上海品茶

2020年5G网络安全:风险管理方法 - 英国皇家联合军种国防研究所(英文版)(38页).pdf

编号:20116 PDF 38页 1.01MB 下载积分:VIP专享
下载报告请您先登录!

2020年5G网络安全:风险管理方法 - 英国皇家联合军种国防研究所(英文版)(38页).pdf

1、The Globalisation of Technology Occasional Paper Royal United Services Institute for Defence and Security Studies 5G Cyber Security A Risk-Management Approach James Sullivan and Rebecca Lucas 5G Cyber Security A Risk-Management Approach James Sullivan and Rebecca Lucas The Globalisation of Technolog

2、y RUSI Occasional Paper, February 2020 Royal United Services Institute for Defence and Security Studies ii5G Cyber Security: A Risk-Management Approach 189 years of independent thinking on defence and security The Royal United Services Institute (RUSI) is the worlds oldest and the UKs leading defenc

3、e and security think tank. Its mission is to inform, influence and enhance public debate on a safer and more stable world. RUSI is a research-led institute, producing independent, practical and innovative analysis to address todays complex challenges. Since its foundation in 1831, RUSI has relied on

4、 its members to support its activities. Together with revenue from research, publications and conferences, RUSI has sustained its political independence for 189 years. Royal United Services Institute for Defence and Security Studies Whitehall London SW1A 2ET United Kingdom +44 (0)20 7747 2600 www.ru

5、si.org RUSI is a registered charity (No. 210639) The views expressed in this publication are those of the author(s), and do not reflect the views of RUSI or any other institution. Published in 2020 by the Royal United Services Institute for Defence and Security Studies. This work is licensed under a

6、 Creative Commons Attribution Non-Commercial No-Derivatives 4.0 International Licence. For more information, see . RUSI Occasional Paper, February 2020. ISSN 2397-0286 (Online); ISSN 2397-0278 (Print). Printed in the UK by Kall Kwik. Contents Executive Summary v I. Introduction 1 Background 2 What i

7、s 5G Technology? 4 II. 5G Cyber Security: A Risk-Management Approach 11 Risks to 5G Infrastructure 12 Measures to Mitigate 5G Risk 17 Huawei and Cyber Security 23 The Role of Governments in 5G Cyber Security 26 III. Conclusions 29 About the Authors 31 Executive Summary T HIS PAPER ARGUES that approa

8、ches to the security of 5G telecommunications networks should depend on national context, including the geographic location of equipment, national cyber security experience, vendor availability and cost. The main policy priority for states should be the implementation of pragmatic technical cyber ri

9、sk management measures that protect against the majority of risks to 5G networks. In January 2020, the UKs National Security Council made the decision to exclude Huawei technology from the most sensitive parts of the UKs 5G network, while allowing it to supply peripheral components such as mobile ph

10、one masts and antennae. From a purely technical perspective, this was a practical and realistic decision that adheres to the principles of cyber risk management and reflects the expert view of the UKs national technical authority, the National Cyber Security Centre. This research identifies a range

11、of measures to manage risk to 5G networks, including resilient network architecture, access management, testing and monitoring, and cyber security standards. The findings demonstrate how core and edge functions do remain technically distinct in 5G networks and highlight multiple ways to isolate and

12、localise risks. It recognises that 5G poses new challenges for cyber security practitioners, owing to technical concepts such as virtualisation and low-latency communication, but concludes that there are measured ways to manage the risk. The paper acknowledges that for some states, political and eco

13、nomic considerations may end up being the overriding factors that lead to the decision to ban a particular vendor from a particular state. This may be an entirely legitimate national approach. However, states must be clear about the extent to which political, rather than technical, factors inform th

14、eir decision-making relating to 5G and other technology. Otherwise, it confuses the argument and undermines the authority of national technical experts. Finally, the paper argues that 5G is one instance of a much wider set of issues around the globalisation of technology relating to the pivot of tec

15、hnology innovation from West to East. It recommends that states should rapidly identify those advanced technology areas where greater vendor diversity and/or sovereign technology is required and develop an industrial strategy to address these gaps. I. Introduction T HIS PAPER EXAMINES high-level cyb

