{"id":49480,"date":"2021-09-29T11:45:06","date_gmt":"2021-09-29T09:45:06","guid":{"rendered":"https:\/\/www.digitalbusiness.africa\/?p=49480"},"modified":"2021-09-29T12:39:18","modified_gmt":"2021-09-29T11:39:18","slug":"5g-security-is-a-matter-of-trust","status":"publish","type":"post","link":"https:\/\/www.digitalbusiness.africa\/en\/5g-security-is-a-matter-of-trust\/","title":{"rendered":"5G Security Is a Matter of Trust"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">In developing markets, <a href=\"https:\/\/www.digitalbusiness.africa\/en\/5g-charging-cloud-and-the-edge-conundrum\/\" target=\"_blank\" rel=\"noreferrer noopener\">5G<\/a> will bring connectivity capabilities that don\u2019t exist currently. Across the world, 5G is a game changer in terms of supporting the Internet of Things (<a href=\"https:\/\/www.digitalbusiness.africa\/en\/global-operators-select-ericssons-digital-bss-for-5g-and-iot-readiness\/\" target=\"_blank\" rel=\"noreferrer noopener\">IoT<\/a>), connecting devices to deliver everything from smart transport networks and driverless cars, to the provision of health services and energy. It will underpin and enable connectivity across all our critical infrastructure. The potential is limitless \u2013 as is the security threat.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-risks-of-5g\"><strong>The Risks of 5G<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">With greater connectivity comes greater risk.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The surface area for an attack increases, effectively, with 5G, and the more connected devices there are, the more vulnerabilities. The benefit of 5G is the speed at which we can connect \u2013 that means attacks can happen faster, too. The future of warfare, arguably, is in taking down infrastructure; imagine the disruption from compromising a nation\u2019s energy or water supply, interfering with data-driven healthcare and medical supplies, or taking over a capital city\u2019s transport network.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This potential threat is why some governments are wary of 5G equipment providers who may have links (real or perceived) to state-sponsored security services. The wrong kind of access to 5G hardware could, in theory at least, give you a back door into national infrastructure.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">As more countries adopt 5G, these threats will increase. We\u2019ll see an increase in availability of bandwidth over 5G &#8211; which is significantly harder to track than wired networks. Tracking attackers will also take longer as they can use IPv6 with cloaking over 5G networks, masking their trail somewhat.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">There\u2019s also physical security to consider. We\u2019re going to have more physical locations for 5G technology infrastructure, and they\u2019re unlikely to be as secure as current sites are due to their location and number.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-current-security-picture\"><strong>The Current Security Picture<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Currently, in developing countries, most IoT networks are isolated in the wider network. There are individual use cases, but as 5G is rolled out, more and more devices will connect to each other. We need to start thinking about IT and OT (operational technology) networks as the same thing, under a combined security framework.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Any system is only as secure as its weakest endpoint, and that could be a smart meter, an autonomous car or a robotic surgery device in a new, interconnected world. Calculating the number of connected devices is inherently impossible but it\u2019s fair to say they will exceed the number of laptops or smartphones even today, these representing a substantial risk to networks.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Security is as critical to the success of the 5G roll-out as getting the right hardware in the first place. But who do we trust to deliver that security? Who is responsible for securing our infrastructure? We have minimum global security standards for 5G. But not all 5G networks operate in exactly the same way, and there\u2019s plenty of room for interpretation.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">As with most standards, they lay out the bare minimum, and can\u2019t possibly be expected to go into the detail of all the different variations of service or hardware providers involved in the network.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-future-of-5g-security\"><strong>The future of 5G security<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Some organisations will specialise in running smart meters. Others will focus on autonomous vehicle technology. They\u2019ll operate differently, with different vulnerabilities. Experts in the national grid will know more than an overseeing body within government what the specific vulnerabilities might be in their environment. What equipment is connected to the network (and how secure is it)? What data is being transferred (and how is it secured, stored and mirrored)? What\u2019s the risk versus reward \u2013 and how much risk is deemed acceptable to keep costs down?