INFORMATION SECURITY PROBLEMS IN 5G NETWORK TECHNOLOGIES AND WAYS OF ELIMINATE
Main Article Content
Abstract
5G network security Experts pay special attention to the fifth-generation mobile networks in the context of the lawsuit. On the one hand, 5G is now at the center of everyone's interest. States are interested, because this topic is at the intersection of two major factors, and corporations are trying to get ahead of each other and are fighting over, who exactly will set the technological standards. The benefit is obvious: the ability to force the entire market to play by its own rules is a significant prize. It is quite natural that hype events attract intruders, since everything new and popular gives access to a large audience. Users who rush to join the new technology will already be waiting for cybercriminals who have learned about its vulnerabilities in advance. On the other hand, the fifth-generation network differs from all the previous ones architecturally: many of its features are implemented in software, not hardware. The concerns of security experts are related to this: mobile communication is turning into a function that works on an ordinary server in an ordinary data cente
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.