16、er risks relating to 5G telecommunications infrastructure and assesses to what extent a risk-management approach could mitigate them. The analysis in this paper is based on extensive research of academic literature, media reports, open source government documents and in-depth semi-structured intervi

17、ews with senior cyber security experts. For these interviews, experts were chosen based on their subject-matter expertise and experience, using a non-probabilistic (selective) sampling method. Interviewees included government officials, law enforcement, private sector experts and academics.1 Intervi

18、ews reflect the perspectives of these individuals and should not be interpreted to represent the positions of corporations or governments. Research findings and recommendations also draw on academic and policy literature relating to 5G, open source government documents, media reports and consultatio

19、n with experts at roundtable events. As with any qualitative research study, there are some limitations. The interview findings inevitably reflect the perspectives, insights and experiences of participants. Furthermore, research is largely limited to information available in the public domain only.

20、This research is the first in a series of papers to be published as part of a RUSI research project, The Globalisation of Technology. The series examines the cyber security implications of the growing presence of foreign-made components in Western telecommunications infrastructure, how governments p

21、erceive the accompanying risks and the actions they are taking in response. Subsequent papers in the series will look beyond 5G to wider risks from the globalisation of technology. The paper comprises five sections. First, it provides background on the nature of 5G technology and the security threat

22、 it could pose. Second, it details overarching risks to 5G networks for policymakers to consider. Third, it examines methods of risk mitigation. Fourth, it addresses the specific question of Huawei. Finally, this report examines the role of government in addressing these challenges and provides a se

23、t of recommendations for policymakers to consider. The primary purpose of this paper is to inform policymakers and cyber security practitioners of the range of factors to consider when making policy decisions linked to the rollout of 5G infrastructure, including decisions regarding vendor selection.

24、 1. Throughout this report, an anonymised coding system is used to refer to interview data. The prefix UK G is used to refer to UK government officials, US G is used for US government officials, T is used for members of the telecommunications sector, and A refers to academic experts. The views expre

25、ssed by members of government are not intended to represent the governments official position. The views expressed by members of the telecommunications sector are not intended to represent any corporations official position. The views expressed by members of academia are not intended to represent an

26、y institutions official position. 25G Cyber Security: A Risk-Management Approach Background Governments are struggling to determine how to best protect new 5G telecommunications networks, some of which are classed as critical national infrastructure (CNI) in the UK.2 In particular, global debate con

27、tinues as to how governments should manage the presence of Chinese technology in the rollout of 5G infrastructure. Citing national security concerns, some governments advocate a blanket ban of Chinese companies like Huawei. Others have decided not to restrict Huaweis participation in 5G networks at

28、all. In January 2020, the UKs National Security Council made the decision to exclude Huawei technology from the most sensitive parts of the UKs 5G network, while allowing it to supply peripheral components such as mobile phone masts and antennae. In addition, their UK market share of peripheral 5G c

29、omponents will be capped at 35%.3 This approach acknowledges that Huawei is a high-risk vendor (HRV), but the risk is deemed to be manageable. As with any complex network, 5G networks tend to have vulnerabilities.4 As they require regular updates, operators frequently grant network access to third p

30、arties.5 Original network components, as well as software updates, are the product of complex, international supply chains that are difficult to trace. The apparent national origin of a product is not a reliable guide to where its components were designed or manufactured. Meanwhile, technology to co

31、mprehensively map networks and their components does not yet exist.6 Risk management is the process of identifying threats and risks in a particular context and taking action to prevent or reduce them.7 Cyber risk management is no different. It acknowledges that it is impossible to eradicate risk, e

32、specially in complex, multifaceted technology-dependent activities. Instead, the challenge is to set a realistic risk tolerance or level of acceptable risk and develop mitigation methods typically involving people, processes and technology that 2. The UK government defines critical national infrastr

33、ucture as those facilities, systems, sites, information, people, networks, and processes necessary for a country to function and upon which daily life depends In the UK, there are 13 national infrastructure sectors: Chemicals, Civil Nuclear, Communications, Defence, Emergency Services, Energy, Finan

34、ce, Food, Government, Health, Space, Transport, and Water. See Centre for the Protection of National Infrastructure, About: Critical National Infrastructure, , accessed 20 January 2020. 3. Department for Digital, Culture, Media and Sport (DCMS), New Plans to Safeguard Countrys Telecoms Network and P

