ZTE releases a 5G security white paper at GSMA Mobile 360 Security for 5G
Release Date：2019-05-29 Author：ZTE Click：340
29 May 2019, Shenzhen, China - ZTE Corporation (0763.HK / 000063.SZ), a major international provider of telecommunications, enterprise and consumer technology solutions for the Mobile Internet, today has released a 5G security white paper at GSMA Mobile 360 Security for 5G in the Hague, Netherlands, sharing its in-depth perspectives on 5G security.
According to the white paper“5G Security White Paper: Security Makes 5G Go Further”, the 5G network security assurance shall be multi-dimensional and multi-layered, particularly focusing on the new 5G technologies, such as network slicing and MEC. It is because that 5G is redefined by new technologies, such as SDN/NFV to provide flexible on-demand services. However, all the new technologies pose unprecedented security threats and challenges to 5G networks.
In terms of the facilities connected to the 5G network, operators can customize the secured 5G network based on network slicing by exposing their own security resource pools. For the important customer assets, AI and initiative defense can be introduced to strengthen the protection of vertical industries’ networks.
In addition to technical measures, the 5G network security also requires higher standards for security regulation, including new legal frameworks, regulatory models, as well as security assessment and certification. The new requirements of 5G network security also pose challenges to the existing security assurance system, operation and maintenance system, and customer service system.
As a leading vendor of 5G solutions and products, ZTE deeply understands the concerns of consumers, customers, governments, and relevant organizations. ZTE has been committed to providing secure and credible 5G solutions and products by building a first class cybersecurity assurance system.
ZTE is looking forward to researching the open and transparent assurance mechanisms for 5G networks together with operators, governments, regulatory departments, and independent security evaluation agencies, and sharing successful security assurance ideas and practices.
The following is the link to access the full white paper: