ITU-T X.805 based Vulnerability Analysis Method for Security Framework of End-to-End Network Services
|
|
|
- Edwina Phillips
- 9 years ago
- Views:
Transcription
1 ITU-T X.805 based Vulnerability Method for Security Framework of End-to-End Network Services YOUNGDUK CHO YOOJAE WON BYONGJIN CHO Information Security Technology Division Korea Information Security Agency 78, Garak-Dong, Songpa-Gu, Seoul, Korea KOREA Abstract: - This paper proposes a ITU-T X.805 based Vulnerability Method for developing Security Framework of NGN infrastructure and services. It is derived from ITU-T X.805 and security consulting methods. It provides a holistic approach and a systematic vulnerability analysis view of security model for new network infrastructure and services. As a further works, we will apply this methodology to new emerging network infrastructures and services. Key-Words:- ITU X.805, Vulnerability, Security Framework 1. Introduction NGN(Next Generation Network) is a packet-based network which is able to provide telecommunication services and able to make use of multiple broadband, QoS-enabled transport technologies and in which service-related functions are independent from underlying transportrelated technologies. It offers unrestricted access by users to different services providers. With growth of NGN, new multiple network services is toward converging. But broadband convergence network like NGN is expected that a threat effect is considerably enormous extended over a network to overall connected networks. So, security should implement before constructing of new infrastructures and services in networks. But it is important that the existing network security concept is not robust to adapt to the convergence networks, which is a complex set of multi-infrastructures and services. Also, quality of service related to trade off services performance is increasingly more valuable than ever. For example, if a person using a Internet telephony software in a wireless broadband internet terminal connects a another person using a telephone in PSTN, the person goes through wireless network, Internet, and PSTN. Generally the person has to be controlled doubly the security mechanisms of network itself. Multi-level security facilities and activities often have become a critical services degrade in this situation. However, the Reference architecture of ITU-T X.805 is useful tool to comprehend a complex set of network infrastructures and services. The reference architecture addresses security concerns for the management, control, and use of network infrastructure, services, and applications. The reference architecture provides a comprehensive, top-down, end-to-end perspective of network security and can be applied to
2 network elements, services, and applications in order to predict, detect, and correct security vulnerabilities. 2. Related Work In this section, we provide the vulnerability analysis method that derived consulting methods such as BS7799, IT protection manual and so on. layer has unique vulnerabilities, threats, and mitigations. Security Planes represent the types of activities that occur on a network, which are (1) Management security plane, (2) Control security plane, (3) End-User security plane. Each security plane is applied to every security layer to yield nine security perspectives. Each security perspective has unique vulnerabilities and threats. Security Dimension is a set of security measures designed to address a particular aspect of the network security. Security Dimensions are 8 sets (1) Access control, (2) Authentication, (3) Nonrepudiation, (4) Data confidentiality, (5) Communication flow security, (6) Data integrity, (7) Availability, (8) Privacy. 8 Security Dimensions applied to each security perspective. Fig.1 shows Reference Architecture for end-to-end network security of ITU-T X.805. (figure from ITU- T X.805) Fig. 1 Reference Architecture for End-to- End Network Security(source from ITU-T X.805) The X.805 is a standard specification of developing in security model of ITU-T FG-NGN. The X.805 has 3 architectural components Security Dimensions, Security Layers and Security Planes. Security Layers are a hierarchy of equipment and facilities groupings, which are 3 layers: (1) Infrastructure security layer, (2) Services security layer, (3) Application security layer. Each security Fig. 2 Modular Form of X.805 (source from ITU-T X.805)
3 Fig.2 shows provides a systematic, organized way of performing network security assessments and planning. This is the best merits of X.805. The usage of Security Consulting method is to analysis the risk assessment of specific organization. Risk assessment methods are BS7799, OCTAVE(Operationally Critical Threat, Asset and Vulnerability Evaluation), ISO GMITS(Guidelines for the management of IP security), and so on. Fig.3 is a general procedure of these methods. analysis model is useful of applying to any network technology and any scope of network function. Fig. 4 tells that the proposed method is similar to security consulting method. But, this is focused in discriminating protection target, especially multi-facet network infrastructures and services. Target of Infrastructures and services Discriminating security target Threat analysis By Security Layers Infrastructure/Service/Application