Security management of next generation telecommunications networks and services /
"This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communicati...
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Hoboken, New Jersey :
IEEE Press Wiley,
[2014]
|
Series: | IEEE Press series on networks and services management.
|
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- SECURITYMANAGEMENTOF NEXT GENERATIONTELECOMMUNICATIONSNETWORKS ANDSERVICES; Copyright; Contents; Preface; Acknowledgments; 1 INTRODUCTION; 1.1 EVOLUTION OF NETWORKING CONCEPTS; 1.1.1 The Public Switched Telephone Network; 1.1.2 Computer/Data Communications Networks; 1.1.3 Network Architectures; 1.1.4 Data Network Complexity; 1.2 A NETWORK SECURITY HISTORICAL PERSPECTIVE; 1.2.1 ISO/IEC 7498-1 (ITU -T X.200) Coverage of Management; 1.2.2 ISO/IEC 7498-4 (ITU -T X.700) Coverage of Security Management; 1.2.3 ISO/IEC 7498-2 (ITU -T X.800) Coverage of Security and Management.
- 1.2.4 The Security Frameworks (ITU -T X.810- ITU -T X.816)1.2.5 The ITU -T X.805 Approach to Security; 1.3 NETWORK AND SECURITY MANAGEMENT SYSTEMS; 1.3.1 Element and Network Management Systems; 1.3.2 Operations Support Systems; 1.4 EVOLUTION OF NETWORK AND SECURITY MANAGEMENT CONCEPTS; 1.4.1 Telecommunications Management Network; 1.4.2 Next Generation Operations Systems and Software; 1.4.3 Enhanced Telecom Operations Map; 1.5 HOW THE NEED FOR INFORMATION SECURITY HAS CHANGED; 1.6 SUMMARY; FURTHER READING AND RESOURCES; 2 OVERVIEW OF CURRENT AND FUTURE NETWORKS; 2.1 A LITTLE NETWORK HISTORY.
- 2.1.1 Point-to-Point Data Communications2.1.2 Early Commercial Packet Switching; 2.1.3 The ARPANET: Internet; 2.1.4 Ethernet and IEEE 802.3; 2.1.5 Network Address Translation; 2.2 COMMON NETWORK ORGANIZATIONS; 2.2.1 Wired Local Area Networks; 2.2.2 Wireless Networks; 2.2.3 Metropolitan Area Networks; 2.2.4 Wide Area Networks; 2.2.5 Networks Are Now Layered upon Networks; 2.2.6 Additional Networking Developments; 2.2.7 Security Mechanisms in Modern Networks; 2.3 NEXT-GENERATION NETWORKS AND INTERFACES; 2.3.1 Framework and Topology of the NGN; 2.3.2 IP Multimedia Subsystem; 2.4 SUMMARY.
- FURTHER READING AND RESOURCES3 SECURITY MANAGEMENT IN CURRENT AND FUTURE NETWORKS; 3.1 CYBERCRIME AS A DRIVER FOR INFORMATION SECURITY MANAGEMENT; 3.2 GOVERNANCE AS A DRIVER FOR INFORMATION SECURITY MANAGEMENT; 3.2.1 What Is Governance?; 3.2.2 Information System Security Governance; 3.3 INFORMATION SECURITY MANAGEMENT FRAMEWORKS; 3.3.1 ISO/IEC 27000 Series; 3.3.2 The Information Technology Infrastructure Library Framework; 3.3.3 COBIT Framework; 3.3.4 FISMA Framework; 3.4 A HOLISTIC APPROACH FOR SECURITY MANAGEMENT; 3.4.1 Organizational Aspects of Security Governance and Management.
- 3.4.2 Policies and Policy Hierarchies3.4.3 Functional and Operational Security Requirements; 3.5 SUMMARY; FURTHER READING AND RESOURCES; 4 RISK MANAGEMENT IN CURRENT AND FUTURE NETWORKS; 4.1 ASSET IDENTIFICATION: DEFINITION AND INVENTORYING; 4.2 IMPACT ANALYSIS; 4.2.1 Existing System Impact Analysis; 4.2.2 New System Impact Analysis; 4.2.3 Risk Mitigation Analysis; 4.2.4 Malicious Security Events and Threat Assessment; 4.3 RISK MITIGATION CONTROLS ACQUISITION OR DEVELOPMENT; 4.3.1 Procedural Risk Mitigation Controls; 4.3.2 New Technical Risk Mitigation Controls.