Buy Security Management of Next Generation Telecommunications Networks and Services
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer networking and communications > Network security > Security Management of Next Generation Telecommunications Networks and Services: (IEEE Press Series on Network and Service Management)
Security Management of Next Generation Telecommunications Networks and Services: (IEEE Press Series on Network and Service Management)

Security Management of Next Generation Telecommunications Networks and Services: (IEEE Press Series on Network and Service Management)


     0     
5
4
3
2
1



International Edition


X
About the Book

This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to encryption and associated credentials management/control. The book will highlight deficiencies in existing protocols used for management and the transport of management information.

Table of Contents:

Preface xi

Acknowledgments xv

1 INTRODUCTION 1

1.1 Evolution of Networking Concepts 4

1.1.1 The Public Switched Telephone Network 4

1.1.2 Computer/Data Communications Networks 5

1.1.3 Network Architectures 6

1.1.4 Data Network Complexity 8

1.2 A Network Security Historical Perspective 13

1.2.1 ISO/IEC 7498–1 (ITU-T X.200) Coverage of Management 14

1.2.2 ISO/IEC 7498–4 (ITU-T X.700) Coverage of Security Management 15

1.2.3 ISO/IEC 7498–2 (ITU-T X.800) Coverage of Security and Management 15

1.2.4 The Security Frameworks (ITU-T X.810–ITU-T X.816) 23

1.2.5 The ITU-T X.805 Approach to Security 25

1.3 Network and Security Management Systems 26

1.3.1 Element and Network Management Systems 26

1.3.2 Operations Support Systems 27

1.4 Evolution of Network and Security Management Concepts 29

1.4.1 Telecommunications Management Network 29

1.4.2 Next Generation Operations Systems and Software 47

1.4.3 Enhanced Telecom Operations Map 50

1.5 How the Need for Information Security has Changed 57

1.6 Summary 61

Further Reading and Resources 62

2 OVERVIEW OF CURRENT AND FUTURE NETWORKS 63

2.1 A Little Network History 63

2.1.1 Point-to-Point Data Communications 64

2.1.2 Early Commercial Packet Switching 64

2.1.3 The ARPANET: Internet 64

2.1.4 Ethernet and IEEE 802.3 70

2.1.5 Network Address Translation 71

2.2 Common Network Organizations 72

2.2.1 Wired Local Area Networks 74

2.2.2 Wireless Networks 83

2.2.3 Metropolitan Area Networks 87

2.2.4 Wide Area Networks 94

2.2.5 Networks Are Now Layered upon Networks 96

2.2.6 Additional Networking Developments 96

2.2.7 Security Mechanisms in Modern Networks 105

2.3 Next-Generation Networks and Interfaces 108

2.3.1 Framework and Topology of the NGN 108

2.3.2 IP Multimedia Subsystem 125

2.4 Summary 133

Further Reading and Resources 136

3 SECURITY MANAGEMENT IN CURRENT AND FUTURE NETWORKS 139

3.1 Cybercrime as a Driver for Information Security Management 140

3.2 Governance as a Driver for Information Security Management 142

3.2.1 What Is Governance? 142

3.2.2 Information System Security Governance 143

3.3 Information Security Management Frameworks 145

3.3.1 ISO/IEC 27000 Series 146

3.3.2 The Information Technology Infrastructure Library Framework 164

3.3.3 COBIT Framework 167

3.3.4 FISMA Framework 173

3.4 A Holistic Approach for Security Management 176

3.4.1 Organizational Aspects of Security Governance and Management 176

3.4.2 Policies and Policy Hierarchies 180

3.4.3 Functional and Operational Security Requirements 183

3.5 Summary 189

Further Reading and Resources 189

4 RISK MANAGEMENT IN CURRENT AND FUTURE NETWORKS 191

4.1 Asset Identification: Definition and Inventorying 193

4.2 Impact Analysis 224

4.2.1 Existing System Impact Analysis 224

4.2.2 New System Impact Analysis 236

4.2.3 Risk Mitigation Analysis 240

4.2.4 Malicious Security Events and Threat Assessment 243

4.3 Risk Mitigation Controls Acquisition or Development 257

4.3.1 Procedural Risk Mitigation Controls 257

4.3.2 New Technical Risk Mitigation Controls 258

4.4 Risk Mitigation Controls Deployment Testing 273

4.5 Summary 274

Further Reading and Resources 275

5 OPERATIONAL MANAGEMENT OF SECURITY 277

5.1 Securing Management Applications and Communications 278

5.1.1 Security within Element and Network Management Systems 278

5.1.2 Telecommunications Management Network Security 279

5.1.3 Operations Support System Security Needs 281

5.1.4 Reflections on Past ITU Treatment of Managing Security 285

5.1.5 Management of Security Services and Mechanisms Revisited 288

5.1.6 A Security Management Framework 291

5.2 Security Operations and Maintenance 296

5.2.1 Operational Security Compliance Programs 297

5.2.2 Security Operations Reviews and Audits 301

5.2.3 Security Event Response and Incident Management 302

5.2.4 Penetration Testing 304

5.2.5 Common Criteria Evaluated Systems 306

5.2.6 Accreditation and Certification 309

5.3 Withdrawal from Service 312

5.4 Summary 314

5.5 Concluding Remarks 314

Further Reading and Resources 314

Appendices 318

Appendix A: Role of Cryptography in Information Security

Appendix B: Authentication of Subjects

Appendix C: Network Security Mechanisms

Appendix D: Example Company Security Policy

Appendix E: Example Generic Detailed Security Requirements

Appendix F: Securing Common Network Protocols

Appendix G: Security Mapping between M.3400 and M.3050 320

Appendix H: State Privacy Laws as of 2010 328

Appendix I: Example RFP Security Appendix

Appendix J: RFP Security Analysis of ABC Proposal

Appendix K: Example Security Statement of Work 339

Appendix L: Example Solaris Operating System Audit Procedures 348

Appendix M: Example Procedure for Basic Hardening of a Windows XP Professional Operating System 352

Appendix N: Example Network Audit Procedure 356

Appendix O: Example Unix–Linux Operating System

Audit Procedures 360

Index 365



About the Author :

STUART JACOBS is Principal Consultant for YCS Consulting LLC and a Lecturer at Boston University Metropolitan College. He serves as an Industry Security Subject Matter Expert for the Telecommunications Management and Operations Committee (TMOC) of the Alliance for the Telecommunications Industry Solutions (ATIS). Mr. Jacobs has also served as a technical editor of ATIS Joint Committee Technical Reports and ITU-T Recommendations.


Best Sellers


Product Details
  • ISBN-13: 9780470565131
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-IEEE Press
  • Height: 241 mm
  • No of Pages: 392
  • Returnable: N
  • Spine Width: 23 mm
  • Width: 161 mm
  • ISBN-10: 0470565136
  • Publisher Date: 06 Dec 2013
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Series Title: IEEE Press Series on Network and Service Management
  • Weight: 770 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Security Management of Next Generation Telecommunications Networks and Services: (IEEE Press Series on Network and Service Management)
John Wiley & Sons Inc -
Security Management of Next Generation Telecommunications Networks and Services: (IEEE Press Series on Network and Service Management)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security Management of Next Generation Telecommunications Networks and Services: (IEEE Press Series on Network and Service Management)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!