Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - munira.ete

Pages: [1] 2 3 ... 31
1
Informative post. Thank you

4
Science and Information / Re: Anroid Database Create
« on: June 26, 2019, 11:51:00 AM »
Informative post. Thank you

6
Hackers have broken into the systems of more than a dozen global telecoms companies and taken large amounts of personal and corporate data, researchers from a cyber security company said on Tuesday, identifying links to previous Chinese cyber-espionage campaigns.

Investigators at US-Israeli cyber security firm Cybereason said the attackers compromised companies in more than 30 countries and aimed to gather information on individuals in government, law-enforcement and politics.

The hackers also used tools linked to other attacks attributed to Beijing by the United States and its Western allies, said Lior Div, chief executive of Cybereason.

“For this level of sophistication it’s not a criminal group. It is a government that has capabilities that can do this kind of attack,” he told Reuters.

7
Science and Information / 5G puts the spotlight on network security
« on: June 24, 2019, 03:47:57 PM »
The upcoming 5G technology has put the spotlight on the importance of securing the networks and preventing data leaks. Unlike the previous cellular technologies, 5G is not just about faster broadband speeds or richer functions for an individual user but promises a `hyperconnected’ society with billions of connected devices or Internet of Things (IoT), as it is generally referred to.

Analysts believe that 50 billion devices will be connected to mobile networks by 2020. Every one of these devices, from your home automation devices to your connected car, can potentially be the weak link and attract hackers.

On one end, 5G use cases place the highest demands on the reliability and availability of the network, but at the same time it opens up the network to unprecedented security threats. Besides a large part of 5G networks will be cloud-based, which inherently increases the security risk. Further, multiple software and equipment vendors in a typical cloud environment make it more susceptible to security issues.

Besides, the integration of the industrial internet and the 5G network will have an impact on the security assurance system. To begin with, the security regulations are diversified. In comparison with traditional telecommunications networks, other business verticals, like financial, energy, and industrial networks, have different security regulations and standards, data protection norms, and security evaluation standards.

Besides, the assets are diversified. The equipment, platforms and applications in Multi-access Edge Computing (MEC) have different owners and users, and may also require an operation and maintenance system across multiple organizations. It is then essential that 5G adapts to a diversified security assurance system.

The Network Slice Security

Network slicing is a key concept being introduced in a 5G network. With this the service providers can orchestrate a separate 5G network slice for multiple industry applications on shared network infrastructure. It will also help in bringing down the Total Cost of Ownership (TCO) and also enables in building an open network ecosystem.

The network slicing approach brings fundamental changes in a telecom network, which lays a solid foundation for the deep integration of telecommunications networks and industrial applications.

However, security is the key precondition for vertical industries when using network slicing. In addition to providing the traditional mobile network security mechanisms (such as access authentication and encryption), 5G also needs to provide end-to-end isolation between network slices.

The MEC Security

MEC is one of the core technologies for the diversification of 5G services. With a distributed network architecture, MEC pushes the service capability and application to the edge of the network and changes the separation of network and services. The inherent advantage of MEC is that it greatly reduces the latency, which is a key requirement of 5G, especially for the use cases like Augmented Reality and Virtual Reality. It will play a key role in improving content distribution efficiency and user experience.

The deep integration of 5G and vertical industries demands that new services requiring more bandwidth and ultra-low latency will gradually emerge. It is then imperative to study the security issues faced by MEC to protect network functions and data assets and to provide more secure and reliable services. Further, what is of concern is that the 5G network capabilities can be exposed to vertical industries through APIs, which enables customization of network services.

5G Security Capability Exposure Model

The 5G security capability exposure model can be divided into three layers: resource layer, capability layer, and application layer.

The resource layer abstracts and encapsulates basic resources. Resources can be of many types and forms, provided by resource pools, including the security function pool, security algorithm pool, security information pool and trusted computing pool.

The capability layer provides many security capability sets that can be invoked by the application layer, such as the digital identity system, trusted computing system, and channel encryption system. These capability sets are integrated and maintained by operators in combination with the advantages of the 5G network, and provide highly available and flexible capability APIs.

On the other hand, the application layer organizes security capabilities to construct the security defense system to cope with the application security requirements.

5G network security issue is not just a technical issue. With 5G, security cannot be an afterthought. It needs to be an integral part of the deployment. The integration of 5G and several vertical industries, such as manufacturing, energy, and transportation, break the barriers of infrastructure and exposes the network to more risks. It is for this reason that the traditional security measures might not be enough for 5G.
The operators need to work on providing sustainable, credible and secure network services for the users. For this, 5G networks need to involve the customers, especially the different vertical industries, in implementing the security assurance system to provide customers with an overall stronger and more robust security assurance capabilities.

