Sikkerhetsutfordringer i fremtidens EKOM-tjenester
About the publication
Report number
17/17047
ISBN
978-82-464-3037-9
Format
PDF-document
Size
523.1 KB
Language
Norwegian
This report describes important trends related to digital chains of values related to electronic
communications and the security impact of these trends, with a time horizon of five years.
The choice of trends is based on which trends we expect to change how the society, business
sector and service providers need to think about security, and not necessarily on which trends
will have the most commercial prevalence. The report describes five trends.
Virtualization is the enabling technology of cloud services. In the near future, virtualization
will also change how communications services and networks are implemented. This will change
how service providers need to design and implement security within communications networks.
Virtualization will enable new concepts for management and orchestration of communication
networks.
Next generation mobile technology - 5G - will, in addition to higher data capacity, also offer
service for Machine-Type Communications (MTC). MTC covers the two areas Massive MTC,
also known as the Internet of Things, and Critical MTC, which offers robust services for e.g.
autonomous systems and within heath care. We expect that security for critical MTC will be on
the same level or higher than the current 4G security mechanisms. Massive MTC will have
lower security than existing technologies.
Artificial intelligence and autonomous system will enter the domains of data centers and
communications service providers. Virtualization of network functions is the key enabler for
these technologies. In addition, the complexity of modern IT infrastructures is so high that
utilizing artificial intelligence is necessary. Artificial intelligence will lead to non-verifiable
systems, which will challenge the current regime for security approval.
The market situation and complex digital value chains will make it even more difficult to
understand and know the dependencies between the user-facing services and underlying IT
infrastructures. It is difficult to keep control over personal information. In addition, users will
use services from large international service providers that are not regulated by Norwegian law.
Trust-enabling technologies like blockchain and automatic security updates, together with
higher focus on protection of personal information, will reduce the chance of unwillingly
spreading personal information. At the same time, large companies like Google and Facebook
will continue to gather large amount of personal information.
There were great challenges in sorting and structuring the content in this report since several of
the emerging technologies drives different trends. There is not a one-to-one mapping between
the underlying technology development and the usage of the technologies.