Name: | Description: | Size: | Format: | |
---|---|---|---|---|
5.59 MB | Adobe PDF |
Authors
Advisor(s)
Abstract(s)
A tecnologia das redes 5G pretende revolucionar o modo como a sociedade interage entre si e o meio envolvente, constituindo-se como um forte instrumento da transição digital devido às características que apresenta.
A intensificação da virtualização nas redes 5G conduzirá a uma evolução das ameaças à segurança e a uma superfície de ataque mais ampla e multifacetada, tornando-se crucial garantir a Cibersegurança e a resiliência destas redes.
Propondo contributos para a Estratégia de segurança nas redes 5G no âmbito das Forças Armadas portuguesas, este estudo analisa as potencialidades e as vulnerabilidades de segurança das redes 5G e as estratégias desenvolvidas para a sua implementação.
Para este efeito, utilizou-se o raciocínio indutivo utilizando uma estratégia qualitativa e um desenho de estudo de caso num horizonte temporal transversal com recurso a análise documental, bem como entrevistas a especialistas da Cibersegurança nacional.
Dos resultados obtidos pode concluir-se que as redes 5G, apesar das suas potencialidades, necessitam de definição de estratégias de implementação, com vista à segurança, principalmente nas Forças Armadas portuguesas, por forma mitigar os riscos associados, garantindo a confidencialidade, a integridade, a disponibilidade, a autenticidade, a resiliência e a privacidade das mesmas.
The network 5G´s technology aims to revolutionize the way that society interacts each other as well the environment that surrounds it, constituting a strong instrument of digital transition due to the characteristics that constitute it. The intensification of virtualization in 5G networks will lead to an increase of threats to security and a wider, multifaceted attack surface. In this way it is crucial to ensure cybersecurity and the resilience of these networks. Proposing contributions to the Security Strategy in 5G networks within the Portuguese Armed Forces, this study analyzes the security strengths and weakness of 5G networks, and also, the strategies developed for their implementation. For this purpose, inductive reasoning was used within a qualitative strategy and a case study design in a cross-sectional time horizon using documentary analysis as well as interviews with national cybersecurity specialists. Due the results obtained it is possible to concluded that the 5G networks, despite the potential that it has, is necessary and crucial to define strategies to implement a security awareness, especially in the Portuguese Armed Forces, to mitigate the associated risks, ensure confidentiality, integrity, availability, authenticity, resilience, and privacy of these kind of networks.
The network 5G´s technology aims to revolutionize the way that society interacts each other as well the environment that surrounds it, constituting a strong instrument of digital transition due to the characteristics that constitute it. The intensification of virtualization in 5G networks will lead to an increase of threats to security and a wider, multifaceted attack surface. In this way it is crucial to ensure cybersecurity and the resilience of these networks. Proposing contributions to the Security Strategy in 5G networks within the Portuguese Armed Forces, this study analyzes the security strengths and weakness of 5G networks, and also, the strategies developed for their implementation. For this purpose, inductive reasoning was used within a qualitative strategy and a case study design in a cross-sectional time horizon using documentary analysis as well as interviews with national cybersecurity specialists. Due the results obtained it is possible to concluded that the 5G networks, despite the potential that it has, is necessary and crucial to define strategies to implement a security awareness, especially in the Portuguese Armed Forces, to mitigate the associated risks, ensure confidentiality, integrity, availability, authenticity, resilience, and privacy of these kind of networks.
Description
Keywords
Cibersegurança Estratégias Potencialidades Vulnerabilidades Oportunidades Ameaças Redes 5G 5G Networks Cybersecurity Strategies Strengths Weakness Opportunities Threats