Abstract
Methodology: The analysis describes the transition to 5G, why it is necessary, and briefly, how the network will initially be constructed. It presents, generally, the stakeholders involved, and some risks and vulnerabilities presented by the network. Subsequently, it analyzes the EU privacy framework, and potential exemplifications of that framework in China, South Korea, and the United States. It then examines some of the EU cybersecurity framework to determine if it aids in the selection of ‘safe’ 5G equipment. In concluding, two diverging approaches are presented based on the application of privacy and cybersecurity perspectives, respectively.