• Contact Us
  • About Us
  • Advertise
  • Donate
  • Login
Watchdog Uganda
Advertisement
  • Home
  • News
    • National
    • Politics
    • World News
    • Sports
      • Football
      • Motorsport
  • Business
    • Agriculture
    • Finance
    • RealEstate
    • Technology
  • Op-Ed
  • Entertainment
    • Lifestyle
    • Showbiz
  • People
    • Entrepreneurs
    • Stars
    • Politicians
  • Special Report
    • Education
  • Travel
  • Video
  • Luganda
No Result
View All Result
  • Home
  • News
    • National
    • Politics
    • World News
    • Sports
      • Football
      • Motorsport
  • Business
    • Agriculture
    • Finance
    • RealEstate
    • Technology
  • Op-Ed
  • Entertainment
    • Lifestyle
    • Showbiz
  • People
    • Entrepreneurs
    • Stars
    • Politicians
  • Special Report
    • Education
  • Travel
  • Video
  • Luganda
No Result
View All Result
Watchdog Uganda
No Result
View All Result

5G Cybersecurity is a growing need and Encryption a Must for every user

watchdog by watchdog
2 hours ago
in Business, Technology
0 0
ShareTweetSendShare

The evolution of communication technologies has for the past 2 decades upgraded from 1G which enabled users to make Voice calls, 2G that introduced Short Messages (SMS) and Multi Media Messages (MMS) in the 90s, to 3G as an Internet connection enabler paving way for 4G as the current fast connection technology making Video sharing and streaming possible.

Now, 5G is the latest communications technology that is currently in its late design and deployment stages. With 5G, low latency is expected to be a main factor with applications running in Virtual Reality (AR), Augmented Reality (AR), and the Internet of Things (IoT) as much anticipated use cases.

However, with the emergence of 5G comes a rising need to secure user traffic and reduce on the rate of cyber attacks across the world. In the recent years, cyber attacks have been launched using organization backdoors, low software applications security, and user negligence on following set IT security standards.

5G Cybersecurity as a key need for every organization can rely on stable models the 3rd Generation Partnership Project (3GPP) architecture where fault isolation is possible and Information security is divided into 5 domains to protect user data and equipment.

To know more about how you can buy an affordable home from Kabaka’s Mirembe estate Sentema, click here

1) Network access security: ensures that mobile users have secure access to network services and mobile network is secured against attacks via the (radio) access link.

2) Network domain security: ensures that mobile backhaul nodes to securely exchange signaling data and user data at the mobile backhaul networks and protects against attacks on wireline link.

3) User domain security: secures access to mobile stations.

4) Application domain security: allows applications on user and network side to securely exchange data.

5) Visibility and configurability of security: allows user to get information about enabled security features and provision of services.

Furthermore, reliance on the 3GPP Architecture not only protects users and software applications from cyber-attacks, but also improves the legacy security model deployed on 3G and 4G communication networks.

Currently, Huawei is ranked as the best 5G enabler and the company has registered more than 5G commercial contracts to deploy the new generation network communication technology. As such, 5G cybersecurity is a top priority for the company having passed the European Union Agency for Cybersecurity (ENISA) certification in Europe.

The ENISA Certification is a framework under the Regulation (EU) 2019/881 to establish and maintain the trust and security on cybersecurity products, services and processes. With the Certification, the United Kingdom security chief believes that the Huawei risk can be managed since the company has more than 30 years of experience and has huge efforts in the development of 5G cybersecurity.


Do you have a story in your community or an opinion to share with us: Email us at editorial@watchdoguganda.com

ShareTweetSendShare
Previous Post

Lumbuye will soon be taken to Court! Minister Oryem confirms arrested blogger is being held by Ugandan  authorities

Next Post

JOSEPH M. MUMBE: Why radio lessons program may not be effective for learners 

Next Post
Joseph M. Mumbe

JOSEPH M. MUMBE: Why radio lessons program may not be effective for learners 

  • Pregnant woman

    Shock as 17-year old boy impregnates his two sisters during Covid-19 lockdown 

    1630 shares
    Share 652 Tweet 408
  • LIST: New salary structure for civil servants starting July 2020 out; scientists, lecturers get juicy pay rise

    1408 shares
    Share 563 Tweet 352
  • LIST: Here are the 9 men Zari has slept with

    1260 shares
    Share 504 Tweet 315
  • Ykee Benda’s ‘girl’ Martha Kay releases nudes

    869 shares
    Share 348 Tweet 217
  • Singer Ronald Mayinja in tears after being forced to sell his hotel to refund Museveni’s cash

    825 shares
    Share 330 Tweet 206

Like us on Facebook

Follow us on Twitter

Facebook Twitter

Contact Information

Plot 23, Yusuf Lule Road
PO Box 7661 Kampala, Uganda
Office Line: +256 777 286 815
Email: editorial@watchdoguganda.com
To Advertise:Click here

© 2020 Watchdog Uganda

No Result
View All Result
  • Home
  • News
    • National
    • Politics
    • World News
    • Sports
      • Football
      • Motorsport
  • Business
    • Agriculture
    • Finance
    • RealEstate
    • Technology
  • Op-Ed
  • Entertainment
    • Lifestyle
    • Showbiz
  • People
    • Entrepreneurs
    • Stars
    • Politicians
  • Special Report
    • Education
  • Travel
  • Video
  • Luganda

© 2020 Watchdog Uganda

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In