Layer By Security Planes Management/Control/End-user Plane Asset Threat Vulnerability Vulnerability analysis Security Objectives & Requirements ITU-T X.805,ISO Reference Security Architecture 적용 Security Objectives by security dimensions Access control, Authentication, Non-repudiation, Data confidentiality, Communication flow security, Data integrity, Availability, Privacy Risk analysis Deriving Security Measures Correlation analysis between security measures Using Technology Tree Security Framework for Network Infrastructures and services Security Measures Fig. 3 General procedure of Risk Assessment Method 3. ITU-T X.805 based Vulnerability Method In this section, we propose the vulnerability analysis method to develop NGN Security Framework that is motive consulting methods such as BS7799, IT protection manual and so on. This Fig. 4 ITU-T X.805 based Vulnerability Method As it offers a systematic view of the protected target, we can consider wholly threats and vulnerabilities without exception. Security measures of unrealized network infrastructures and services can be reflected in the step of the implementation. Fig.5 describes the detail steps of proposed Vulnerability Method. In addition to following a general procedure of Security consulting method, it references ITU-T X.805 to analysis the protected target. So, this
4 method is more comprehensive end-toend network view of security than ITU-T X.805. Discriminating security target Defining Technology related work Defining Technical reference model Network services flow Classifying Security Layers Classifying Security Planes Related security technology Threat Identifying Threats Ranking Threats Vulnerability Identifying Vulnerabilities Ranking Vulnerabilities Risk Assessment Defining Risk Scenario Security Objectives & Requirements Defining Security Objectives Layer,Plane/Dimension table Deriving Security Measures Security Technical Tree Correlation analysis between security measures Network Security Framework Fig. 5 Steps of Proposed Vulnerability Method This method chooses the technical tree development for making security measures. Fig.6 explains to making a technical tree. The merits of this way can deduce a number of new security measurements. rank Security Requirement 1st Function 2nd function 3rd function 1 Securi ty requirement t echni cal sol ut i on1 2 nd sol ut i on 1 3 rd sol uti on 1 4. Conclusion and Further Works We propose a ITU-T X.805 based Vulnerability Method for developing Security Framework of NGN infrastructure and services. It is derived consulting methods. It provides a holistic approach to network security and guides for NGN security. In Korea, new network infrastructures and services has been constructed in according to IT839 strategy. IT839 strategy means 3 Infrastructures(Broadband Convergence Network, IPv6, Ubiquitous Sensor Network), 8 Services(Voice over IP, Home Network, Digital Multimedia Broadcast, Digital TV, Wireless Broadband Internet, RFID, Telematics, WCDMA) and 9 New Growth Engines(Next-generation mobile communications, Digital TV, Home Network, IT SoC, Next-generation PC, Embedded SW, Digital contents, Telematics, Intelligent Service Robot). In further works, we will apply this vulnerability analysis method to 8 Services and BcN. So we will present a NGN Security Framework model, which will be reflected in implement of BcN infrastructure and services. Technical solution2 2 nd sol uti on 2 2 nd sol ut i on1 3 rd sol uti on 1 Technical 기술 트리Tree 목록lists Filtering 주요가능 기술 도출 Realizable Security Measures Fig. 6 Technical Tree Development References: [1] ITU-T X.805, Security Architecture for Systems Providing End-to-End Communications [2] S.Kim, J.Jee, T.Nam, S.Sohn, C.Park, Framework of Network Security Service for Next Generation, Proceeding. WISA 2002, [3] ITU-T SG17 Q.5, ITU-T Rec. X.805 and its application to NGN, ITU-T FG-NGN Workshop Proceeding, 2005 April [4] Korea Information Security Agency, Vulnerability & Assessment
5 Methodology version, 2002 [5] Kong, Luo, Xu, Gu, Gerla, Lu, Adaptive Security for Multi-layer Ad-hoc Networks, Wireless Communications and Mobile Computing, Wiley Interscience Press, 2002 [6] Bass T., Intrusion detection systems and multi-sensor data fusion, Communications of the ACM, vol.43, issue 4, 2000 April
Next Generation Networks architecture by ITU-T
Next Generation Networks architecture by ITU-T Robert Wójcik Department of Telecommunications 21st January 2009, Kraków, Poland Outline 1 The beginnings 2 The definition 3 Fundamental characteristics of
SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security
International Telecommunication Union ITU-T Y.2740 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2011) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
ITU-T Y.2001. General overview of NGN
INTERNATIONAL TELECOMMUNICATION UNION ITU-T Y.2001 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (12/2004) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
Introduction of Information Security Research Division
Introduction of Information Security Research Division 2005. 5. 13. Kyo-il Chung, Ph. D. Information Security Infrastructure Research Group Contents Overview - Secure u-it KOREA - Organization of ETRI
ITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford [email protected].
