FMUSER Wirless Transmit Video And Audio More Easier !

[email protected] WhatsApp +8618078869184
Language

    5G security is to make two double-edged enterprises to challenge and prepare in advance.

     

    In recent years, with the rapid development of the Internet, all kinds of safety incidents are like the shadows, which have caused widespread concern around the world, and the security threats have accepted the sensitive nerves of each Internet enterprise, and they have become the thunderous thunderous thunderous Area. In the 5G era, in addition to greeting the convenience of technology, we should also strengthen the awareness of various unknown safety precautions. At the fifth Internet Security Leaders Summit (CSS 2019), the Chairman of the China Internet Association, the Chinese Academy of International Academy of China, interpreted the unknown security risks in the 5G era. He Wei believes that 5G safety is to make "double-edged sword", enterprises need to face challenges and prepare in advance. Have a good or bad 5G security is to put "double edge sword" Compared with 4G, the peak rate is increased by 30 times, and the user experience data rate is 10 times. The spectrum efficiency is 3 times, the mobility is 500km / h, and the wireless interface is reduced by 90%. The connection density is 10 times, one The 1 million Internet of Internet of Internet of Things, the energy and density increased by 100 times. He He said that the past network is "fool", relatively simple, and the safety is relatively good. However, the network function is virtualized, and the hardware white box is compared to the past, it is easier to attack compared to the dedicated telecom equipment. The entire function selection relies on the network intelligent management system centralized operation. The attack impact of the system has increased, but when the network invades, we can perform the function of the transform network element, and realize the dynamic defense of changing the game rules. So there is also a good side. Traditional routers have both node control functions, and transmit forwarding features, shortest path priority, forwarded to the next router, and did not take into account global optimization, and the efficiency is not high. After 5G network uses software definition, it becomes a connection-oriented packet communication to centrally control, through large data, artificial intelligence analysis, optimize the global risks, to circumvent security risks, this is a good side . He He is said that the past various routers are independently selected, and now it is now changed to a centralized circuit, the network operating system will become the focus of attack. The entire big network is concentrated, and the convergence of the algorithm is relatively high, network stability is susceptible to affected, "security" becomes a double-edged sword. He Wei talked about the 5G network slice, which is equivalent to the business of different service quality, using logical virtual private network, to allocate network data through the cloud platform, form different streams, quality of service Adapt to different needs. In this way, from a security perspective, it can isolate the network source to isolate the network service; but from another perspective, since the slice depends on network resources and business types and traffic, it is accurately grasped. The sliced ​​itself requires a powerful operating system, which may first be attacked, virus control, and even cause the network. IDC believes that the future edge calculation will be applied, and the edge calculation advantage is to proceed, reducing the risk of sensitive data leaks, which is a good side. "Inadequate calculation is that edge calculations are not concentrated cloud computing, weak protection, it is vulnerable to attack, originally concentrated on management content supervision, now spread to each edge node, will face management challenges." He said. He Wei believes that the past mobile communication, the agreement is closed, and now 5G uses the Internet protocol, the Internet already has a lot of applications to 5G, bringing the flexibility of business, but add 5G external attack. Sex and need to pay a safe price. Then, there is a safe risk, why is it used to use the cut, use an open Internet protocol? He He is said that the risk of safety can be solved by other security measures. The Internetization of open business and protocols has the ability to have the ability to be what we hope. 5G Operation Management Support System is increasingly complex, and it is not possible to operate by the network management personnel, and the network must be adjusted independently. He Zhaoqi emphasized that 5G intelligent operation and maintenance center is the center of 5G and is the focus of security defense. Risk layer out of the company how to lay out in advance There is a way to difficulties. In terms of the Internet of Things, He He is pointed out that if the module of each IoT must be internet access, you need to verify separately, and 10,000 Internet of Internet of Things Modules per square kilometer, this new request may exceed the network processing power, will Trigger a new storm, so 5G IoT needs to have a group's verification mechanism. "At the same time, because the sensors are much easily attacked, we must strengthen security verification measures, but do not want it too complicated, too complicated cost, and it is also a challenge." He said. He He is said that the car is the best application of 5G, 5G plus edge calculates the communication of the car to the car, the car to the cloud, the car is traffic light, the low-delay requirements of the car to the parking lot, and in high reliability, high bandwidth and In terms of large elements, the safety challenges faced by the car is more. The vehicle network is low to demand, but if the encryption security measures are too complicated, it is necessary to ensure that low delays, but also guarantee high and reliable encryption, becoming a very big challenge. "So we have to make new considerations throughout the encryption agreement, simplify the management process of the original security context, support the protection of edge computing and privacy data." He He said. He He is pointed out that the public network is aimed at the personal client, using more downloads, and there is less. 5G uses TDD mode, the Internet of Things terminals need to return data back, and less network instructions, private networks may be more suitable for this approach. Regardless of 5G in the enterprise, it is also very important, and its safety protection is extremely important. 5G also needs to consider more security. He He is pointed out that there is more to use big data and artificial intelligence. Artificial intelligence can discover abnormal flow, statistical enterprise abnormal data and external intelligence, and comprehensive analysis. "Enterprises must not only do a good job, but also from the integrators of the industrial control system, from Internet security companies to receive security support, from telecom operators to abnormally abnormal network traffic, and simultaneously collect social security data interact with the government To achieve sharing of threat information. Since the detection of problems from threats, the operation and maintenance of the entire network can make the network against threats, while reducing the cost of operation. "He He said. Finally, He He is said that 5G achieved the fusion of computing with communications, based on big data, artificial intelligence network operation and maintenance reduced human error, intelligent monitoring facilitates improving network security defense level, but 5G virtualization and software The definition has introduced new security risks and needs to face the security challenges brought by 5G.

