The 5G Technology Nexus: Assessing Threats and Risks of Implementation
Technologie 5G: Posouzení hrozeb a rizik implementace
diploma thesis (DEFENDED)

View/ Open
Permanent link
http://hdl.handle.net/20.500.11956/124605Identifiers
Study Information System: 214937
Collections
- Kvalifikační práce [18324]
Author
Advisor
Referee
Střítecký, Vít
Faculty / Institute
Faculty of Social Sciences
Discipline
International Security Studies
Department
Department of Security Studies
Date of defense
3. 2. 2021
Publisher
Univerzita Karlova, Fakulta sociálních vědLanguage
English
Grade
Excellent
Keywords (Czech)
5G, cyber security, cyber threats, cyber risksKeywords (English)
5G, cyber security, cyber threats, cyber risksThe new 5G technology, next generation of telecommunication and mobile network, is all around the world in course of inspection and inquiry for its astonishing novelty, from new services to functions and scalability. However, every technology brings alongside new possibilities and new threats scenarios, especially in this case where the impact on the present network is promised to be massive, with brand new features allowed by 5G, like Internet of Things, widespread virtualization and huge leap forward in rapidity and capability of the mobile transmission. An increase in the network surface, considered as more connections, more devices connected and more traffic load of data, will expand also the possible entry point and fault exploitable by a malevolent actor, raising common concern about the technology. The deployment of such a technology on European soil, especially in some states of the Union, caused uproar and critics primarily in the security field. Following a global trend, but also leading a best practice approach, the EU developed a series of mechanisms and agencies that are challenged to oversees the gradual shift from old 4G LTE to 5G. In this paper a Critical Information Infrastructure Protection (CIIP) framework is used to analyse the criticalities of the new technology. Definition of...
Citace dokumentu
Metadata
Show full item recordRelated items
Showing items related by title, author, creator and subject.
-
Moving Toward Strategic Cyber War Theory? Analysis of Russian State-backed Cyber Attacks
Defence status: DEFENDEDGreen, Joshua (Univerzita Karlova, Fakulta sociálních věd, 2022)Date of defense: 14. 9. 2022This thesis analysed cyber-attacks conducted by two pairs of nation states (Russia/Ukraine and Iran/Israel) against each other, through the lens of Jan Kallberg's Strategic Cyberwar Theory in order to determine if elements ... -
New IHL Framework for Cyber Warfare
Defence status: DEFENDEDKnopová, Eva (Univerzita Karlova, Právnická fakulta, 2016)Date of defense: 30. 11. 2016NOVÝ MHP RÁMEC PRO KYBERNETICKOU VÁLKU - ABSTRAKT Inspirována rostoucím počtem odhalených kybernetických útoků mířených na veřejné a vládní zařízení a instituce, tato diplomová práce si klade za cíl poodhalit stěžejní ... -
Between Defence and Offence: An Analysis Of The US "Cyber Strategic Culture"
Defence status: DEFENDEDPersoglia, Davide (Univerzita Karlova, Fakulta sociálních věd, 2018)Date of defense: 13. 9. 2018The present thesis deals with the US strategic approach and posture to cybersecurity from a national point of view. On such a topic much has been written already, nonetheless the present work finds a degree of originality ...