Security in Telecommunications and Information Technology 2012
Hide / Show Abstract

Security in Telecommunications and Information Technology 2012

An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications

The purpose of the ITU-T Manual on Security in Telecommunications and Information Technology is to provide a broad introduction to the security work of ITU-T. It is directed towards those who have responsibility for, or an interest in, information and communications security and the related standards, and those who simply need to gain a better understanding of ICT security issues and the corresponding ITU-T Recommendations.

Click to Access: 
    http://oecd.metastore.ingenta.com/content/pub-80601e27-en.pdf
  • PDF
  • http://www.keepeek.com/Digital-Asset-Management/oecd/science-and-technology/security-in-telecommunications-and-information-technology-2012_pub/80601e27-en
  • READ
 
Chapter
 

Securing the network infrastructure You do not have access to this content

English
Click to Access: 
    http://oecd.metastore.ingenta.com/content/pub-80601e27-80078ce4-en.pdf
  • PDF
  • http://www.keepeek.com/Digital-Asset-Management/oecd/science-and-technology/security-in-telecommunications-and-information-technology-2012_pub/80601e27-80078ce4-en
  • READ
Author(s):
ITU

Hide / Show Abstract

The data used to monitor and control the telecommunications network is often transmitted on a separate network that carries only the network management traffic (i.e., no user traffic). This network is often referred to as the telecommunication management network (TMN) as described in Recommendation ITU-T M.3010. It is imperative that this traffic be secured. The management traffic is usually categorized in terms of information required to perform fault, configuration, performance, accounting and security management functions. Network security management deals with setting up a secure management network as well as managing the security of information related to the three security planes of the ITU-T X.805 security architecture.