1887

Security in Telecommunications and Information Technology 2009

An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications

image of Security in Telecommunications and Information Technology 2009

The purpose of this manual is to provide a broad introduction to the security work of the ITU-T. It is directed towards those who have responsibility for, or an interest in, information and communications security and the related standards, and those who simply need to gain a better understanding of ICT security issues and the corresponding ITU-T Recommendations. This edition establishes some guiding principles which include: • the publication should appeal to a wide audience and should try to avoid complex terminology and terms that are likely to be understood only within specialized domains; • the text should complement, not duplicate, existing material available in other forms (e.g. Recommendations); • it should be written to accommodate publication both as a stand-alone printed document and as an electronic document; • the text should employ web links to Recommendations and other sources of publicly-available material as much as possible. Detailed information, over and above that needed to fulfil the basic objectives should be referenced by web links; and • to the greatest extent possible, the text should focus on work that has been completed and published, rather than work that is planned or in progress. In keeping with these objectives, the manual does not attempt to cover all the ITU-T security work that has either been completed or is underway. Instead, it focuses on key selected topics and provides web links to additional information.

English

  • Click to access:
  • Click to download PDF - 2.79MB
    PDF
  • Click to Read online and share
    READ
.

Security architectures

Security architectures, and related models and frameworks, provide a structure and context within which related technical standards can be developed in a consistent manner. In the early 1980s, the need for a framework in which security could be applied in a layered communications architecture was identified. This led to the development of the open systems security architecture (Rec. ITU-T X.800). This was the first of a suite of architectural standards to support security services and mechanisms. This work, most of which was done in collaboration with ISO, led to further standards, including security models and frameworks that specify how particular types of protection can be applied in particular environments.

English

  • Click to access:
  • Click to download PDF - 559.78KB
    PDF
  • Click to Read online and share
    READ
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error