35、ave Way for Fast, Reliable and Secure Connectivity, press release, 28 January 2020, , accessed 31 January 2020. 4. Authors interview with T1, member of the telecommunications sector, 27 September 2019. 5. Ibid.; authors interview with UK G1, UK government official, 29 October 2019. 6. Authors notes

36、from a techUK event, 30 September 2019. 7. Collins, Risk Management, , accessed 28 January 2020. Sullivan and Lucas3 have the greatest likelihood of supporting that risk tolerance. Cyber risk-management decisions are fundamentally informed by the degree of confidence in the security of components an

37、d infrastructure. This is not a binary objective. There is no such thing as full confidence in equipment, or trustworthy vendors in any context.8 In relation to 5G, some states argue for a pragmatic cyber security risk-management approach.9 Such an approach could keep technology where there are lowe

38、r degrees of confidence around security, such as from China, out of the most sensitive parts of the network. However, such an approach could still permit the use of Chinese technology in less sensitive or less critical areas. For others, a blanket ban on Chinese equipment is asserted to be the only

39、way to manage the security risks resulting from using Chinese technology in 5G. The US has pressed its allies to ban Chinese companies, primarily Huawei, from providing any 5G network components, originally citing an extremely low degree of confidence in the security of Chinese technology. It has sp

40、ecifically raised concerns about vulnerabilities in Huawei equipment that could give the company, or the Chinese government, access to 5G networks.10 The US government has been vocal about its preference that all countries implement a full ban. It has threatened that it will no longer share intellig

41、ence with countries which include Huawei in their 5G networks.11 US officials have alleged that, should the UK include Huawei components in 5G networks, it would put our information at risk.12 They have even gone so far as to say that the US could not base resources, such as a military base or an em

42、bassy, in a country that uses Huawei equipment.13 These statements are part of an ongoing effort to pressure the UK, and other countries, to exclude Huawei entirely from their 5G networks. The 5G debate is not just about cyber security. It has become part of a wider geopolitical conversation. It rel

43、ates to political perceptions of Chinas place in the world, as well as to economic factors, including Western reliance on Chinese technology and manufacturing, 8. Authors interview with UK G1, UK government official, 29 October 2019; authors interview with UK G3, UK government official, 8 November 2

44、019; authors interview with UK G4, UK government official, 11 November 2019. 9. For a detailed explanation of countries approaches to 5G, see the written evidence submitted by RUSI for the Joint Committee on the National Security Strategys inquiry, Ensuring Access to “Safe” Technology: The UKs 5G In

45、frastructure and National Security Issue, , accessed 30 January 2020. 10. Authors interview with US G1, US government official, 15 October 2019. 11. Zak Doffman, US Threatens UK On Huawei and Intelligence-Sharing, Forbes, 29 April 2019. 12. David Bond et al., US Cyber Chief Warns UK Against Giving H

46、uawei “Loaded Gun”, Financial Times, 24 April 2019. 13. The Economist, Britain Lets Huawei into Part of Its 5G Networks, 24 April 2019. 45G Cyber Security: A Risk-Management Approach advanced Chinese innovation in technology and fears that the West is falling behind.14 There are also human rights co

47、ncerns, including about how Chinese technology companies have enabled the Chinese government to suppress its citizens.15 Many countries have found themselves caught between the US and China and have yet to make a definitive decision on Huawei.16 Meanwhile, the deployment of 5G infrastructure is ongo

48、ing in many countries, often using Huaweis low-cost equipment or building on existing previous-generation Huawei infrastructure.17 There is a business cost to ripping out Huawei equipment and starting again.18 However, there is more to 5G networks than Huawei.19 An overwhelming focus on one technolo

49、gy, one company and one state while understandable masks broader issues about the proliferation of technology and innovation, and how best to manage the accompanying risks, for 5G and beyond. All 5G networks, whether they include Huawei equipment or not, face common technical risks and challenges. While both technological and geopolitical factors could shape risk-management decisions on 5G, research has evidenced the importance of clearly distinguishing between the two.20 The use of geopolitical and economic criteria may be a legitimate national approach

友情提示

1、下载报告失败解决办法
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站报告下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

