{"id":9400,"date":"2021-02-02T08:19:00","date_gmt":"2021-02-02T08:19:00","guid":{"rendered":"https:\/\/web3unplugged.io\/blog\/?p=9400"},"modified":"2021-02-13T08:31:59","modified_gmt":"2021-02-13T08:31:59","slug":"booz-allen-lays-out-security-challenges-associated-with-5g-rollout-in-the-middle-east","status":"publish","type":"post","link":"https:\/\/web3unplugged.io\/blog\/booz-allen-lays-out-security-challenges-associated-with-5g-rollout-in-the-middle-east\/","title":{"rendered":"Booz Allen lays out security challenges associated with 5G rollout in the Middle East"},"content":{"rendered":"\n<p>The development and rollout of 5G coverage across Gulf Cooperation Council (GCC) countries will empower new services and use cases for consumers, enterprises, and broader society. However, 5G infrastructure and the network ecosystem also creates opportunities for malicious threat actors seeking the potential to disrupt the economy, public health, and safety. Against this backdrop, a new whitepaper from Booz Allen Hamilton outlines 5G\u2019s most significant technical changes, its diverse operational value, and associated risks and opportunities.<\/p>\n\n\n\n<p>5G\u2019s widespread rollout will spur economic activity broadly through the sale, installation, and operation of new networks. Increasing adoption will facilitate productivity gains, novel services, and innovations only made possible by 5G\u2019s technological advances including speed and network flexibility, among others. An IHS Markit study estimates that $13.2 trillion in global economic value will be possible by 2035, generating 22.3 million jobs in the 5G global value chain alone.[i] Meanwhile, the global 5G IoT market \u2013 already worth an estimated $305 million annually \u2013 is projected to expand by 54 percent annually in the coming years, driving further gains.[ii]<\/p>\n\n\n\n<p>GCC countries\u2019 5G plans are already well underway. In September 2020 for instance, in alignment with the UAE strategy for 5G and beyond (2020-2025) to boost 5G services rollout, the Telecommunications Regulatory Authority (TRA) announced allocation of a new frequency band that allows UAE telecoms operators to expand the application of 5G more broadly.3 Separately, while comparing 5G users\u2019 overall experiences across 12 of the world\u2019s leading developing 5G markets, an Opensignal report found that 5G users in Saudi Arabia have the fastest overall average download speed of 144.5 Mbps.4<\/p>\n\n\n\n<p>Souheil Moukaddem, Executive Vice President and Managing Director at Booz Allen Hamilton MENA stated: \u201cAs 5G networks come online in the UAE and other GCC countries, facilitating the creation of secure and resilient 5G ecosystems is an urgent priority. 5G will forge connections between devices and the digital world. However, this connectivity also translates to new vulnerabilities. The government and private sector must recognize and address these risks early in the network development process.\u201d<\/p>\n\n\n\n<p>Booz Allen assembled experts in cybersecurity research, engineering, and threat intelligence to identify 5G\u2019s key interworking technologies. Examining these core 5G technologies, Booz Allen\u2019s experts identified opportunities adversaries could exploit, what they might hope to gain from targeting these technologies, how these threats could impact organizations and users, and how operators could mitigate identified risks.<\/p>\n\n\n\n<p>5G will have far-reaching impact across industries, empowering sectors such as healthcare and logistics to adopt new operating models, gain novel insights, and drive efficiencies. However, the increased number of mission critical IoT devices will present threat actors with a wide array of new opportunities to inflict damage. 5G IoT devices will generate massive volumes of data that can be stolen, destroyed, or manipulated. Virtual networks customized for specific sectors and organizations will encourage new targeted threats against them. New software and hardware supply chains will most likely lead to the introduction of untrustworthy components in the 5G ecosystem. While organizations plan to take advantage of the global 5G rollout, it is imperative to proactively prepare for these \u2013 and other \u2013 identified threats to 5G\u2019s core technologies.<\/p>\n\n\n\n<p>Booz Allen\u2019s whitepaper outlines specific threat scenarios, aligned to core identified elements of the 5G ecosystem and associated threat mitigations. The scenarios capture a wide spectrum of possibilities from attacks that damage industrial process devices and disrupt critical processes enabled by 5G networks to the theft of sensitive data, the risk of IoT-enabled devices being compromised, and disinformation campaigns.<\/p>\n\n\n\n<p>Ziad Nasrallah, Principal at Booz Allen Hamilton MENA, concluded: \u201cOrganizations on the path to 5G adoption should take a forward-looking view of this emergent technology. It offers both immense opportunities, while portending a continually evolving threat landscape. 5G deployment is already underway; now is the time for leaders across government and industry to ensure security, trust, and resilience are the foundational principles of the next generation digital backbone.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The development and rollout of 5G coverage across Gulf Cooperation Council (GCC) countries will empower new services and use cases for consumers, enterprises, and broader society. However, 5G infrastructure and the network ecosystem also creates opportunities for malicious threat actors seeking the potential to disrupt the economy, public health, and safety. Against this backdrop, a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9401,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-9400","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"rttpg_featured_image_url":{"full":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/5G5.jpg",810,456,false],"landscape":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/5G5.jpg",810,456,false],"portraits":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/5G5.jpg",810,456,false],"thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/5G5-150x150.jpg",150,150,true],"medium":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/5G5-300x169.jpg",300,169,true],"large":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/5G5.jpg",810,456,false],"1536x1536":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/5G5.jpg",810,456,false],"2048x2048":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/5G5.jpg",810,456,false],"post-thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/5G5.jpg",746,420,false],"graptor-sq-xs":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/02\/5G5.jpg",100,56,false]},"rttpg_author":{"display_name":"admin","author_link":"https:\/\/web3unplugged.io\/blog\/author\/admin\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/web3unplugged.io\/blog\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","rttpg_excerpt":"The development and rollout of 5G coverage across Gulf Cooperation Council (GCC) countries will empower new services and use cases for consumers, enterprises, and broader society. However, 5G infrastructure and the network ecosystem also creates opportunities for malicious threat actors seeking the potential to disrupt the economy, public health, and safety. Against this backdrop, a&hellip;","_links":{"self":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/9400","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/comments?post=9400"}],"version-history":[{"count":1,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/9400\/revisions"}],"predecessor-version":[{"id":9402,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/9400\/revisions\/9402"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media\/9401"}],"wp:attachment":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media?parent=9400"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/categories?post=9400"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/tags?post=9400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}