<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The security risk posed by a vulnerability in my washing machine isn\u2019t the same as a backdoor into the transport network, for example. Even government standards will change depending on location. And so will their priorities. Richer nations might be able to ban an equipment provider that\u2019s perceived as a security threat, but nations with less capital to invest might be attracted to its low price and overlook the potential risk.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">All countries will put their own financial interests first \u2013 the US is likely to favour American equipment providers or equipment from allied nations, in the same way that Chinese allies \u2013 or nations benefitting from Chinese investment in Africa, for example &#8211; might favour Huawei.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Then there\u2019s Vodafone, which is working to launch an Open RAN (Radio Area Network) in Europe and Africa with strategic vendors Dell, NEC, Samsung Electrics, Wind River, Capgemini Engineering and Keysight Technologies.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The big question is: who is responsible for securing the new networks and devices that 5G will enable? There is an assumption that it is the hardware providers. Manufacturers of washing machines will have to be security and data transfer specialists or hire people who are.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Private networks put the onus of security onto the enterprise; public network security becomes the network operator\u2019s problem. There are some big questions. Identity verification and authentication is part of all our lives now when we log in to a bank account or utility service, but it\u2019s harder to authenticate a robot, if part of your system is automated.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">There have to be strict security rules for any device that\u2019s going to attach to the network, to validate entry to it using something more than a device ID . We\u2019re seeing unique codes being generated (a bit like a software licence key) which can be created by an authorised computer.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">But that has flaws \u2013 what humans make, humans can break \u2013 and with the kind of computing power available today, decrypting a code is simply a matter of time. So, we see the entry of dynamic encryption keys that don\u2019t stay constant to stay ahead of the hackers. It\u2019s a race. No sooner does technology evolve, than hacking increases in sophistication. You can buy a cybercrime kit as a service, now, if you know where to look, complete with robots to deliver DDOS attacks, 24\/\/7 support team and even \u2018try before you buy\u2019 schemes available for first-time buyers.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This is big business, and the stakes are high. Most enterprises I talk to are fairly early on in their 5G roll-outs, and determining the possibilities and use cases that will most benefit their businesses.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">5G is still in its infancy, and smart cities are still at the proof-of-concept stage. But there are huge possibilities, particularly in the developing world where traditional infrastructure has been patchy. It is critical that we think about \u2013 and design &#8211; security right at the point at which we envisage the 5G network, and think about it holistically, across IT and OT networks.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We often talk about the \u2018race\u2019 to roll out 5G networks. But that\u2019s not the race to win. We should be focusing on the race to build the security for those networks. For that to happen, government, standardisation organisations and 5G providers must work together to set, apply and regulate security standards, constantly assessing risk \u2013 and the organisation responsible for setting the standards, 3GPP, is complex and will only grow in complexity as more members are added to its groups.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Unless we want to rely on trust that this public-private partnership will deliver to secure a nation\u2019s infrastructure, we need effective regulation and oversight to enforce those standards, both globally and locally<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>By Jon Harrod, Director ISG<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"595\" height=\"583\" src=\"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/09\/jon-harrod-sq.jpeg\" alt=\"Jon Harrod\" class=\"wp-image-49481\" srcset=\"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/09\/jon-harrod-sq.jpeg 595w, https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/09\/jon-harrod-sq-300x294.jpeg 300w, https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/09\/jon-harrod-sq-149x146.jpeg 149w, https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/09\/jon-harrod-sq-400x392.jpeg 400w\" sizes=\"auto, (max-width: 595px) 100vw, 595px\" \/><figcaption>Jon Harrod<\/figcaption><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Jon specialises in the IT and data network\/telecommunications sectors with over 25 years\u2019 delivery, programme and transformation management experience. Jon\u2019s business management experience includes leading the definition, design deployment and delivery of global data network services; analysis of complex sourcing service contracts; product and portfolio management.