the risks.<\/p>\n<p>Artificial intelligence (AI) could also be impacted by 5G attacks.\u00a0 If AI can be used as a diagnostic healthcare tool, a compromise of that system could mean the difference between effective, or fatal treatment.<\/p>\n<h2 class=\"navy\">Real-Time Solutions<\/h2>\n<p>Of course, it is easy to postulate all the gloom and doom scenarios with any new technology, and in the discipline of Risk Management, it is part of the job description. To keep it all in perspective, it is important to note that it is not as bleak as it may initially sound.<\/p>\n<p>The benefits of this new technology outweigh the risks.\u00a0 Reflecting on the vulnerable cattle devices, the researcher also found that the same flaw that allowed access to the cattle\u2019s feeding and inoculation machines could also be used to patch the vulnerability.\u00a0 He patched the systems to prevent damage by malicious individuals.\u00a0 With 5G technology, a patch could be applied at scale, and in real-time.<\/p>\n<p>The coupling of 5G and Artificial Intelligence could serve as an automated inoculation system for many vulnerabilities.\u00a0 Intrusion detection and prevention would be significantly improved.\u00a0 As one philosopher pondered, what we need is a <a href=\"https:\/\/www.ted.com\/talks\/damon_horowitz_we_need_a_moral_operating_system\" target=\"_blank\" rel=\"noopener noreferrer\">moral operating system<\/a>.\u00a0 A moral operating system, joined with a 5G and AI could change the entire security discipline.\u00a0 Instead of the usual <a href=\"https:\/\/www.youtube.com\/watch?v=VoP1E9J4jpg\" target=\"_blank\" rel=\"noopener noreferrer\">whack-a-mole<\/a> style, reactive approach to security, new systems could use the agility of 5G not only in a predictive manner, but towards a self-healing posture.\u00a0 This real-time resiliency could redefine the future of security.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>During the COVID-19 public health emergency, Governments, as well as public and private organizations throughout the world are taking measures to contain and mitigate COVID-19. This can involve the processing of different types of sensitive personal data, including protected health information.<\/p>\n","protected":false},"author":13,"featured_media":1791,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179,13,2180],"tags":[1941],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Implications of 5G Technology - kw022024<\/title>\n<meta name=\"description\" content=\"Cyber threats are an area of concern for 5G technologies. Even though the entire infrastructure is different from its predecessors, there are still security holdovers from the earlier communication generations that have not been addressed.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Implications of 5G Technology\" \/>\n<meta property=\"og:description\" content=\"Cyber threats are an area of concern for 5G technologies. Even though the entire infrastructure is different from its predecessors, there are still security holdovers from the earlier communication generations that have not been addressed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-13T08:00:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T03:00:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_blog_5g.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Covello\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@BobCovello\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Covello\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/\"},\"author\":{\"name\":\"Bob Covello\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/21c4dc93eac8349704f909323a534978\"},\"headline\":\"Cybersecurity Implications of 5G Technology\",\"datePublished\":\"2020-07-13T08:00:27+00:00\",\"dateModified\":\"2021-04-12T03:00:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/\"},\"wordCount\":1536,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_blog_5g.jpg\",\"keywords\":[\"12 Minute Read\"],\"articleSection\":[\"Compliance\",\"Cybersecurity\",\"Managed Services\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/\",\"name\":\"Cybersecurity Implications of 5G Technology - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_blog_5g.jpg\",\"datePublished\":\"2020-07-13T08:00:27+00:00\",\"dateModified\":\"2021-04-12T03:00:23+00:00\",\"description\":\"Cyber threats are an area of concern for 5G technologies. Even though the entire infrastructure is different from its predecessors, there are still security holdovers from the earlier communication generations that have not been addressed.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_blog_5g.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_blog_5g.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Implications of 5G Technology\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/21c4dc93eac8349704f909323a534978\",\"name\":\"Bob Covello\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3f7818cc9c64f3243c8b9fea1bb82616?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3f7818cc9c64f3243c8b9fea1bb82616?s=96&d=mm&r=g\",\"caption\":\"Bob Covello\"},\"description\":\"Bob Covello (@BobCovello) is a 20-year technology veteran and InfoSec analyst with a passion for security topics. He is also a volunteer for various organizations focused on advocating for and advising others about staying safe and secure online. Author for Security and Technology sites, including: AT&amp;T Cybersecurity (formerly Alienvault), Tripwire, LawTechnology News, LegalTech, Graham Cluley's Security News, LivingSecurity, Venafi, InformationSecurity Buzz, InformationWeek, (ISC)2 \u2605 Security Strategy: Design and implement strategic cybersecurity solutions that strengthen security controls, remedy endpoint security vulnerabilities, and transform end-user behaviors for reduced risk exposure. \u2605 Presenter and Contributor to (ISC)2\u2019s Safe and Secure Online Program as part of isc2cares.org. Author for certification test-prep site. \u2605 Executive Training &amp; Consulting: Initiate and foster strong, lasting relationships with security industry experts as well as C-Suite business