ITU-T Kaleidoscope Conference Innovations in NGN Managing NGN using the SOA Philosophy Y. Fun Hu University of Bradford [email protected] Next Generation Network (NGN) A IP/IMS based network Provide
Overview of the Internet of things
Overview of the Internet of things Tatiana Kurakova, International Telecommunication Union Place des Nations CH-1211 Geneva, Switzerland Abstract. This article provides an overview of the Internet of things
IP Telephony and ENUM
NGN IP Telephony and ENUM APEC TEL 30 Next Generation Networks James Seng Assistant Director, Enabler Technologies What is Voice over IP? ) ) ) 1010101000010 1001010101010 1001010101010 0101010001001 TCP/IP
Regulation of New Technologies: IP Telephony and Next Generation Networks
Regulation of New Technologies: IP Telephony and Next Generation Networks By Lawrence S M KWAN Seminar on Next Generation Networks and Telecommunication Regulations WuXi, China 25 26 August 2004 1 Outline
Next Generation 112 Explained
Next Generation 112 Explained Riga 18 of April 2012 Presented by Cristina Lumbreras Prepared with the help of Hannes Tschofenig Agenda 1. What is a Next Generation Network? 2. Next Generation Emergency
Strategy. 1 www.mic.go.kr. Humanism in the Digital World. Ministry of Information and Communication, Republic of Korea
www.mic.go.kr Ministry of Information and Communication (www.mic.go.kr) (110-777) 100 Sejongno, Jongno-Gu, Seoul, South Korea Tel 02_ 750_ 2114, Fax 02 _ 750_ 2391 Humanism in the Digital World IT 39 8
M2M Service Platform to Support Carrier Cloud
Platform to support the cloud computing services of telecommunication carriers M2M Service Platform to Support Carrier Cloud KATA Kouji, NAKAYAMA Yoshitaro, SEKI Tadashi Abstract Communication carriers
This document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 29180 First edition 2012-12-01 Information technology Telecommunications and information exchange between systems Security framework for ubiquitous sensor networks Technologies
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17 TSB Briefing to the Regional Offices, 28 Feb 2011 Martin Euchner Advisor of ITU-T Study Group 17 [email protected]
Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
Regulatory Approaches to Next Generation Networks: An International Comparison
Regulatory Approaches to Next Generation Networks: An International Comparison J. Scott Marcus and Dieter Elixmann TPRC 2007: Washington, DC 30 September 2007 0 Regulatory Approaches to NGNs: An International
Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania [email protected]
Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania [email protected] Copyright Virgil Dobrota 2007-2008, All rights reserved 1 Course 12 - Outline 46. NGN Next Generation
Wireless Security Architecture
Wireless Security Architecture Saeed Rajput Dept. of Computer Science and Eng. Florida Atlantic University http://www.cse.fau.edu/~saeed Saeed Rajput, 2005 1 Which Security? Link Layer Network Layer Transport
Compliance Risk Assessment Measures of Financial Information Security using System Dynamics
Compliance Risk Assessment Measures of Financial Information Security using System Dynamics Ae Chan Kim 1, Su Mi Lee 2 and Dong Hoon Lee 3 1, 3 Graduate School of Information Security, Korea University
A business view for NGN service usage
A business view for NGN service usage Emmanuel Bertin 1, Idir Fodil 1, Noel Crespi 2 1 France Telecom, R&D division 2 Institut National des Télécommunications (GET-INT) Abstract. Next Generation Networks
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
Mobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS
Draft Recommendation Q.3902 PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS Summary This Recommendation describes the main
Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud 2004-3-167 Supervisor: Prof.Dr. Shawkat K.Guirguis
Alexandria University Institute of Graduate Studies and Research Department of Information Technology. Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud 2004-3-167 Supervisor: Prof.Dr. Shawkat
Requirements and Service Scenarios for QoS enabled Mobile VoIP Service
Requirements and Service Scenarios for QoS enabled Mobile VoIP Service Kyu Ouk Lee, Ho Young Song Electronics and Telecommunications Research Institute (ETRI) [email protected], [email protected] Abstract.
