5G is a double-edged sword. In the future game of great powers, the 5G technology revolution determines how fast a country can go, and the 5G security defense capability is destined to how far this country can go.
Opportunities under the 5G wave: the Internet of Everything in the world
5G, a new technical term that is no longer familiar. It builds three major application scenarios with three characteristics of large broadband (eMBB), high reliability and low latency (uRLLC) and massive connection (mMTC): eMBB: 10GB per second download rate, making 3D, ultra high definition High-traffic mobile broadband services such as video become possible; uRLLC: 5G theoretical delay is 1ms, so that unmanned driving, industrial automation and other services do not stop at the film; mMTC: The theoretical value of the number of IoT terminals that can be connected to a 5G single communication cell has reached One million levels.
According to IDC forecast, by 2025, the number of IoT devices worldwide will reach 41.6 billion. Industrial Internet, Internet of Vehicles, Smart Grid, Smart City, Military Network, etc. will all be built on the fission of 5G network development. It can be said that from the interconnection of all people, the interconnection of people, to the interconnection of things and the combination of three things, the 5G technology will eventually build a smart world of interconnection of everything for us.
Challenges under the 5G wave: industry security is hanging
However, just as we enjoy the enormous empowerment brought by 5G, at the other end of the trend, unprecedented security risks also follow:
When 5G combines the characteristics of "low latency + high reliability" with important vertical industries such as Internet of Vehicles, telemedicine, industrial automation, and smart grid, the targets and rights of cyber attacks are further expanded; when 5G supports "big connection business", When more critical infrastructure and important application architectures are placed on it, these high-value targets may attract greater attack power-national hackers enter; when 5G breaks the network boundary, further realize the integration of the network world and the physical world At this time, attacks against the virtual world will become physical damage, and the impact of cyber attacks has exploded exponentially.
Just a few days ago, when Li Huidy, vice president of China Mobile, delivered a speech at the 2019 China Cyber Security Industry Summit Forum, he emphasized that from the perspective of industrial demand, there is no industrial security without 5G security. In particular, 5G will be widely used in key industries such as power, energy, transportation, and industrial manufacturing. Once the network is attacked or invaded, it will seriously threaten the economic and social stability of a country and the people's production and life.
In further research, think tanks found that key infrastructure such as the Internet of Things, the Internet of Things, and industrial control bear the brunt, becoming the industry most vulnerable to cyber attacks under the 5G wave.
No suspense, industrial control system has become the top priority of 5G network security
In a production center that is running at high speed, suddenly the computer network system is down, billions of equipment are simultaneously paralyzed, several factories are in chaos, huge amounts of economic losses, and even social chaos ... This is not a terrible production accident. Under the blessing of 5G, this will be a "security nightmare" for global industrial control systems.
Industrial control systems are any equipment, instruments, and related software and networks used to operate or automate industrial processes. It is the "brain" and "central nerve" of important national infrastructure such as electricity, transportation, energy, water conservancy, metallurgy, and aerospace, and is related to the lifeblood of a country. It is for this reason that the industrial control system has become a key target of national hacker attacks.
When 5G and industrial control systems are deeply integrated, the characteristics of "large broadband, low latency, and large connection" and the millisecond response advantages will also bring "millisecond" damage speed to industrial control systems. The physical world under the control of the industrial network will also suffer "destruction level" losses. In April of this year, research results from a foreign security laboratory showed that more than half of the 415 vulnerabilities in industrial control systems were designated as high-risk or severe-risk security issues.
Looking back at China's industrial Internet security situation, the data shows that more than 50% of industrial control systems operate with poison and 100% of industrial control systems operate with loopholes, and it is impossible to change the above situation in the short term or even in the next few years. It can be said that in the 5G era, the industrial control system ushered in the most serious risk test in history.
Is the Internet of Things an entry point for attacks, is it the Internet of Everything or global downtime?
When 5G makes the popularization of massive IoT smart hardware devices and the transmission of data possible, tens of billions of IoT devices will become the entry point for hacker attacks, and it is unpredictable.
In October this year, the United States encountered the largest cyber attack in history, which caused a major disconnect on the east coast. According to the 360 security brain real-time monitoring and early warning system tracking monitoring, this attack hacker first invaded and controlled more than 100,000 intelligent hardware devices around the world to form a botnet, and then carried out a DDoS attack on the US Internet domain name resolution service DYN Disaster.
5G promotes the Internet of Things as a new attack portal. More than one hundred thousand devices are controlled to launch attacks that are enough to paralyze half of the U.S. network; in the 5G Internet of Everything world, if billions of devices are controlled, the global Internet will be down, and the entire world may stop functioning. "In milliseconds".
Equipped with 5G technology, the Internet of Vehicles may have security risks first
Today's automobile industry is developing in the direction of intelligence, networking, electrification and sharing. The intelligent driving system, infotainment system, chassis control system and power control system of the car will be connected to 5G and carry out data through the network. Transmission and software upgrade. In addition, next-generation cars and public transportation will also use 5G networks to communicate with other vehicles and road sensors. This move is a technological advancement and the beginning of potential safety hazards.
Once the car with auto-driving function is controlled by hackers, in "Speed and Passion 8", hundreds of cars will automatically drive from the parking lot to the street, and the scene of the killing weapon will not only be an unreal movie.
However, this is not alarmist. In the past two years, many factories and workshops have been frequently attacked by the Internet, and even internationally well-known brands of cars have been brutally attacked. Once the depot server is compromised, hackers can remotely control the vehicle through a wireless connection. So much so that when faced with a reporter's question: Which industry will be the first to show potential cybersecurity risks? 360 Group Chairman and CEO Zhou Hongyi blurted out directly: Internet of Vehicles.
5G is an important infrastructure in the future. It can empower the industry, and it can also bring fatal death to the industry. 5G, it is a double-edged sword. Therefore, we should treat and deal with the syndrome differentiation. We must firmly grasp opportunities; we must plan ahead in time for challenges.
In response to 5G security challenges, think tanks believe that resources such as security big data, threat intelligence and knowledge bases, and security experts should be integrated into one body; use holistic thinking instead of local thinking; take an active defensive posture instead of static protection; "Visible, defensive" network security defense capabilities to actively respond.
In addition, just as the prosperity of the 5G era requires the joint efforts of the government, operators and all walks of life, the large security ecosystem under 5G also requires the joint efforts and cooperation of industry, network security companies and government authorities to deepen the network security in the 5G era. Offensive and defensive research and response can only guarantee the security of individuals, industries and even the country.