8
Science and Information / No call to rush into 5G telecom
« on: June 24, 2019, 03:46:45 PM »
Even as the government makes big plans for raising revenues from auctioning spectrum for fifth generation (5G) telecom services, there is good reason for Indian telecom service providers to not rush into the 5G space. They would be better off spending their money and energy in making the 4G services they have already rolled out work to the limits of technologically feasible efficiency and graduate all subscribers from older, spectrum-inefficient, voice-only 2G services. The simple reality is that there is little material advantage to be had by embracing 5G at the moment.

Most people treat 5G as if it were the latest generation smartphone — must-have, for those who like to be at the cutting edge of things. They also think it would mean faster data, although they are not clear what faster data would be useful for — when 4G works well, data speeds are as good as you need them to be. What sets 5G apart is a combination of low latency and consistently low latency, and it is important to realise this. Latency is the gap between when you initiate a signal and the desired effect takes place. This is crucial if you are doing remote surgery over a mobile network: the robotic arm doing the incision must move precisely and in total coordination with the image relayed to the surgeon performing the operation and the instructions he reciprocates. It is also useful if you are playing a fast videogame off a server rather than on your console. Driverless cars are another use-case that is touted, as are self-directing robots on the shop floor. Is the Indian ecosystem ready for such uses? Robots could possibly make do with a combination of low latency Wi-Fi and edge computing, in any case.

A byproduct of 5G is a spurt in data of all kinds, including the machine-to-machine kind. India still does not have a regulatory system in place for an upsurge in data or the capacity to analyse it. All told, Indian telecom, as well as the broader economy, would probably gain from not rushing to be an early mover in 5G deployment and, instead, using its resources to optimise and universalise 4G.

9
Seoul: After recently launching Galaxy A10e, South Korean tech giant Samsung is now working on a new budget smartphone for the Indian market - Galaxy A10s.

In a recent development, a smartphone purported to be the A10s was listed on the Federal Communications Commission (FCC) website, the GSM Arena reported late on Saturday.

According to the listing, the device has a 3,900 mAh battery. The phone measures 157 mm in length, 75.8 mm in width and 174.3 mm (roughly 6.86 inches) diagonally.

It has a dual camera setup accompanied by a flash. There is also a fingerprint sensor at the back of the smartphone.
The device is expected to be an upgraded variant of the already launched Galaxy A10.

The phone would be powered by a MediaTek Helio P22 octa-core processor under the hood along with 2GB RAM.

In terms of software, the phone will have Android 9 Pie-based One UI out of the box.

10
U.S. President Donald Trump is looking to require next-generation 5G cellular equipment used in the United States to be designed and manufactured outside China, the Wall Street Journal reported on Sunday, citing people familiar with the matter.

As part of a 150-day review that started after cybersecurity concerns in the United States, officials are asking telecom equipment makers if they can develop U.S.-bound hardware including cellular-tower electronics as well as routers and switches, and software outside of China, the WSJ https://on.wsj.com/2IAjhpk reported.
In May, the Trump administration took aim at China's Huawei Technologies Co Ltd, banning the firm from buying vital U.S. technology without special approval and effectively barring its equipment from U.S. telecom networks on national security grounds.

The talks are still in informal stages, the WSJ said, and any executive order calls for only a list of proposed rules and regulations by the 150-day deadline, in October, so any decision could take years to adopt.

11
San Francisco: Apple is all set to launch its 16-inch MacBook Pro in September this year, media reported on Monday.

"We foresee that Apple will release a new product in September 2019 Apple event if there's no unexpected development issue," said Jeff Lin, Associate Director of Consumer Electronics at IHS Markit, reported The Verge.

The upcoming MacBook Pro is said to feature an LCD panel from LG display with a resolution of 3072 x 1920, which is better then the current high-end model's 15.4-inch 2880x1800 display.

In an earlier report, famed Apple analyst Ming-Chi Kuo spoke about the launch of new Apple devices.
Kuo stated that the company might launch a new iPad with 10 or 12-inch screen in late 2020 or early 2021 and a MacBook with 15 to 17-inch screen size in the first half of 2021 equipped with mini-LED panels.

Kuo has also previously claimed that two new iPad Pro models will enter mass production between the fourth quarter of 2019 and the first quarter of 2020.

13
Common Forum / Re: EICT conference
« on: April 08, 2019, 05:01:19 PM »
Informative. Thank you

14
Common Forum / Re: কেন চা চাই?
« on: April 08, 2019, 05:00:58 PM »
Nice post

15
True

Pages: [1] 2 3 ... 31