Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Relevant section (Score 4, Informative) 29

From the relevant Fed page:

"Ââ30.8 5G Provider Cybersecurity Statement Requirements.

(a) Statement. Each Upper Microwave Flexible Use Service licensee is required to submit to the Commission a Statement describing its network security plans and related information, which shall be signed by a senior executive within the licensee's organization with personal knowledge of the security plans and practices within the licensee's organization. The Statement must contain, at a minimum, the following elements:
(1) Security Approach. A high-level, general description of the licensee's approach designed to safeguard the planned network's confidentiality, integrity, and availability, with respect to communications from:
(i) A device to the licensee's network;
(ii) One element of the licensee's network to another element on the licensee's network;
(iii) The licensee's network to another network; and
(iv) Device to device (with respect to telephone voice and messaging services).
(2) Cybersecurity Coordination. A high-level, general description of the licensee's anticipated approach to assessing and mitigating cyber risk induced by the presence of multiple participants in the band. This should include the high level approach taken toward ensuring consumer network confidentiality, integrity, and availability security principles, are to be protected in each of the following use cases:
(i) Communications between a wireless device and the licensee's network;
(ii) Communications within and between each licensee's network;
(iii) Communications between mobile devices that are under end-to-end control of the licensee; and
(iv) Communications between mobile devices that are not under the end-to-end control of the licensee;
(3) Cybersecurity Standards and Best Practices. A high-level description of relevant cybersecurity standards and practices to be employed, whether industry-recognized or related to some other identifiable approach;
(4) Participation With Standards Bodies, Industry-Led Organizations. A description of the extent to which the licensee participates with standards bodies or industry-led organizations pursuing the development or maintenance of emerging security standards and/or best practices;
(5) Other Security Approaches. The high-level identification of any other approaches to security, unique to the services and devices the licensee intends to offer and deploy; and
(6) Plans With Information Sharing and Analysis Organizations. Plans to incorporate relevant outputs from Information Sharing and Analysis Organizations (ISAOs) as elements of the licensee's security architecture. Plans should include comment on machine-to-machine threat information sharing, and any use of anticipated standards for ISAO-based information sharing.
(b) Timing. Each Upper Microwave Flexible Use Service licensee shall submit this Statement to the Commission within three years after grant of the license, but no later than six months prior to deployment.
(c) Definitions. The following definitions apply to this section:
(i) Confidentiality. The protection of data from unauthorized access and disclosure, both while at rest and in transit.
(ii) Integrity. The protection against the unauthorized modification or destruction of information.
(iii) Availability. The accessibility and usability of a network upon demand."

Submission + - EventQL: Open-Source BigQuery Competitor (eventql.io)

An anonymous reader writes: EventQL is the open source version of Google's BigQuery system: A massively parallel SQL database built for event analytics. One explicitly stated design goal is that EventQL is able to scale to 10,000 servers or more and to be able to process hundreds of terrabytes of data and trillions of events in seconds.

Comment BBQ prior art (Score 4, Interesting) 39

"They surrounded the blaze with a cylindrical structure that funneled air into the flame to create a vortex with a height of about 60 centimeters."

My earliest memoir of my dad barbecuing includes him using an empty olive-oil can to create precisely the conditions described though with different fuel and resulting in a red whirl.

Submission + - Malware Infected All Eddie Bauer Stores in U.S., Canada (krebsonsecurity.com)

alir1272 writes: Clothing store chain Eddie Bauer said today it has detected and removed malicious software from point-of-sale systems at all of its 350+ stores in North America, and that credit and debit cards used at those stores during the first six months of 2016 may have been compromised in the breach. The acknowledgement comes nearly six weeks after KrebsOnSecurity first notified the clothier about a possible intrusion at stores nationwide.

Slashdot Top Deals

"Just think, with VLSI we can have 100 ENIACS on a chip!" -- Alan Perlis

Working...