Next, end-to-end visibility is vital for monitoring any system . It’s especially necessary in 5G security, where there are so many access points for malicious actors to target. This monitoring should extend across all layers of the network, including the physical network cells and data planes.
Read moreWhat encryption is used in 5G?
In the future, 5G will support advanced cryptographic algorithms with 256 bits . This is to ensure that such algorithms used in 5G networks are sufficiently resistant to attacks from quantum computers.
Read more