     

     

     

     

    List all Question

    Nickname

    Email

    Questions

    Our other product:

    Professional FM Radio Station Equipment Package

     



     

    Hotel IPTV Solution

     


      Enter email  to get a surprise

      fmuser.org

      es.fmuser.org
      it.fmuser.org
      fr.fmuser.org
      de.fmuser.org
      af.fmuser.org ->Afrikaans
      sq.fmuser.org ->Albanian
      ar.fmuser.org ->Arabic
      hy.fmuser.org ->Armenian
      az.fmuser.org ->Azerbaijani
      eu.fmuser.org ->Basque
      be.fmuser.org ->Belarusian
      bg.fmuser.org ->Bulgarian
      ca.fmuser.org ->Catalan
      zh-CN.fmuser.org ->Chinese (Simplified)
      zh-TW.fmuser.org ->Chinese (Traditional)
      hr.fmuser.org ->Croatian
      cs.fmuser.org ->Czech
      da.fmuser.org ->Danish
      nl.fmuser.org ->Dutch
      et.fmuser.org ->Estonian
      tl.fmuser.org ->Filipino
      fi.fmuser.org ->Finnish
      fr.fmuser.org ->French
      gl.fmuser.org ->Galician
      ka.fmuser.org ->Georgian
      de.fmuser.org ->German
      el.fmuser.org ->Greek
      ht.fmuser.org ->Haitian Creole
      iw.fmuser.org ->Hebrew
      hi.fmuser.org ->Hindi
      hu.fmuser.org ->Hungarian
      is.fmuser.org ->Icelandic
      id.fmuser.org ->Indonesian
      ga.fmuser.org ->Irish
      it.fmuser.org ->Italian
      ja.fmuser.org ->Japanese
      ko.fmuser.org ->Korean
      lv.fmuser.org ->Latvian
      lt.fmuser.org ->Lithuanian
      mk.fmuser.org ->Macedonian
      ms.fmuser.org ->Malay
      mt.fmuser.org ->Maltese
      no.fmuser.org ->Norwegian
      fa.fmuser.org ->Persian
      pl.fmuser.org ->Polish
      pt.fmuser.org ->Portuguese
      ro.fmuser.org ->Romanian
      ru.fmuser.org ->Russian
      sr.fmuser.org ->Serbian
      sk.fmuser.org ->Slovak
      sl.fmuser.org ->Slovenian
      es.fmuser.org ->Spanish
      sw.fmuser.org ->Swahili
      sv.fmuser.org ->Swedish
      th.fmuser.org ->Thai
      tr.fmuser.org ->Turkish
      uk.fmuser.org ->Ukrainian
      ur.fmuser.org ->Urdu
      vi.fmuser.org ->Vietnamese
      cy.fmuser.org ->Welsh
      yi.fmuser.org ->Yiddish

       
  •  

    FMUSER Wirless Transmit Video And Audio More Easier !

  • Contact

    Address:
    No.305 Room HuiLan Building No.273 Huanpu Road Guangzhou China 510620

    E-mail:
    [email protected]

    Tel / WhatApps:
    +8618078869184

  • Categories

  • Newsletter

    FIRST OR FULL NAME

    E-mail

  • paypal solution  Western UnionBank OF China
    E-mail:[email protected]   WhatsApp:+8618078869184   Skype:sky198710021 Chat with me
    Copyright 2006-2020 Powered By www.fmuser.org

    Contact Us