Cybersecurity and Cyber Risk Management Articles

Cybersecurity and Safety in the 5G-Enabled Smart-Everything World

5G Cybersecurity Safety
Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind. Born with achromatopsia, a condition of total colourblindness that affects 1 in every 30 000 people, Harbisson's physical faculties are augmented by cyber technology to grant him access to a life of greater meaning and satisfaction. As technological evolution leads to concomitant advances in medical science, we are seeing more and more examples of humans who are integrating devices and sensors into their biological makeup. For some, like those part of the growing "transhumanist" movement, this is a means of artistic expression or exploration of human potential. For others, it is a solution to a medical...

Smart Home / Smart Building Connectivity Options and Their Cybersecurity

Smart Home Wireless Connectivity
In a recent session on smart building cybersecurity, a student cheekily asked me "How did we ever connect anything before 5G?" At that moment I realized I might have been overdoing my 5G cheerleading recently. To atone, here are the key performance and cybersecurity attributes of the most commonly used connectivity technologies in smart home / smart building use cases... And 5G. If you thought that the "traditional" home life is under heavy attack from digitization of media and constant communication, wait until you learn about the Internet of Things (IoT) and Smart Homes. Our most personal spaces - our homes - are rapidly getting digitized and connected. Hundreds of IoT devices - sensors, actuators, smart speakers, smart toothbrushes, and smart...

Opportunity and Cybersecurity in the Age of 5G

5G Opportunity and Cybersecurity
The human will to innovate is seemingly relentless. The history of our species is one of continual development, with the last 350 years, in particular, representing staggering technological progress. The first industrial revolution mechanized production using natural elements like water. The second revolution used electricity to enable mass production; the third used electronics and information technology to automate production. The fourth industrial revolution unfolding all around us is characterized by an exponential growth in data production and the merging of the physical and digital. Cyber-physical systems (CSPs) like the internet of things (IoT) and industrial control systems (ICS) are capable of reading and influencing physical and biological domains. They are the first wave of super-integrated realities that will see objects, systems,...

The Quantum Computing Threat to Cybersecurity and 5G

Quantum Computer 5G Security
Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer is the first to perform a calculation that would be practically impossible for a classical machine. This quantum computing breakthrough brings us closer to the arrival of functional quantum systems which will have a profound effect on today's security infrastructure. How will quantum computing affect the security of 5G technologies currently being developed and deployed? Last spring we suggested that the emergence of quantum internet connectivity and computation, expected sometime in the next decade, poses numerous new cryptography and cybersecurity challenges for 5G security. MIT offers an explainer on the nascent status of powerful quantum computers, how they work, and where they might provide practical value...

NFC Security 101 (Non-5G IoT Connectivity Options)

NFC Cybersecurity
NFC is a short range two-way wireless communication technology that enables simple and secure communication between electronic devices embedded with NFC microchip. NFC technology operates in 13.56 megahertz and supports 106, 212, or 424 Kbps throughput. There are three available modes of NFC communication: Read/write (e.g. for reading tags in NFC posters) Card emulation (e.g. for making payments) Peer-to-peer (e.g. for file transfers) There is no need for pairing code between devices, because once in range they instantly start communication and prompt the user. NFC technology is power efficient - much more than other wireless technologies. The communication range of NFC is approximately 10 centimeters and it could be doubled with specific antennas. The short range makes this technology secure. Only allowing near...

RFID Security 101 (Non-5G IoT Connectivity Options)

RFID Cybersecurity
Radio-Frequency Identification (RFID) is a technology commonly used for identification, status administration and management of different objects. It is important for people identification, as it is commonly deployed in the latest biometric passports.  It operates in several frequency bands like Low frequency band from 125 kHz to 134 kHz, High frequency band with 13.56MHz working frequency, Ultra-high frequency band with 433 MHz working frequency and 860 - 960 MHz sub-band. In Ultra-high frequency bands there are two types of RFID systems—Active and Passive. Active RFID system operates on 433 MHz radio frequency and on 2.4GHz from Extremely High- Frequency Range. It supports range from 30 to 100+ meters. Passive RFID system operates on 860 - 960 MHz frequency and supports up to...

Wi-Fi Security 101 (Non-5G IoT Connectivity Options)

Wi-Fi Cybersecurity
The Wi-Fi represents wireless technology that includes the IEEE 802.11 family of standards (IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, IEEE 802.11ac, etc.). Within 50m range, it operates in 2.4 GHz and 5GHz frequency bands,. This technology was developed for wireless networking of computer devices and is commonly called WLAN (Wireless Local Area Network), where the communication is realized between wireless routers typically connected to the Internet and other wireless nodes within its range. In correlation with performances of specific IEEE 802.11 standards, different data rates are enabled and their theoretical throughput is 11 Mbps (IEEE 802.11b), 54 Mbps (IEEE 802.11a and IEEE 802.11g), 100 Mbps (IEEE 802.11n) or 300 Mbps (IEEE 802.11ac). In the overcrowded 2.4 GHz frequency band,...

Most popular articles this week