Sikkerhetsutfordringer i fremtidens EKOM-tjenester

FFI-Report 2018
This publication is only available in Norwegian

About the publication

Report number

17/17047

ISBN

978-82-464-3037-9

Format

PDF-document

Size

523.1 KB

Language

Norwegian

Download publication
Ole Ingar Bentstuen Bodil Hvesser Farsund Lasse Øverlier Geir Køien
This report describes important trends related to digital chains of values related to electronic communications and the security impact of these trends, with a time horizon of five years. The choice of trends is based on which trends we expect to change how the society, business sector and service providers need to think about security, and not necessarily on which trends will have the most commercial prevalence. The report describes five trends. Virtualization is the enabling technology of cloud services. In the near future, virtualization will also change how communications services and networks are implemented. This will change how service providers need to design and implement security within communications networks. Virtualization will enable new concepts for management and orchestration of communication networks. Next generation mobile technology - 5G - will, in addition to higher data capacity, also offer service for Machine-Type Communications (MTC). MTC covers the two areas Massive MTC, also known as the Internet of Things, and Critical MTC, which offers robust services for e.g. autonomous systems and within heath care. We expect that security for critical MTC will be on the same level or higher than the current 4G security mechanisms. Massive MTC will have lower security than existing technologies. Artificial intelligence and autonomous system will enter the domains of data centers and communications service providers. Virtualization of network functions is the key enabler for these technologies. In addition, the complexity of modern IT infrastructures is so high that utilizing artificial intelligence is necessary. Artificial intelligence will lead to non-verifiable systems, which will challenge the current regime for security approval. The market situation and complex digital value chains will make it even more difficult to understand and know the dependencies between the user-facing services and underlying IT infrastructures. It is difficult to keep control over personal information. In addition, users will use services from large international service providers that are not regulated by Norwegian law. Trust-enabling technologies like blockchain and automatic security updates, together with higher focus on protection of personal information, will reduce the chance of unwillingly spreading personal information. At the same time, large companies like Google and Facebook will continue to gather large amount of personal information. There were great challenges in sorting and structuring the content in this report since several of the emerging technologies drives different trends. There is not a one-to-one mapping between the underlying technology development and the usage of the technologies.

Newly published