Hansuk Kim, Ph.D. SVP, Global Business October 2004
Success and Challenges of Korean Broadband Internet Hansuk Kim, Ph.D. SVP, Global Business October 2004 Contents 1. Broadband Internet in Korea 2. Key Success Factors 3. Beyond Broadband Access 2 3 IT
End-to-End QoS Monitoring Tool Development and Performance Analysis for NGN
End-to-End QoS Monitoring Tool Development and Performance Analysis for NGN ChinChol Kim 1, SangChul Shin 1, SangYong Ha 1, SunYoung Han 2 and YoungJae Kim 2 1 National Computerization Agency Building
An Architecture for Home-Oriented IPTV Service Platform on Residential Gateway
J Inf Process Syst, Vol.9, No.3, September 2013 pissn 1976-913X eissn 2092-805X http://dx.doi.org/10.3745/jips.2013.9.3.425 An Architecture for Home-Oriented IPTV Service Platform on Residential Gateway
NTT s challenge: create new business on the NGN
NTT s challenge: create new business on the NGN Takashi HANAZAWA Senior Vice President Senior Executive Director, Research and Development Planning Department NIPPON TELEGRAPH AND TELEPHONE CORPORATION
IoT/M2M standardization activities in ITU T. Yoshinori Goto, NTT ([email protected])
IoT/M2M standardization activities in ITU T Yoshinori Goto, NTT ([email protected]) Background ITU T has a long history of IoT discussion over many years. JCA NID played the coordination role
Society, Law Enforcement and the Internet
Society, Law Enforcement and the Internet Models for Give-and-Take Carter Bullard CEO/President QoSient, LLC 150 E 57th Street Suite 12D New York, New York 10022 ICCS 2010 New York, New York [email protected]
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Business case for NGN. Arunabha Mukhopadhyay IIM Lucknow
Business case for NGN Arunabha Mukhopadhyay IIM Lucknow Convergence Telecommunication environment IP based converged environment Next generation converged environment Single purpose networks PSTN, cellular,
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security
International Telecommunication Union ITU-T Y.2723 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2013) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks
Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Mehdi Mani Wireless Networks and Multimedia Service Department GET-INT Evry, France [email protected] Noel Crespi Wireless
OECD Policy Guidance on Convergence and Next Generation Networks
2 OECD POLICY GUIDANCE ON CONVERGENCE AND NEXT GENERATION NETWORKS OECD Policy Guidance on Convergence and Next Generation Networks Introduction The digitalisation of content, the emergence of IP, and
Internet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges
Service Delivery Platforms for Network Operators
Service Delivery Platforms for Network Operators 26 Service Delivery Platforms for Network Operators Kansuke Kuroyanagi Yuichi Mori OVERVIEW: SDPs deployed by mobile operators have been successfully growing
How to Measure Network Performance by Using NGNs
Speech Quality Measurement Tools for Dynamic Network Management Simon Broom, Mike Hollier Psytechnics, 23 Museum Street, Ipswich, Suffolk, UK IP1 1HN Phone +44 (0)1473 261800, Fax +44 (0)1473 261880 [email protected]