executives, including CIO, CTO, and CISO, to communicate cybersecurity trends and solutions. ---------------------------------- Qualifications &amp; Credentials ---------------------------------- \u2611 Over 20 Years of Technology Leadership &amp; IT Security Excellence \u2611 Early Career Experience in Physical Security with the Westchester County Department of Corrections \u2611 Understanding and Practical Application of Emerging Data Security Solutions &amp; Techniques \u2611 Uncovering &amp; Preventing Potential Security Vulnerabilities \u2611 Bachelor\u2019s Degree, Iona College \u2611 CISSP \u2013 Certified Information Systems Security Professional \u2611 CEH \u2013 Certified Ethical Hacker\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/bobcovello\/\",\"https:\/\/x.com\/BobCovello\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/bob-covello\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Implications of 5G Technology - kw022024","description":"Cyber threats are an area of concern for 5G technologies. Even though the entire infrastructure is different from its predecessors, there are still security holdovers from the earlier communication generations that have not been addressed.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Implications of 5G Technology","og_description":"Cyber threats are an area of concern for 5G technologies. Even though the entire infrastructure is different from its predecessors, there are still security holdovers from the earlier communication generations that have not been addressed.","og_url":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2020-07-13T08:00:27+00:00","article_modified_time":"2021-04-12T03:00:23+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_blog_5g.jpg","type":"image\/jpeg"}],"author":"Bob Covello","twitter_card":"summary_large_image","twitter_creator":"@BobCovello","twitter_site":"@itegriti","twitter_misc":{"Written by":"Bob Covello","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/"},"author":{"name":"Bob Covello","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/21c4dc93eac8349704f909323a534978"},"headline":"Cybersecurity Implications of 5G Technology","datePublished":"2020-07-13T08:00:27+00:00","dateModified":"2021-04-12T03:00:23+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/"},"wordCount":1536,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_blog_5g.jpg","keywords":["12 Minute Read"],"articleSection":["Compliance","Cybersecurity","Managed Services"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/","url":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/","name":"Cybersecurity Implications of 5G Technology - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_blog_5g.jpg","datePublished":"2020-07-13T08:00:27+00:00","dateModified":"2021-04-12T03:00:23+00:00","description":"Cyber threats are an area of concern for 5G technologies. Even though the entire infrastructure is different from its predecessors, there are still security holdovers from the earlier communication generations that have not been addressed.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_blog_5g.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_blog_5g.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/cybersecurity-implications-of-5g-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Implications of 5G Technology"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/21c4dc93eac8349704f909323a534978","name":"Bob Covello","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3f7818cc9c64f3243c8b9fea1bb82616?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3f7818cc9c64f3243c8b9fea1bb82616?s=96&d=mm&r=g","caption":"Bob Covello"},"description":"Bob Covello (@BobCovello) is a 20-year technology veteran and InfoSec analyst with a passion for security topics. He is also a volunteer for various organizations focused on advocating for and advising others about staying safe and secure online. Author for Security and Technology sites, including: AT&amp;T Cybersecurity (formerly Alienvault), Tripwire, LawTechnology News, LegalTech, Graham Cluley's Security News, LivingSecurity, Venafi, InformationSecurity Buzz, InformationWeek, (ISC)2 \u2605 Security Strategy: Design and implement strategic cybersecurity solutions that strengthen security controls, remedy endpoint security vulnerabilities, and transform end-user behaviors for reduced risk exposure. \u2605 Presenter and Contributor to (ISC)2\u2019s Safe and Secure Online Program as part of isc2cares.org. Author for certification test-prep site. \u2605 Executive Training &amp; Consulting: Initiate and foster strong, lasting relationships with security industry experts as well as C-Suite business executives, including CIO, CTO, and CISO, to communicate cybersecurity trends and solutions. ---------------------------------- Qualifications &amp; Credentials ---------------------------------- \u2611 Over 20 Years of Technology Leadership &amp; IT Security Excellence \u2611 Early Career Experience in Physical Security with the Westchester County Department of Corrections \u2611 Understanding and Practical Application of Emerging Data Security Solutions &amp; Techniques \u2611 Uncovering &amp; Preventing Potential Security Vulnerabilities \u2611 Bachelor\u2019s Degree, Iona College \u2611 CISSP \u2013 Certified Information Systems Security Professional \u2611 CEH \u2013 Certified Ethical Hacker","sameAs":["https:\/\/www.linkedin.com\/in\/bobcovello\/","https:\/\/x.com\/BobCovello"],"url":"https:\/\/itegriti.com\/kw022024\/author\/bob-covello\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1788"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=1788"}],"version-history":[{"count":6,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1788\/revisions"}],"predecessor-version":[{"id":1985,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1788\/revisions\/1985"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/1791"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=1788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=1788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=1788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}