Security management of next generation telecommunications networks and services /

"This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communicati...

Full description

Bibliographic Details
Main Author: Jacobs, Stuart
Format: eBook
Language:English
Published: Hoboken, New Jersey : IEEE Press Wiley, [2014]
Series:IEEE Press series on networks and services management.
Subjects:
Online Access:Full Text via HEAL-Link
LEADER 06954nam a2200817 4500
001 ocn862114228
003 OCoLC
005 20170124072006.2
006 m o d
007 cr cnu---unuuu
008 131105s2014 nju ob 001 0 eng d
040 |a CDX  |b eng  |e rda  |e pn  |c CDX  |d IDEBK  |d CUS  |d DG1  |d COO  |d OCLCQ  |d YDXCP  |d N$T  |d IEEEE  |d OCLCQ  |d OCLCF  |d B24X7  |d STF  |d TEFOD  |d COD  |d OCLCQ  |d E7B  |d UKMGB  |d DEBBG  |d TEFOD  |d EBLCP  |d CNSPO  |d DEBSZ  |d GrThAP 
016 7 |a 015629709  |2 Uk 
019 |a 861081964  |a 868972110  |a 966353703 
020 |a 9781118741580  |q (electronic bk.) 
020 |a 1118741668  |q (electronic bk.) 
020 |a 1118741587  |q (electronic bk.) 
020 |a 9781118741665  |q (electronic bk.) 
020 |a 9781118746981  |q (electronic bk.) 
020 |a 1118746988  |q (electronic bk.) 
020 |z 0470565136 
020 |z 9780470565131 
020 |z 9781306028646 
020 |z 1306028647 
029 1 |a AU@  |b 000052334850 
029 1 |a CHBIS  |b 010131748 
029 1 |a CHVBK  |b 314712267 
029 1 |a NLGGC  |b 373100175 
029 1 |a NZ1  |b 15340630 
029 1 |a DEBBG  |b BV041905827 
029 1 |a DEBBG  |b BV043396325 
029 1 |a DEBSZ  |b 431542201 
035 |a (OCoLC)862114228  |z (OCoLC)861081964  |z (OCoLC)868972110  |z (OCoLC)966353703 
037 |a 84885734-D9C5-4069-AD8F-8670F80CDE05  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.59 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a MAIN 
100 1 |a Jacobs, Stuart. 
245 1 0 |a Security management of next generation telecommunications networks and services /  |c Stuart Jacobs. 
264 1 |a Hoboken, New Jersey :  |b IEEE Press Wiley,  |c [2014] 
300 |a 1 online resource (xvi, 373 pages). 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a IEEE Press series on networks and services management 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from PDF title page (Wiley, viewed November 8, 2013). 
520 |a "This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to encryption and associated credentials management/control. The book will highlight deficiencies in existing protocols used for management and the transport of management information."--  |c Unedited summary from book. 
505 0 |a SECURITYMANAGEMENTOF NEXT GENERATIONTELECOMMUNICATIONSNETWORKS ANDSERVICES; Copyright; Contents; Preface; Acknowledgments; 1 INTRODUCTION; 1.1 EVOLUTION OF NETWORKING CONCEPTS; 1.1.1 The Public Switched Telephone Network; 1.1.2 Computer/Data Communications Networks; 1.1.3 Network Architectures; 1.1.4 Data Network Complexity; 1.2 A NETWORK SECURITY HISTORICAL PERSPECTIVE; 1.2.1 ISO/IEC 7498-1 (ITU -T X.200) Coverage of Management; 1.2.2 ISO/IEC 7498-4 (ITU -T X.700) Coverage of Security Management; 1.2.3 ISO/IEC 7498-2 (ITU -T X.800) Coverage of Security and Management. 