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Plans and Strategies for UBcN Networks and Services
Journal of Information Processing Systems, Vol.6, No.3, September 2010 DOI : 10.3745/JIPS.2010.6.3.323 Plans and Strategies for UBcN Networks and Services Eunyoung Lee* Abstract The broadcasting & telecommunication
How To Test A Robot Platform And Its Components
An Automated Test Method for Robot Platform and Its Components Jae-Hee Lim 1, Suk-Hoon Song 1, Jung-Rye Son 1, Tae-Yong Kuc 2, Hong-Seong Park 3, Hong-Seok Kim 4 1,2 School of Information and Communication,
A Systemfor Scanning Traffic Detection in 3G WCDMA Network
2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore A Systemfor Scanning Traffic Detection in 3G WCDMA Network Sekwon Kim +, Joohyung Oh and Chaetae Im Advanced Technology
A Phased Framework for Countering VoIP SPAM
International Journal of Advanced Science and Technology 21 A Phased Framework for Countering VoIP SPAM Jongil Jeong 1, Taijin Lee 1, Seokung Yoon 1, Hyuncheol Jeong 1, Yoojae Won 1, Myuhngjoo Kim 2 1
Context-Aware Role Based Access Control Using User Relationship
International Journal of Computer Theory and Engineering, Vol. 5, No. 3, June 2013 Context-Aware Role Based Access Control Using User Relationship Kangsoo Jung and Seog Park We suggest relationship-based
Network Management Architectures for Broadband Satellite Multimedia Systems
Network Architectures for Broadband Multimedia Systems obert J. Mort Systek Consulting Ltd., Havant, UK [email protected] Matteo Berioli DL, Germany [email protected] Haitham Cruickshank, University
Architecture and Technologies for HGW
Architecture and Technologies for HGW Authors: Masahide Nishikawa* and Shunsuke Nishio* Home information and communication technology (ICT) service systems, where household appliances and devices are linked
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
The need for bandwidth management and QoS control when using public or shared networks for disaster relief work
International Telecommunication Union The need for bandwidth management and QoS control when using public or shared networks for disaster relief work Stephen Fazio Chief, Global Telecommunications Officer
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Yvette E. Gelogo 1, Ronnie D. Caytiles 1 and Byungjoo Park 1 * 1Multimedia Engineering Department,
Information Systems and Electronic Communications in Logistics Management
Information Systems and Electronic Communications in Logistics Management Ephrem Eyob, Virginia State University, Petersburg, VA 23806 [email protected] ABSTRACT Telecommunications and Networking Technologies
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information Changyong Lee, Hwankuk-Kim, Hyuncheol Jeong, Yoojae Won Korea Information Security Agency, IT Infrastructure Protection Division
Bachelor of Information Technology (Network Security)
Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking
Regional Development Forum for Africa. 18-19/5/2009 Lusaka (Zambia) Broadband Wireless Infrastructure & IPv6 Issues.
