Hi All,
5G technology for broadband cellular networks will significantly improve how humans and machines communicate, operate, and interact in the physical and virtual world. 5G provides increased bandwidth and capacity, and low latency. However, professionals in fields like technology, cybersecurity, and privacy are faced with safeguarding this technology while its development, deployment, and usage are still evolving.
To help, the NIST National Cybersecurity Center of Excellence (NCCoE) has launched the https://links-1.govdelivery.com/CL0/https:%2F%2Fwww.nccoe.nist.gov%2F5g-cybersecurity%23project-promo/1/010001930202ad7c-7f9da0f4-0332-47a0-a699-6d7b63550ab1-000000/vnQwUTMSeBZhSseKMUOmhzODsQaVJB-1zTRCAAtpgP4=378. Click or tap to follow the link." data-linkindex="1" target="_blank" rel="noopener">Applying 5G Cybersecurity and Privacy Capabilities white paper series. The series targets technology, cybersecurity, and privacy program managers within commercial mobile network operators, potential private 5G network operators, and organizations using and managing 5G-enabled technology who are concerned with how to identify, understand, assess, and mitigate risk for 5G networks. In the series, we provide recommended practices and illustrate how to implement them. All of the capabilities featured in the white papers have been demonstrated on the NCCoE testbed on commercial-grade 5G equipment.
We are pleased to announce the availability of the fourth white paper in the series:
https://links-1.govdelivery.com/CL0/https:%2F%2Fwww.nccoe.nist.gov%2F5g-cybersecurity%23project-promo/2/010001930202ad7c-7f9da0f4-0332-47a0-a699-6d7b63550ab1-000000/ZTYJI3RdX6LKIeGeVaOGohjd8cIuN44SYmHCurqyGzw=378. Click or tap to follow the link." data-auth="Verified" href="https://emea01.safelinks.protection.outlook.com/?url=https%3A%2F%2Flinks-1.govdelivery.com%2FCL0%2Fhttps%3A%252F%252Fwww.nccoe.nist.gov%252F5g-cybersecurity%2523project-promo%2F2%2F010001930202ad7c-7f9da0f4-0332-47a0-a699-6d7b63550ab1-000000%2FZTYJI3RdX6LKIeGeVaOGohjd8cIuN44SYmHCurqyGzw%3D378&data=05%7C02%7C%7C7408067c046641f1ef2c08dcfe7480f8%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638665023548673196%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=YlKCZ56yCXoZ7RqfZ3HM%2B4teZsoCVLXIMM4P9acQH3c%3D&reserved=0" data-linkindex="2" target="_blank" rel="noopener">Reallocation of Temporary Identities-This publication provides additional details regarding how 5G protects subscriber identities (IDs). It focuses on how the network reallocates temporary IDs to protect users from being identified and located by an attacker. Unlike previous generations of cellular systems, new requirements in 5G explicitly define when the temporary ID must be reallocated (refreshed), which is explained in the document.
Feedback Wanted
We welcome your input and look forward to your comments by 11:59 p.m. ET, December 6, 2024. https://www.nccoe.nist.gov/5g-cybersecurity#5g_series_comment_form
------------------------------
Michael Roza CPA, CISA, CIA, CC, CCSKv5, CCZTv1, MBA, EMBA, CSA
------------------------------