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Jon has a strong background in managing technical support, network communication infrastructures, business systems and data centre operations, with a proven ability to plan and lead successful business system and network infrastructure design, implementation and migrations at client, national and global levels.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Since joining ISG Jon specialized in IT and Managed Data network Services leading the definition, design and delivery of projects through-out Europe, North and South America and Asia Pacific in the Public, FMCG, Manufacturing, Financial Services, Petrochemical and Pharmaceutical sectors., having recently led the following complex engagements:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u2022 HSBC &#8211; Global stream lead for Network Services (Voice\/Data) sourcing advice and vendor management.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u2022 Shell-Assessment of global IT and Managed Network Services contracts and pricing.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u2022 British American Tobacco &#8211; Lead consultant for sourcing review of global network services. \u2022 BP &#8211; Sourcing advisory and scenario planning of global telecoms.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u2022 Credit Suisse &#8211; WAN and voice Performance Improvement initiatives to consolidate European voice and data networks<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>ISG<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">ISG (Information Services Group) (Nasdaq: III) is a leading global technology research and advisory firm. A trusted business partner to more than 700 clients, including more than 75 of the world\u2019s top 100 enterprises, ISG is committed to helping corporations, public sector organizations, and service and technology providers achieve operational excellence and faster growth.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/isg-one.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/isg-one.com\/<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Published in &#8220;SPECIAL REPORT: CYBERSECURITY&#8221;. Copyright \u00a9 2021 Developing Telecoms Ltd.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In developing markets, 5G will bring connectivity capabilities that don\u2019t exist currently. Across the world, 5G is a game changer in terms of supporting the Internet of Things (IoT), connecting devices to deliver everything from smart transport networks and driverless cars, to the provision of health services and energy. It will underpin and enable connectivity [&hellip;]<\/p>\n","protected":false},"author":67,"featured_media":49483,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[116,46585,46541,46582],"tags":[137,56259],"class_list":{"0":"post-49480","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-c167-cameroun","8":"category-experts","9":"category-latest-publications","10":"category-slidehome-en","11":"tag-camtel","12":"tag-jon-harrod"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>5G Security Is a Matter of Trust - Digital Business Africa<\/title>\n<meta name=\"description\" content=\"In developing markets, 5G will bring connectivity capabilities that don\u2019t exist currently. Across the world, 5G is a game changer in terms of supporting\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalbusiness.africa\/en\/5g-security-is-a-matter-of-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5G Security Is a Matter of Trust - Digital Business Africa\" \/>\n<meta property=\"og:description\" content=\"In developing markets, 5G will bring connectivity capabilities that don\u2019t exist currently. Across the world, 5G is a game changer in terms of supporting\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalbusiness.africa\/en\/5g-security-is-a-matter-of-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Business Africa\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalBusinessAFRIC\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-29T09:45:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-29T11:39:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/09\/5G-Security.