Désiré Karyabwite IP Coordinator, TND ITU-BDT Regional Development Forum for Africa 18-19/5/2009 Lusaka (Zambia) Broadband Wireless Infrastructure & IPv6 Issues E-mail: [email protected] International
COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments
Contents Foreword Preface Acknowledgments 1 Introduction 1 1.1 Motivation for Network Convergence 1 1.2 The Core Network 2 1.3 Legacy Service Requirements 4 1.4 New Service Requirements 5 1.5 Architectures
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
IT Security. Securing Your Business Investments
Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information
Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone
The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010 343 Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone Mohd Ismail Department
Firewall and VPN Investigation on Cloud Computing Performance
Firewall and VPN Investigation on Cloud Computing Performance Siddeeq Y. Ameen 1, Shayma Wail Nourildean 2 1 Department of Computer and Information Engineering, University of Mosul, Mosul, Iraq 2 Foundation
An Evaluation of Architectures for IMS Based Video Conferencing
An Evaluation of Architectures for IMS Based Video Conferencing Richard Spiers, Neco Ventura University of Cape Town Rondebosch South Africa Abstract The IP Multimedia Subsystem is an architectural framework
Cisco Satellite Services Platform Delivering Managed Services over Satellite
Solution Overview Cisco Satellite Services Platform Delivering Managed Services over Satellite With the increase in available bandwidth from the launch of high-throughput satellites, satellite service
NETCONF-based Integrated Management for Internet of Things using RESTful Web Services
NETCONF-based Integrated Management for Internet of Things using RESTful Web Services Hui Xu, Chunzhi Wang, Wei Liu and Hongwei Chen School of Computer Science, Hubei University of Technology, Wuhan, China
Section 6-Functional Requirements for IEEE 802.16m
Project IEEE 802.16 Broadband Wireless Access Working Group Title Section 6- Functional Requirements for IEEE 802.16m Date Submitted 2007-02-23 Source(s) Jeongki Kim Jaewon Lim
Service Quality Assessment in All-IP Networks
2010-6-1 Security Level: Service Quality Assessment in All-IP Networks Wu Xiangping & Himanshu Pant 2010 Annual CQR Workshop June 8-10, 2010 www.huawei.com HUAWEI TECHNOLOGIES CO., LTD. Huawei Agenda Background
2.3GHz Portable Internet (WiBro) for Wireless Broadband Access
ITU-APT Regional Seminar 2004 2.3GHz Portable Internet (WiBro) for Wireless Broadband Access Daehyoung Hong Chair, TTA 2.3GHz Portable Internet (WiBro) Project Group (PG302) and Professor, Sogang University,
RESILIENCE IN CONVERGED NETWORKS GOOD PRACTICE GUIDANCE
RESILIENCE IN CONVERGED NETWORKS GOOD PRACTICE GUIDANCE May 2009 Abstract: Converged networks, also known as next generation networks, (NGN), are increasingly used to provide telecommunications services.
A Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
Nokia Networks. security you can rely on
Nokia Networks security you can rely on Protecting communication networks is critical 7 billion mobile subscriptions in 2014 1 Mobile broadband network traffic expected to grow by a factor of 1,000 by
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.
Content 1.Introduction to Data and Network Security. 2. Why secure your Network 3. How Much security do you need, 4. Communication of network systems, 5. Topology security, 6. Cryptosystems and Symmetric
UIIPA - Security Risk Management. June 2015
UIIPA - Security Risk Management June 2015 1 Introduction Tim Hastings, Chief Information Security Officer State of Utah - Department of Technology Services Tim Hastings has more than 16 years of experience
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
The Experimental Practices of VoIP Based on the Commercial Softswitch Device
, pp. 167-176 http://dx.doi.org/10.14257/ijfgcn.2015.8.5.17 The Experimental Practices of VoIP Based on the Commercial Softswitch Device Liang Xin-tao 1, Zhu Hong-yuan 2 and Wang Dun-ci 1 1 College of
International Telecommunication Union. ITU Internet Report 2006 SUMMARY
International Telecommunication Union digital.lifelife ITU Internet Report 2006 SUMMARY This ITU Internet Report, the eighth in the series, has been produced by a team from the ITU Strategy and Policy
Alcatel-Lucent Services
SOLUTION DESCRIPTION Alcatel-Lucent Services Security Introduction Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or
A Study on Countering VoIP Spam using RBL
2011 2nd International Conference on Networking and Information Technology IPCSIT vol.17 (2011) (2011) IACSIT Press, Singapore A Study on Countering VoIP Spam using RBL Seokung Yoon, Haeryoung Park, Myoung
Agile Information Security Management in Software R&D
Agile Information Security Management in Software R&D Rational and WebSphere User Group Finland Seminar 29.01.2008 Reijo Savola Network and Information Security Research Coordinator VTT Technical Research
