电子文档交易市场
安卓APP | ios版本
电子文档交易市场
安卓APP | ios版本

类型布鲁金斯学会-5G是智能的现在让我们确保它的安全(英)-2022.12-53正式版

收藏

编号:341860674    类型:共享资源    大小:1.72MB    格式:PDF    上传时间:2022-12-22
  
16
金贝
分享到微信 分享到微博 分享到QQ空间
关 键 词:
布鲁金斯 学会 智能 现在 让我们 确保 安全 2022
资源描述:
5G IS SMART,NOW LETS MAKE IT SECUREREPORT DECEMBER 2022BY TOM WHEELER AND DAVID SIMPSONABOUT GOVERNANCE STUDIESThe Governance Studies program at Brookings is dedicated to analyzing poli-cy issues,political institutions and processes,and contemporary governance challenges.Our scholarship identifies areas in need of reform and proposes specific solutions with the goals of:improving the performance of the national government;informing debate;and providing policymakers with expert analy-sis and ideas to ensure better institutional governance.5G IS SMART,NOW LETS MAKE IT SECURETOM WHEELER is a visiting fellow in Governance Studies at the Brookings In-stitution and formerly served as the chairman of the Federal Communications Commission(FCC).DAVID SIMPSON is a professor in the Pamplin College of Business at Virginia Tech and formerly served as chief of the Public Safety and Homeland Security Bureau(PSHSB).REPORT|DECEMBER 2022ACKNOWLEDGEMENTSThe authors wish to thank those who provided their counsel and review in the preparation of this paper Wade Baker,Eric Burger,Brett Haan,Sean Joyce,Len Kennedy,Michael Loch,Rafi Martina,Mark Montgomery,Stephanie Pell,Jeffrey Reed,John Scott,Bill Stueber,and Michaela Vanderveen.The observations and conclusions of this report,however,are solely those of the authors.The authors also wish to thank Antonio Saadipour and Adelle Patten of the Brookings Institution for their help in the final preparation of this report.Amazon,AT&T,Meta,Microsoft,TMobile,Verizon,and Qualcomm are general unrestricted donors to the Brookings Institution.The findings,interpretations,and conclusions posted in this piece are solely those of the authors and not influenced by any donation.ABOUT THE BROOKINGS INSTITUTION The Brookings Institution is a nonprofit organization devoted to independent research and policy solutions.Its mission is to conduct high-quality,independent research and,based on that research,to provide innovative,practical recommendations for policymakers and the public.The conclusions and recommendations of any Brookings publication are solely those of its author(s)and do not reflect the views of the Institution,its management,or its other scholars.CONTENTEXECUTIVE SUMMARY 1INTRODUCTION 2PART 1:THE 5G CYBER PARADOX 5Exploiting software.6Exploiting network vulnerabilities.7Chinas cyber activities And beyond.8From business initiative to“Huawei Killer”.8A new Pandoras Box?.9Exploiting the standards process.11Public-private opportunity.12PART 2:THE VIRTUAL REVOLUTION 13Virtualizing networks.13Comparing traditional and virtual networks.13O-RAN.14Competitive benefits.15What about security?.16PART 3:WHEN INFRASTRUCTURE IS CODE 18The standards process.18Breaking the oligopoly.20Newtons Law meets networks.20Do you know where your software has been?.21When infrastructure code is in the cloud.22PART 4:FLASHING LIGHTS 25Billions for“rip and replace”,but not a penny for cybersecurity.25The ROI incentive gap.26Take it or leave it cybersecurity.27Defense Department recognition of the threat.28EU Open RAN and security report.28PART 5:ITS NOT THAT WE DONT KNOW WHAT TO DO 30The Duty of Care.30Seeking“Whole of the Networks”solutions.31Beyond identifying the problem.32New regulatory model.33New mandatory expectations.34A new regulatory focus.35A new regulatory design.36New shared support:Protect Americas Networks Fund.38Its all about the networks.39EPILOGUE:ELIMINATING CYBER PATHOGENS 41ENDNOTES 42CONTENT15G IS SMART,NOW LETS MAKE IT SECUREFrom smart cities,to smart cars,to smart factories,the future will be built on ubiquitous microchips connected by wireless networks.Fifth generation(5G)technology promises to bring the high-speed,low latency wireless infrastructure necessary for the“smart”era.Moving from promise to reality,however,will require those networks to be secure.The introduction of 5G networks is both a response to the massive wave of digitization that is sweeping the economy as well as a stimulant to its further expansion.By some estimates,half of all worldwide data traffic over the next five years will be generated not by people,but by computerized devices requiring no human intervention.1Fifth generation wireless networks will deliv-er amazing and important new capabilities and services.Yet,5G also brings with it new cybersecurity challenges.Securing networks that utilize potentially insecure components while operating in an inherently insecure world is a new challenge.It is a problem that is expanded by how the exponential growth in data traffic threatens the efficacy of tradition-al traffic-based cybersecurity monitoring.The purpose of this paper is not to criticize the amazing engineering that produced 5G,but to call attention to how these decisions,by introducing a new network architecture,have fallen short in affirmatively addressing avoidable cybersecurity risk while also intro-ducing new cybersecurity concerns,and to suggest how those concerns might be mit-igated by a combination of agile
展开阅读全文
提示  金锄头文库所有资源均是用户自行上传分享,仅供网友学习交流,未经上传用户书面授权,请勿作他用。
关于本文
本文标题:布鲁金斯学会-5G是智能的现在让我们确保它的安全(英)-2022.12-53正式版
链接地址:https://www.jinchutou.com/shtml/view-341860674.html
关于金锄头网 - 版权申诉 - 免责声明 - 诚邀英才 - 联系我们
手机版 | 川公网安备 51140202000112号 | 经营许可证(蜀ICP备13022795号)
©2008-2016 by Sichuan Goldhoe Inc. All Rights Reserved.