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"930\" \/>\n\t<meta property=\"og:image:height\" content=\"487\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Digital Business Africa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DigitalBusiness\" \/>\n<meta name=\"twitter:site\" content=\"@DigitalBusiness\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Business Africa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/5g-security-is-a-matter-of-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/5g-security-is-a-matter-of-trust\\\/\"},\"author\":{\"name\":\"Digital Business Africa\",\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#\\\/schema\\\/person\\\/4dc6e28ffc3bae6b602934a5aeeea1be\"},\"headline\":\"5G Security Is a Matter of Trust\",\"datePublished\":\"2021-09-29T09:45:06+00:00\",\"dateModified\":\"2021-09-29T11:39:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/5g-security-is-a-matter-of-trust\\\/\"},\"wordCount\":1499,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/5g-security-is-a-matter-of-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/5G-Security.jpeg\",\"keywords\":[\"Camtel\",\"Jon Harrod\"],\"articleSection\":[\"Cameroun\",\"Experts\",\"LATEST PUBLICATIONS\",\"SLIDEHOME\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/5g-security-is-a-matter-of-trust\\\/#respond\"]}],\"copyrightYear\":\"2021\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/5g-security-is-a-matter-of-trust\\\/\",\"url\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/5g-security-is-a-matter-of-trust\\\/\",\"name\":\"5G Security Is a Matter of Trust - Digital Business Africa\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/5g-security-is-a-matter-of-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/5g-security-is-a-matter-of-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/5G-Security.jpeg\",\"datePublished\":\"2021-09-29T09:45:06+00:00\",\"dateModified\":\"2021-09-29T11:39:18+00:00\",\"description\":\"In developing markets, 5G will bring connectivity capabilities that don\u2019t exist currently. Across the world, 5G is a game changer in terms of supporting\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/5g-security-is-a-matter-of-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/5g-security-is-a-matter-of-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/5G-Security.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/5G-Security.jpeg\",\"width\":930,\"height\":487,\"caption\":\"5G Security Is a Matter of Trust\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/\",\"name\":\"Digital Business Africa\",\"description\":\"Le Mag des d\u00e9cideurs consacr\u00e9 \u00e0 l&#039;actualit\u00e9 des TIC, des T\u00e9l\u00e9coms et du Num\u00e9rique en Afrique\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#organization\",\"name\":\"Digital Business Africa\",\"url\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.digitalbusiness.africa\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/NEW-LOGO-DBA-Sans-Fond.png?fit=2995%2C953&quality=80&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.digitalbusiness.africa\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/NEW-LOGO-DBA-Sans-Fond.png?fit=2995%2C953&quality=80&ssl=1\",\"width\":2995,\"height\":953,\"caption\":\"Digital Business Africa\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalBusinessAFRIC\",\"https:\\\/\\\/x.com\\\/DigitalBusiness\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/digitalbusinessafrica\",\"https:\\\/\\\/www.youtube.com\\\/@DIGITALbusinessafrica\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#\\\/schema\\\/person\\\/4dc6e28ffc3bae6b602934a5aeeea1be\",\"name\":\"Digital Business Africa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ffd7f0ab4d0062e8d464716557c7a99c423d4fb6a57a3d5ae029638cc8da231e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ffd7f0ab4d0062e8d464716557c7a99c423d4fb6a57a3d5ae029638cc8da231e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ffd7f0ab4d0062e8d464716557c7a99c423d4fb6a57a3d5ae029638cc8da231e?s=96&d=mm&r=g\",\"caption\":\"Digital Business Africa\"},\"url\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/author\\\/laure\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"5G Security Is a Matter of Trust - Digital Business Africa","description":"In developing markets, 5G will bring connectivity capabilities that don\u2019t exist currently. Across the world, 5G is a game changer in terms of supporting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalbusiness.africa\/en\/5g-security-is-a-matter-of-trust\/","og_locale":"en_US","og_type":"article","og_title":"5G Security Is a Matter of Trust - Digital Business Africa","og_description":"In developing markets, 5G will bring connectivity capabilities that don\u2019t exist currently. Across the world, 5G is a game changer in terms of supporting","og_url":"https:\/\/www.digitalbusiness.africa\/en\/5g-security-is-a-matter-of-trust\/","og_site_name":"Digital Business Africa","article_publisher":"https:\/\/www.facebook.com\/DigitalBusinessAFRIC","article_published_time":"2021-09-29T09:45:06+00:00","article_modified_time":"2021-09-29T11:39:18+00:00","og_image":[{"width":930,"height":487,"url":"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/09\/5G-Security.jpeg","type":"image\/jpeg"}],"author":"Digital Business Africa","twitter_card":"summary_large_image","twitter_creator":"@DigitalBusiness","twitter_site":"@DigitalBusiness","twitter_misc":{"Written by":"Digital Business