Security management of next generation telecommunications networks and services:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
Wiley
2014
|
Schriftenreihe: | IEEE press series on networks and service management
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XV, 373 S. Ill. |
ISBN: | 9780470565131 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV036806417 | ||
003 | DE-604 | ||
005 | 20140127 | ||
007 | t | ||
008 | 101130s2014 a||| |||| 00||| eng d | ||
015 | |a GBB098454 |2 dnb | ||
020 | |a 9780470565131 |c hbk |9 978-0-470-56513-1 | ||
035 | |a (OCoLC)706018064 | ||
035 | |a (DE-599)BVBBV036806417 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Jacobs, Stuart |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security management of next generation telecommunications networks and services |c Stuart Jacobs |
264 | 1 | |a Hoboken, NJ |b Wiley |c 2014 | |
300 | |a XV, 373 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a IEEE press series on networks and service management | |
650 | 4 | |a Telecommunication systems / Security measures | |
650 | 4 | |a Computer networks / Security measures | |
650 | 0 | 7 | |a Telekommunikationsnetz |0 (DE-588)4133586-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Telekommunikationsnetz |0 (DE-588)4133586-7 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020722492&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-020722492 |
Datensatz im Suchindex
_version_ | 1804143500636192768 |
---|---|
adam_text | CONTENTS
Preface
xi
Acknowledgments
xv
1
INTRODUCTION
1
I
.
I Evolution of Networking Concepts
4
1.1.1
The Public Switched Telephone Network
4
1.1.2
Computer/Data Communications Networks
5
1.1.3
Network Architectures
6
1.1.4
Data Network Complexity
8
1.2
A Network Security Historical Perspective
13
1.2.1
1SO/IEC
7498-1
(ITU-T X.200) Coverage of Management
14
1.2.2
ISO/IEC
7498-4
(ITU-T X.700) Coverage of
Security Management
15
1.2.3
ISO/IEC
7498-2
(ITU-T X.800) Coverage of
Security and Management
15
1.2.4
The Security Frameworks (ITU-T X.810-ITU-T X.8
16) 23
1.2.5
The ITU-T X.805 Approach to Security
25
1.3
Network and Security Management Systems
26
1.3.1
Element and Network Management Systems
26
1.3.2
Operations Support Systems
27
1.4
Evolution of Network and Security Management Concepts
29
1.4.1
Telecommunications Management Network
29
1.4.2
Next Generation Operations Systems and Software
47
1.4.3
Enhanced Telecom Operations Map
50
1.5
How the Need for Information Security has Changed
57
1.6
Summary
61
Further Reading and Resources
62
2
OVERVIEW OF CURRENT AND FUTURE NETWORKS
63
2.1
A Little Network History
63
2.1.1
Point-to-Point Data Communications
64
vii
VÜi CONTENTS
2.1.2
Early
Commercial
Packet
Switching
64
2.1.3
The ARPANET: Internet
64
2.
1
.4
Ethernet and IEEE
802.3 70
2.1.5
Network Address Translation
71
2.2
Common Network Organizations
72
2.2.1
Wired Local Area Networks
74
2.2.2
Wireless Networks
S3
2.2.3
Metropolitan Area Networks
87
2.2.4
Wide Area Networks
94
2.2.5
Networks Are Now Layered upon Networks
96
2.2.6
Additional Networking Developments
96
2.2.7
Security Mechanisms in Modern Networks
105
2.3
Next-Generation Networks and Interfaces
108
2.3.1
Framework and Topology of the NGN
108
2.3.2
IP Multimedia Subsystem
125
2.4
Summary
133
Further Reading and Resources
136
3
SECURITY MANAGEMENT IN CURRENT AND FUTURE NETWORKS
139
3.
1 Cybercrime as a Driver for Information Security Management
140
3.2
Governance as a Driver for Information Security Management
142
3.2.1
What Is Governance?
142
3.2.2
Information System Security Governance
143
3.3
Information Security Management Frameworks
145
3.3.1
ISO/IEC
27000
Series
146
3.3.2
The Information Technology Infrastructure Library Framework
164
3.3.3
COBIT
Framework
167
3.3.4
FIS MA
Framework
173
3.4
A Holistic Approach for Security Management
176
3.4.1
Organizational Aspects of Security Governance and Management
176
3.4.2
Policies and Policy Hierarchies
180
3.4.3
Functional and Operational Security Requirements
183
3.5
Summary
189
Further Reading and Resources
189
4
RISK MANAGEMENT IN CURRENT AND FUTURE NETWORKS
191
4.1
Asset Identification: Definition and Inventorying
193
4.2
Impact Analysis
224
4.2.1
Existing System Impact Analysis
224
CONTENTS
ІХ
4.2.2 New System
Impact
Analysis
236
4.2.3
Risk Mitigation Analysis
240
4.2.4
Malicious Security Events and Threat Assessment
243
4.3
Risk Mitigation Controls Acquisition or Development
257
4.3.1
Procedural Risk Mitigation Controls
257
4.3.2
New Technical Risk Mitigation Controls
258
4.4
Risk Mitigation Controls Deployment Testing
273
4.5
Summary
274
Further Reading and Resources
275
5
OPERATIONAL MANAGEMENT OF SECURITY
277
5.1
Securing Management Applications and Communications
278
5.
