1887

Security in Telecommunications and Information Technology 2009

An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications

image of Security in Telecommunications and Information Technology 2009

The purpose of this manual is to provide a broad introduction to the security work of the ITU-T. It is directed towards those who have responsibility for, or an interest in, information and communications security and the related standards, and those who simply need to gain a better understanding of ICT security issues and the corresponding ITU-T Recommendations. This edition establishes some guiding principles which include: • the publication should appeal to a wide audience and should try to avoid complex terminology and terms that are likely to be understood only within specialized domains; • the text should complement, not duplicate, existing material available in other forms (e.g. Recommendations); • it should be written to accommodate publication both as a stand-alone printed document and as an electronic document; • the text should employ web links to Recommendations and other sources of publicly-available material as much as possible. Detailed information, over and above that needed to fulfil the basic objectives should be referenced by web links; and • to the greatest extent possible, the text should focus on work that has been completed and published, rather than work that is planned or in progress. In keeping with these objectives, the manual does not attempt to cover all the ITU-T security work that has either been completed or is underway. Instead, it focuses on key selected topics and provides web links to additional information.

English

  • Click to access:
  • Click to download PDF - 2.79MB
    PDF
  • Click to Read online and share
    READ
.

Securing the network infrastructure

The data used to monitor and control the telecommunications network management traffic is often transmitted on a separate network that carries only the network management traffic (i.e., no user traffic). This network is often referred to as the telecommunication management network (TMN) as described in Recommendation ITU-T M.3010, Principles for a telecommunications management network. It is imperative that this traffic be secured. The management traffic is usually categorized in terms of information required to perform fault, configuration, performance, accounting and security management functions. Network security management deals with setting up a secure management network as well as managing the security of information related to the three security planes of the X.805 security architecture.

English

  • Click to access:
  • Click to download PDF - 519.20KB
    PDF
  • Click to Read online and share
    READ
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error