SHARETHISBROCHUREEvolvingMobileNetworkSecurityNeedsintheAgeofIoTand5G00Introduction01HowDidWeGetHere?02ANewAtmosphereofMobileNetworkAttacks035G:NewCapabilities,NewSecurityConcerns04TheRiseofIoTand5GDevices05TheRoleofSecurityAutomationandArtificialIntelligence065GSecurityUseSolutions07SummaryContentsCreatingaSecureClimateforYourCustomersPeoplesimplyhatetobedisconnected.Theywant24x7accesstohigh-speedinterneteverywherefromanydevice.Allthattweeting,textingandtelecommutingtranslatesintodramaticgrowthinmobiletraffic.Globalmobiledatausageispredictedtogrowatacompoundannualgrowthrate(CAGR)of47%,reaching49.0exabytespermonthby2021.Everhavethatpanickyfeelingwhenyou’renotsurewhereyouleftyourmobiledevice?It’sasignofthetimesthatthesensationhasaname:nomophobia.Thenfactorintheinternetofthings(IoT),whichincludesbillionsofmachinesaroundtheworldconnectedtotheinternet.Everysmartrefrigera-tor,thermometerandprinter,tonameafew,requireanalways-onnetworkconnectionforremotemonitoringanddatasharing.Whilemostserviceprovidersarejustnowgettingahandleon4Gnetworks,5GnetworktrialsaresettodebutinmajormetropolitanareasintheUnitedStatesbytheendof2018.TheGSMApredictsAsia(ChinaandJapan),EuropeandtheU.S.willbeleadingthe5Gmarketby2025.2020isthebeginningofamassrolloutof5Gnetworks.Serviceprovidershaveashortrunwaytofigureoutsecurityissues.00INTRODUCTIONEVOLVINGMOBILENETWORKSECURITYNEEDSINTHEAGEOFIOTAND5G|3Thesedevelopmentscombinetocreateacomplexmobileecosystemwithmultipleentrypointsforattacks.Everydeviceconnectedtoyournetworkisapotentialsecurityweakness.Hackerscantargetyourcustomerstostealdataorusetheirdevicestogenerateattacksonyournetworkorothercompanies’networksandapplicationswithouttheusers’knowledge.IoTdevicesareespeciallyvulnerablebecausemanufacturersaremoreconcernedwithkeepingpriceslowthanaddingsecurityfeatures.Thatmeanstherearepotentiallymillionsofunprotectedendpointsonyourmobilenetwork.THECHALLENGEISANOPPORTUNITY.Mobileserviceproviderscanestablishacompetitiveadvantagebycreatingasecureenvironmentthatprotectscustomers’dataanddevices,buildingsuperiortrustwiththeirusersincomparisontootherserviceproviders.ACASINOFOUNDOUTthehardwaythattheinternetofthingsisajackpotforattackers.Bytappingintothesmartthermometerthatcontrolsthetemperatureofthewaterinthelobbyaquarium,hackerswentonafishingexpeditioninthecasino’snetworkandlandeditsdatabaseofhigh-endclients.SOMETHING’SFISHYHERE00INTRODUCTIONEVOLVINGMOBILENETWORKSECURITYNEEDSINTHEAGEOFIOTAND5G|401HowDidWeGetHere?TheEvolvingNetworkSecurityEnvironment01HOWDIDWEGETHERE?ThesmartphoneswetakeforgrantedhavemorecomputingpowerthanthecomputersthatguidedtheApollo11moonlanding.Inthealmostquartercenturysincemobiledevicestransitionedfromaluxurytoamust-have,theseverityofnetworksecurityissueshaskeptpace.Networktechnologiestendtolast10to15yearsbeforealluserscanbetransitionedtothenewnetwork.Thatmeansmanaging—andprotecting—morenetworkelementsthatarerequiredasoverlaysandgatewaystoconnectmultiplegenerationsofwirelessdevices.Eachgenerationofnetworktechnologyintroducesanewsetofsecuritychallenges.MobileStandardPrimaryFocusTypicalDLSpeed(Mbps)TypicalLatency(milliseconds)SecurityFocusSecurityProvisions2GVoice0.1629StealingvoicecallsOTAencryptionSIMcards3GVoice/data8212StealingdatapayloadRoguenetworksPacketencryptionMutualauthentication4GData1596StealingdatapayloadEnhancedkeymanagement5GData~100~1MobileinstantiatedattacksMobilesecurityservicesCloudperimeterprotectionSecurenetworkslicesEVOLVINGSECURITYCHALLENGESAsmobilenetworktechnologiesprogress,newandmorecomplexsecurityissuesareintroduced.Serviceprovidersmustadapttoprotecttheirnetworksandcreateasecureonlineenvironmentforcustomers.5Gconnectionspeedsandlatencyareonparwithwirelinenetworks.Thebadactorsthatthreatenwirelinenetworkswilllaunchsimilarlarge-scale,complexattacks,whichhavebeensuccessfulinwireline,onthe5Gnetworksofunpreparedserviceproviders.EVOLVINGMOBILENETWORKSECURITYNEEDSINTHEAGEOFIOTAND5G|601HOWDIDWEGETHERE?THEINCREASINGINTENSITYOFTHREATSTheseverityandfrequencyofnetworkattackscontinuestoevolveatanalarmingrate.Source:InfoSecInstituteandRadwareîMaliciouscodesîTrojanîAdvancedwormsîCybercrimeandvirusesinitiated—MorriswormandothersîIdentitytheftîPhishingîDNSattacksîRiseofbotnetsîSQLattacksîAnto-spamsitesîCompetitivesabotageescalationîSocialengineeringîDoSîBotnetsîMaliciousemailsîRansomwareattacksîPoScomprisedîBankingmalwareîKeyloggerîBitcoinwalletstealerîIdentitytheftîPhonehijackingîRansomwareattacksîPoSattacksîCyberwarfareîAndroidhacksîCryptojackingîCryptominingPRESENT20132010200720041997EVOLVINGMOBILENETWORKSECURITYNEEDSINTHEAGEOFIOTAND5G|701HOWDIDWEGETHERE?2GWiththeintroductionof2Ginthe1990s,serviceproviders’onlyconcernisprotectingvoicecalls.Securitymeasuresfocusonauthenticatingandencryptingcallsontheradioaccesslink.Callsarenotsecuredonthefixednetworkportionofthetransmission.3GFasterspeedsandaccesstothemobileinternetarethehallmarksof3Gnetworktech-nologies.Thenextgenerationofmobilenetworksoffersmuchbettersecuritythan2Ginthewayitencryptsvoiceanddatatraffic.Themainconcernisnotatta