本文(2020年5G网络安全:风险管理方法 - 英国皇家联合军种国防研究所(英文版)(38页).pdf)为本站 (Mercury) 主动上传,三个皮匠报告文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三个皮匠报告文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。
客服
商务合作
小程序
服务号
会员动态
会员动态 会员动态:

钟**  升级为至尊VIP   wei**n_... 升级为至尊VIP 

139**46...  升级为标准VIP  wei**n_... 升级为标准VIP

wei**n_...   升级为高级VIP  150**80... 升级为标准VIP

 wei**n_...  升级为标准VIP GT 升级为至尊VIP 

  186**25... 升级为标准VIP wei**n_... 升级为至尊VIP 

 150**68...  升级为至尊VIP  wei**n_... 升级为至尊VIP

130**05...  升级为标准VIP wei**n_... 升级为高级VIP  

wei**n_... 升级为高级VIP  wei**n_...   升级为高级VIP

138**96...  升级为标准VIP  135**48... 升级为至尊VIP

wei**n_...  升级为标准VIP 肖彦   升级为至尊VIP

  wei**n_... 升级为至尊VIP wei**n_...  升级为高级VIP

 wei**n_... 升级为至尊VIP   国**... 升级为高级VIP

 158**73...  升级为高级VIP wei**n_...   升级为高级VIP

  wei**n_... 升级为标准VIP wei**n_...  升级为高级VIP 

 136**79...  升级为标准VIP  沉**... 升级为高级VIP 

 138**80...  升级为至尊VIP  138**98... 升级为标准VIP

wei**n_... 升级为至尊VIP   wei**n_... 升级为标准VIP

  wei**n_... 升级为标准VIP wei**n_... 升级为至尊VIP

189**10... 升级为至尊VIP   wei**n_...  升级为至尊VIP

準**... 升级为至尊VIP  151**04...  升级为高级VIP

155**04...  升级为高级VIP  wei**n_... 升级为高级VIP 

 sha**dx... 升级为至尊VIP   186**26... 升级为高级VIP

 136**38... 升级为标准VIP  182**73... 升级为至尊VIP

136**71... 升级为高级VIP   139**05...  升级为至尊VIP

wei**n_... 升级为标准VIP  wei**n_... 升级为高级VIP

wei**n_... 升级为标准VIP   微**... 升级为标准VIP

Bru**Cu...   升级为高级VIP 155**29... 升级为标准VIP

wei**n_...  升级为高级VIP 爱**... 升级为至尊VIP 

wei**n_... 升级为标准VIP wei**n_... 升级为至尊VIP 

150**02... 升级为高级VIP  wei**n_...  升级为标准VIP

138**72... 升级为至尊VIP   wei**n_... 升级为高级VIP 

153**21... 升级为标准VIP wei**n_...  升级为高级VIP

 wei**n_...  升级为高级VIP ji**yl   升级为高级VIP

DAN**ZD...  升级为高级VIP wei**n_... 升级为至尊VIP

wei**n_...  升级为高级VIP  wei**n_... 升级为至尊VIP 

 186**81... 升级为高级VIP wei**n_... 升级为高级VIP

wei**n_...   升级为高级VIP wei**n_...  升级为至尊VIP

wei**n_...  升级为标准VIP   wei**n_... 升级为高级VIP

升级为至尊VIP msl**ng 升级为高级VIP 

  刷** 升级为至尊VIP  186**12... 升级为高级VIP 

 186**00... 升级为至尊VIP  182**12...  升级为高级VIP

185**05...   升级为至尊VIP Za**ry 升级为标准VIP 

 wei**n_... 升级为高级VIP  183**46... 升级为高级VIP

 孙**  升级为标准VIP wei**n_...  升级为至尊VIP 

wei**n_... 升级为高级VIP  wei**n_... 升级为至尊VIP

微**... 升级为至尊VIP   180**79...  升级为标准VIP

Nik**us  升级为至尊VIP 138**86... 升级为高级VIP 

 wei**n_... 升级为标准VIP  183**37... 升级为高级VIP

 wei**n_... 升级为标准VIP  wei**n_... 升级为标准VIP

159**85...  升级为至尊VIP  137**52... 升级为高级VIP