5.
5.
5.
5.
5.
.1
Security within Element and Network Management Systems
278
.2
Telecommunications Management Network Security
279
.3
Operations Support System Security Needs
281
.4
Reflections on Past ITU Treatment of Managing Security
285
.5
Management of Security Services and Mechanisms Revisited
288
.6
A Security Management Framework
291
5.2
Security Operations and Maintenance
296
5.2.1
Operational Security Compliance Programs
297
5.2.2
Security Operations Reviews and Audits
301
5.2.3
Security Event Response and Incident Management
302
5.2.4
Penetration Testing
304
5.2.5
Common Criteria Evaluated Systems
306
5.2.6
Accreditation and Certification
309
5.3
Withdrawal from Service
312
5.4
Summary
314
5.5
Concluding Remarks
314
Further Reading and Resources
314
APPENDICES
318
Italicized appendices will be available at http://booksupport.wHey.com
Appendix A: Role of Cryptography in Information
Security
Appendix B: Authentication of Subjects
Appendix C; Network Security Mechanisms
Appendix D: Example Company Security Policy
X
CONTENTS
Appendix E:
Example Generic Detailed Security Requirements
Appendix F: Securing Common Network Protocols
Appendix G: Security Mapping between IVI.3400 and M.3050
320
Appendix H: State Privacy Laws as of
2010 328
Appendix I: Example RFP Security Appendix
Appendix J: RFP Security Analysis of ABC Proposal
Appendix K: Example Security Statement of Work
339
Appendix L: Example Solaris Operating System Audit Procedures
348
Appendix M: Example Procedure for Basic Hardening
of a Windows XP Professional Operating System
352
Appendix N: Example Network Audit Procedure
356
Appendix O: Example Unix-Linux Operating System
Audit Procedures
360
Index
365
|
any_adam_object | 1 |
author | Jacobs, Stuart |
author_facet | Jacobs, Stuart |
author_role | aut |
author_sort | Jacobs, Stuart |
author_variant | s j sj |
building | Verbundindex |
bvnumber | BV036806417 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)706018064 (DE-599)BVBBV036806417 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01562nam a2200385 c 4500</leader><controlfield tag="001">BV036806417</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140127 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">101130s2014 a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB098454</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470565131</subfield><subfield code="c">hbk</subfield><subfield code="9">978-0-470-56513-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)706018064</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV036806417</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jacobs, Stuart</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security management of next generation telecommunications networks and services</subfield><subfield code="c">Stuart Jacobs</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 373 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IEEE press series on networks and service management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication systems / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Telekommunikationsnetz</subfield><subfield code="0">(DE-588)4133586-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Telekommunikationsnetz</subfield><subfield code="0">(DE-588)4133586-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020722492&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020722492</subfield></datafield></record></collection> |
id | DE-604.BV036806417 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:48:39Z |
institution | BVB |
isbn | 9780470565131 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020722492 |
oclc_num | 706018064 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG |
owner_facet | DE-473 DE-BY-UBG |
physical | XV, 373 S. Ill. |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Wiley |
record_format | marc |
series2 | IEEE press series on networks and service management |
spelling | Jacobs, Stuart Verfasser aut Security management of next generation telecommunications networks and services Stuart Jacobs Hoboken, NJ Wiley 2014 XV, 373 S. Ill. txt rdacontent n rdamedia nc rdacarrier IEEE press series on networks and service management Telecommunication systems / Security measures Computer networks / Security measures Telekommunikationsnetz (DE-588)4133586-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Telekommunikationsnetz (DE-588)4133586-7 s Datensicherung (DE-588)4011144-1 s DE-604 Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020722492&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Jacobs, Stuart Security management of next generation telecommunications networks and services Telecommunication systems / Security measures Computer networks / Security measures Telekommunikationsnetz (DE-588)4133586-7 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4133586-7 (DE-588)4011144-1 |
title | Security management of next generation telecommunications networks and services |
title_auth | Security management of next generation telecommunications networks and services |
title_exact_search | Security management of next generation telecommunications networks and services |
title_full | Security management of next generation telecommunications networks and services Stuart Jacobs |
title_fullStr | Security management of next generation telecommunications networks and services Stuart Jacobs |
title_full_unstemmed | Security management of next generation telecommunications networks and services Stuart Jacobs |
title_short | Security management of next generation telecommunications networks and services |
title_sort | security management of next generation telecommunications networks and services |
topic | Telecommunication systems / Security measures Computer networks / Security measures Telekommunikationsnetz (DE-588)4133586-7 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Telecommunication systems / Security measures Computer networks / Security measures Telekommunikationsnetz Datensicherung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020722492&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT jacobsstuart securitymanagementofnextgenerationtelecommunicationsnetworksandservices |