Africa","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalbusiness.africa\/en\/5g-security-is-a-matter-of-trust\/#article","isPartOf":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/5g-security-is-a-matter-of-trust\/"},"author":{"name":"Digital Business Africa","@id":"https:\/\/www.digitalbusiness.africa\/en\/#\/schema\/person\/4dc6e28ffc3bae6b602934a5aeeea1be"},"headline":"5G Security Is a Matter of Trust","datePublished":"2021-09-29T09:45:06+00:00","dateModified":"2021-09-29T11:39:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/5g-security-is-a-matter-of-trust\/"},"wordCount":1499,"commentCount":0,"publisher":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/#organization"},"image":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/5g-security-is-a-matter-of-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/09\/5G-Security.jpeg","keywords":["Camtel","Jon Harrod"],"articleSection":["Cameroun","Experts","LATEST PUBLICATIONS","SLIDEHOME"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.digitalbusiness.africa\/en\/5g-security-is-a-matter-of-trust\/#respond"]}],"copyrightYear":"2021","copyrightHolder":{"@id":"https:\/\/www.digitalbusiness.africa\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.digitalbusiness.africa\/en\/5g-security-is-a-matter-of-trust\/","url":"https:\/\/www.digitalbusiness.africa\/en\/5g-security-is-a-matter-of-trust\/","name":"5G Security Is a Matter of Trust - Digital Business Africa","isPartOf":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/5g-security-is-a-matter-of-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/5g-security-is-a-matter-of-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/09\/5G-Security.jpeg","datePublished":"2021-09-29T09:45:06+00:00","dateModified":"2021-09-29T11:39:18+00:00","description":"In developing markets, 5G will bring connectivity capabilities that don\u2019t exist currently. Across the world, 5G is a game changer in terms of supporting","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalbusiness.africa\/en\/5g-security-is-a-matter-of-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalbusiness.africa\/en\/5g-security-is-a-matter-of-trust\/#primaryimage","url":"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/09\/5G-Security.jpeg","contentUrl":"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/09\/5G-Security.jpeg","width":930,"height":487,"caption":"5G Security Is a Matter of Trust"},{"@type":"WebSite","@id":"https:\/\/www.digitalbusiness.africa\/en\/#website","url":"https:\/\/www.digitalbusiness.africa\/en\/","name":"Digital Business Africa","description":"Le Mag des d\u00e9cideurs consacr\u00e9 \u00e0 l&#039;actualit\u00e9 des TIC, des T\u00e9l\u00e9coms et du Num\u00e9rique en Afrique","publisher":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalbusiness.africa\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalbusiness.africa\/en\/#organization","name":"Digital Business Africa","url":"https:\/\/www.digitalbusiness.africa\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalbusiness.africa\/en\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.digitalbusiness.africa\/wp-content\/uploads\/2022\/07\/NEW-LOGO-DBA-Sans-Fond.png?fit=2995%2C953&quality=80&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.digitalbusiness.africa\/wp-content\/uploads\/2022\/07\/NEW-LOGO-DBA-Sans-Fond.png?fit=2995%2C953&quality=80&ssl=1","width":2995,"height":953,"caption":"Digital Business Africa"},"image":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalBusinessAFRIC","https:\/\/x.com\/DigitalBusiness","https:\/\/www.linkedin.com\/company\/digitalbusinessafrica","https:\/\/www.youtube.com\/@DIGITALbusinessafrica"]},{"@type":"Person","@id":"https:\/\/www.digitalbusiness.africa\/en\/#\/schema\/person\/4dc6e28ffc3bae6b602934a5aeeea1be","name":"Digital Business Africa","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ffd7f0ab4d0062e8d464716557c7a99c423d4fb6a57a3d5ae029638cc8da231e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ffd7f0ab4d0062e8d464716557c7a99c423d4fb6a57a3d5ae029638cc8da231e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ffd7f0ab4d0062e8d464716557c7a99c423d4fb6a57a3d5ae029638cc8da231e?s=96&d=mm&r=g","caption":"Digital Business Africa"},"url":"https:\/\/www.digitalbusiness.africa\/en\/author\/laure\/"}]}},"jetpack_featured_media_url":"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/09\/5G-Security.jpeg","_links":{"self":[{"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/posts\/49480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/users\/67"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/comments?post=49480"}],"version-history":[{"count":4,"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/posts\/49480\/revisions"}],"predecessor-version":[{"id":49488,"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/posts\/49480\/revisions\/49488"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/media\/49483"}],"wp:attachment":[{"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/media?parent=49480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/categories?post=49480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/tags?post=49480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}