5G networks promise high speeds, lower latency, and more robust security compared to its predecessors – and this has created a lot of buzz. As a result, there is a lot of competition among operators to roll out the network while manufacturers are already producing 5G devices.
The deployment of 5G around the world has also been facilitated by a need for always-connected computers, widespread internet of things (IoT), and dependence on smartphones. All of this is constraining the 4G LTE technology.
With the current uptake in remote working due to COVID-19, 5G is expected to see more deployment.
However, despite the promised benefits, there are varying concerns about the potential vulnerabilities of this network. Since there are various security concerns, this article will highlight those involving the standalone 5G networks.
What is 5G Standalone Network?
5G stands for the fifth generation of networks that are designed to address gaps and errors existing in the architecture of previous generation networks. However, its implementation is through a gradual phasing out of the existing networks.
Note that the 5G network involves two streams, which include the standalone (SA) and non-standalone (NSA). The NSA relies on the existing 4G infrastructure because 5G standards are not fully finalized.
On the other hand, the standalone is a completely new, end-to-end 5G network. To offer ultra-low latency and high capacities, service providers will have to fully implement the standalone 5G infrastructure.
Despite the radical and beneficial transformation promised by 5G networks, there are concerns that it might become a multidimensional cyberattack vulnerability.
Vulnerabilities for Subscribers and Mobile Network Operators
Unlike previous networks, 5G is a software-defined network and involves network function virtualization, which makes it more vulnerable.
The previous networks implement hardware choke points because they are centralized and hardware-based; whereas 5G digital routing lacks inspection and control chokepoints.
This new architecture has seen various research carried out to check its viability. As a result, industry professionals and government officials have already raised concern over the network’s security and overall architecture.
An investigation by global cybersecurity firm Positive Technologies focused on 5G standalone core in terms of its architecture security, the interaction of network elements, as well as subscriber authentication and registration procedures.
The examination revealed that “the stack of technologies in 5G potentially leaves the door open to attacks on subscribers and the operator’s network. Such attacks can be performed from the international roaming network, the operator’s network, or partner networks that provide access to services.”
The vulnerabilities were discovered in two protocols that are, PFCP and HTTP/2, which are used in 5G standalone networks.
Exploitation in Packet Forwarding Control Protocol (PFCP) would result in denial of service. This is because the PFCP is used to manage subscriber connections. A PFCP session includes three procedures: session establishment, modification, and deletion. It’s at this point that denial of service can be carried out by attackers through a session deletion request, a session modification request, or redirection of data through a session modification request.
For the HTTP/2, the Positive Technologies research found that an attacker could obtain the network functions profile and impersonate any network service. This is because the HTTP/2 protocol is responsible for vital network functions that register and store profiles on 5G networks. The attacker then would have access to authentication status, current location, and subscriber settings for network access. It’s also possible that an attacker would be able to delete NF profiles, which could result in a financial loss as well as damage subscriber trust.
If not handled correctly, the 5G standalone network security issues will place critical infrastructures such as hospitals, transport, and utilities at risk.
Solution and Conclusion
According to the report, the vulnerabilities would appear due to misconfigurations. With vendors competing to launch 5G networks, attackers will take advantage of poor configurations.
Therefore, it calls for proper configuration of the architecture to stop these types of attacks. Unfortunately, errors still might occur. To detect configuration errors in the networks, regular security audits should be performed.
It’s also vital that apart from ensuring proper equipment configuration, security monitoring, and enhancing the implementation of firewalls are also top priorities.
In conclusion, 5G’s high speeds, low latency, and high bandwidth will be highly beneficial. However, potential security holes could cost more than the cost of implementing this technology. As a business owner considering the 5G network, do not let your guard down just because the new network promises to address gaps and errors in previous generation networks.

Rodchenkov Anti-Doping Act of 2019 (HR 835) – This bill was introduced by Rep. Sheila Jackson Lee (D-TX) on Jan. 29, 2019. The purpose of this legislation is to give U.S. officials the power to prosecute individual athletes who used performance-enhancing drugs at international sports competitions involving American athletes. The legislation has been criticized by the World Anti-Doping Agency (WADA) as undermining the global anti-doping movement based on international cooperation, and because no other nation has extra-territorial jurisdiction in this field. The bill passed in the House in October, the Senate in November, and was signed into law by the president on Dec. 4.
The Social Security Administration recently announced 2021 increases to both benefits and the taxable wage base for FICA taxes.
In order to survive – and even thrive – during these unprecedented times, small businesses have had to find new ways to make money. The UPS Store’s Small Biz Buzz survey found that 41 percent of small businesses in the United States took steps to modify their businesses in hopes of survival. Fifteen percent provided customers with curbside delivery options, 28 percent moved to online sales as their primary source of sales, and 65 percent made a concerted effort to grow their e-commerce capabilities.
With the nation on the precipice of a transition of administrations on Jan. 20, 2021, there will need to be many roles filled both in and out of the White House. With the potential for Janet Yellen to replace Steven Mnuchin as the next treasury secretary, there is much speculation about how the Federal Reserve will be shaped by the Biden administration.
There are certain year-end financial transactions that must clear by Dec. 31 to be reported on the 2020 tax return. It’s important to take a good look at your financial portfolio in light of the plethora of unusual events that occurred this year. Now is a good time to see if you have fallen off track and reposition your portfolio for better opportunities in 2021.
While the pandemic is not over, we do have some good news. There are vaccines and they will be available soon. Here’s where we are in terms of an overall plan and where states are with distributing the vaccines.
With every new project comes expectations, uncertainties, questions, opposition, and more. Elon Musk’s StarLink internet is one such project.
Veterans’ Compensation Cost-of-Living Adjustment Act of 2020 (HR 6168) – Introduced by Rep. Elaine Luria (D-VA) on March 10, this bill increases Vet compensation benefits by 1.3 percent (the same as for Social Security recipients). The increase impacts veteran disability compensation, compensation for dependents, the clothing allowance for certain disabled veterans, and dependency and indemnity compensation for surviving spouses and children. This bill passed in the House in May and the Senate in September, and was signed into law by the president on Oct. 20.
This has been a year of economic and tax uncertainty with the impact of the COVID-19 pandemic, potential stimulus bills and the presidential election. As a result, tax planning may be more important than usual this year. To help guide you, we will cover six year-end tax planning strategies – three for individuals and three for businesses.