"6G Cybersecurity Will Transform How We Deal With Cyberattacks"

The move toward 6G technology further makes cybersecurity critical in reducing the risk of future digital threats. To realize the 6G vision, researchers are developing some novel approaches for areas such as spectrum regulation, antennas, Machine Learning (ML), Artificial Intelligence (AI), and digital twins, all of which will require robust cybersecurity elements to enable widespread adoption by industry, academia, and consumers. According to a report published by Accenture, cyberattacks on businesses increased by 31 percent between 2020 and 2021. Over the same time period, the percentage of organizations that experienced successful breaches in their supply chains increased from 44 percent to 61 percent, indicating that the threat of third-party risks has become an increasingly concerning reality. This scenario is likely to become more common as countries around the world roll out 5G networks. According to Yong Zhou, chief security solutions architect at Keysight Technologies, 5G is the first technology to enable critical applications and services such as ultra-reliable low latencies or machine-to-machine communications. 5G signals the start of a new era in network security design. 6G will carry on the network cybersecurity efforts begun with 5G. While international standardization bodies are still working to define 6G technology, research into ways to improve cybersecurity in 6G has quickly become a priority, including research into ways to optimize cybersecurity in the Internet of Things (IoT), user data security, and ways to better leverage ML and AI to train cybersecurity systems and algorithms. Within a given area, each network supports a different number of connected devices at the same time. The 4G network can connect up to 2,000 devices per square kilometer (.38 square miles). This figure rises to one million connected devices in the same range with 5G and rises again with 6G, which is expected to support up to ten million IoT devices in the same range. These devices represent the attack surface or attack vectors through which unauthorized users can extract data. Every increase in connected devices increases the risk of cybersecurity events. Aside from phones, devices under attack include medical equipment, industrial machines, and computers. This attack surface includes not only connected devices but also the network infrastructure itself. This article continues Keysight Technologies' insight on how 6G cybersecurity will change how we deal with cyberattacks. 

ACCESSWIRE reports "6G Cybersecurity Will Transform How We Deal With Cyberattacks"

 

Submitted by Anonymous on