505 8 |a 1.2.4 The Security Frameworks (ITU -T X.810- ITU -T X.816)1.2.5 The ITU -T X.805 Approach to Security; 1.3 NETWORK AND SECURITY MANAGEMENT SYSTEMS; 1.3.1 Element and Network Management Systems; 1.3.2 Operations Support Systems; 1.4 EVOLUTION OF NETWORK AND SECURITY MANAGEMENT CONCEPTS; 1.4.1 Telecommunications Management Network; 1.4.2 Next Generation Operations Systems and Software; 1.4.3 Enhanced Telecom Operations Map; 1.5 HOW THE NEED FOR INFORMATION SECURITY HAS CHANGED; 1.6 SUMMARY; FURTHER READING AND RESOURCES; 2 OVERVIEW OF CURRENT AND FUTURE NETWORKS; 2.1 A LITTLE NETWORK HISTORY. 
505 8 |a 2.1.1 Point-to-Point Data Communications2.1.2 Early Commercial Packet Switching; 2.1.3 The ARPANET: Internet; 2.1.4 Ethernet and IEEE 802.3; 2.1.5 Network Address Translation; 2.2 COMMON NETWORK ORGANIZATIONS; 2.2.1 Wired Local Area Networks; 2.2.2 Wireless Networks; 2.2.3 Metropolitan Area Networks; 2.2.4 Wide Area Networks; 2.2.5 Networks Are Now Layered upon Networks; 2.2.6 Additional Networking Developments; 2.2.7 Security Mechanisms in Modern Networks; 2.3 NEXT-GENERATION NETWORKS AND INTERFACES; 2.3.1 Framework and Topology of the NGN; 2.3.2 IP Multimedia Subsystem; 2.4 SUMMARY. 
505 8 |a FURTHER READING AND RESOURCES3 SECURITY MANAGEMENT IN CURRENT AND FUTURE NETWORKS; 3.1 CYBERCRIME AS A DRIVER FOR INFORMATION SECURITY MANAGEMENT; 3.2 GOVERNANCE AS A DRIVER FOR INFORMATION SECURITY MANAGEMENT; 3.2.1 What Is Governance?; 3.2.2 Information System Security Governance; 3.3 INFORMATION SECURITY MANAGEMENT FRAMEWORKS; 3.3.1 ISO/IEC 27000 Series; 3.3.2 The Information Technology Infrastructure Library Framework; 3.3.3 COBIT Framework; 3.3.4 FISMA Framework; 3.4 A HOLISTIC APPROACH FOR SECURITY MANAGEMENT; 3.4.1 Organizational Aspects of Security Governance and Management. 
505 8 |a 3.4.2 Policies and Policy Hierarchies3.4.3 Functional and Operational Security Requirements; 3.5 SUMMARY; FURTHER READING AND RESOURCES; 4 RISK MANAGEMENT IN CURRENT AND FUTURE NETWORKS; 4.1 ASSET IDENTIFICATION: DEFINITION AND INVENTORYING; 4.2 IMPACT ANALYSIS; 4.2.1 Existing System Impact Analysis; 4.2.2 New System Impact Analysis; 4.2.3 Risk Mitigation Analysis; 4.2.4 Malicious Security Events and Threat Assessment; 4.3 RISK MITIGATION CONTROLS ACQUISITION OR DEVELOPMENT; 4.3.1 Procedural Risk Mitigation Controls; 4.3.2 New Technical Risk Mitigation Controls. 
650 0 |a Computer networks  |x Security measures. 
650 7 |a COMPUTERS  |x Security  |x Online Safety & Privacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 4 |a Computer networks  |x Security measures. 
650 4 |a Computer security  |x Management. 
650 4 |a Computer security. 
650 4 |a COMPUTERS  |x Networking  |x Security. 
655 4 |a Electronic books. 
655 0 |a Electronic books. 
776 0 8 |i Print version:  |a Jacobs, Stuart.  |t Security management of next generation telecommunications networks and services.  |d Hoboken, New Jersey : Wiley, c2014  |h xv, 373 pages  |k IEEE Press Series on Networks and Services Management  |z 9780470565131  |w 2013011611 
830 0 |a IEEE Press series on networks and services management. 
856 4 0 |u https://doi.org/10.1002/9781118741580  |z Full Text via HEAL-Link 
994 |a 92  |b DG1