Monday, January 25, 21:48
Home security 5G: Network administrators need to focus on automation

5G: Network administrators need to focus on automation

5GNew technologies such as Artificial Intelligence (AI) and Internet of Things ( and production have penetrated the good in our daily lives. The triptych AI, and production and 5G is one of the hottest topics of discussion among techies companies and telecommunications companies.

5G promises increased connectivity, zero latency and effective support for the growing number of devices and applications connected to the Internet.

However, the increase in affiliates devices and applications and the use of these technologies brings more threats at cyberspace. Therefore, 5G comes at a cost: increased requirements for safety!

It is necessary to protect the Appliances, the infrastructure on which IoT is based, and users.

So how can network administrators respond to these requirements? The answer is automation, based on mechanical learning. Specifically, what is needed is closed-loop automation (CLA).

CLA is not the perfect solution. However, it is effective as it offers continuous and complete real-time evaluation of network conditions, availability of resources and web streaming requirements to detect congestion and malicious traffic (or comes from network either from external sources). CLA uses this data to optimize it tools and its procedures. This will enable them to provide effective solutions to real-time malware.

According to experts, closed-loop automation is an essential tool for 5G network administrators.

CLA to enhance IoT security

IoT devices are their favorite target hackers. Recent reports have shown that cybercriminals they are constantly looking for new ways to attack. This is because most consumer IoT devices do not have sufficient built-in security. An exposed IoT device takes less than 43 seconds to break.

Some of the most popular DdoS packages have used malware software that targets and controls IoT devices. Devices are transformed into bots used in larger and more organized attacks. Over the last three years, IoT botnet attacks have grown and evolved a lot.

Vulnerable IoT devices in combination with the upcoming 5G network are increasing the range of potential attacks. To achieve the real-time detection and analysis process, network administrators must utilize automation to provide integrated IoT security.

CLA: Current level of adoption

Most network administrators are in the transition from 4G to 5G and many of them are increasingly focused on automation. Others believe CLA will only be more effective when 5G is completed. Everyone, however, recognizes its benefits and thinks it will be a very useful tool.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement



How do insurance companies "enhance" ransomware attacks?

Ransomware attacks have increased significantly, with experts warning that their victims should not pay ransom to hackers ....

Russia: "US may be planning retaliation for SolarWinds hack"!

The Russian government warns the country's organizations about possible cyber attacks that the US may carry out, as "retaliation" for the hack ...

iPhone: How to see which apps have access to your contacts

Some iPhone privacy issues go deeper than accessing your contacts list, which exposes your contacts to ...

COVID-19: Google makes vaccination clinics available

Google CEO Sundar Pichai said Monday that the company will make its facilities available to become clinics ...

Netflix offers "studio quality" audio upgrade on Android

Do not be surprised if Netflix sounds better the next time you run a marathon with rows on your Android phone ...

Will Bitcoin return to $ 40.000? There is concern!

Bitcoin lovers who take his return above the level of $ 40.000 for granted have been worried because the demand ...

Avaddon ransomware: Its operators threaten with DDoS attacks to get ransom!

Lately, more and more ransomware gangs tend to threaten their targets with DDoS attacks in order to secure profits ....

Volunteer firefighters will be trained through VR simulation

Volunteer firefighters in the Australian state of Victoria will soon have access to the virtual reality (VR) training that will be available in ...

Tesla: Accuses its former employee of stealing her confidential data!

On January 23, Tesla sued former employee Alex Khatilov for stealing 26.000 confidential documents, including trade secrets. The software ...

SpaceX launched 143 satellites simultaneously

SpaceX broke every record with its last spacecraft mission into orbit. The company successfully launched the Transporter-1 mission ...