Telecommunications and Network Security

ثبت نشده
چکیده

The CIA TRIAD The following is how to preserve the CIA triad in the telecommunications and network security domain: Confidentiality – Network Security Protocols – Network authentication services – Data Encryption Services Integrity-Firewall Services-Communications Security Management-IDS's Availability-Fault tolerance for data availability, such as backups and redundant disk systems-Acceptable log-ins and operating process performance-Reliable and interoperable security processes and network security mechanisms Ill structured security mechanisms, over engineered, and poorly designed security systems can also impact the performance of a network REMOTE ACCESS SECURITY MANAGEMENT Several current remote computing technologies exist-DIAL UP, SYNC, & REMOTE INTERNET CONNECTIVITY (different ways to connect) DSL ISDN Wireless computing (mobile phone ,pdas) Cable modems-SECURING ENTERPRISE AND TELECOMMUTING REMOTE CONNECTIVITY(different ways to authenticate) Securing external connections (VPNs, SSL, SSH etc..) Remote access authentication systems (radius and tacacs) Remote Node authentication (PAP and CHAP)-REMOTE USER MANAGEMENT ISSUES Justification for and the validation of the use of remote computing systems Hardware and software distribution User support and remote assistance issues

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

Service Quality Management Modeling, Controlling and Upgrading as well as Communications and Information Technology Enhancement through Conducting a Case Study in the Parent Telecommunications Network of Iran

This paper reviews the service quality management control and upgrade as well as the communications and information technology enhancement. The purpose of this research is the control and improvement of the service quality management as well as the enhancement of the parent telecommunications network of I.R.Iran that finally, taking the specific conditions into consideration, the quality manage...

متن کامل

Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach

In recent years, many security threats have entered into the organizations’ information and changed the  organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...

متن کامل

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

Presenting a New Method Based on Branch Placement for Optimal Placement of Phasor Measurement Units

In this paper, a new method based on branch placement for the optimal positioning of Phasor Measurement Units (PMUs) in power systems is proposed. In this method, the PMUs are in type of single-channel and are installed at the beginning of the branches. Therefore, they are able to measure the bus voltages. Also, the installation of the PMUs on the branches increases the security of observabilit...

متن کامل

Demodulate-and-Forward Protocol for Multiuser Cooperative Transmission with Network Coding

1 Guoyou Li, 2 Yajian Zhou, 3 Mingfeng Zhao, 4 Yixian Yang Information Security Center, Beijing University of Posts and Telecommunications, Beijing, [email protected] 2 Information Security Center, Beijing University of Posts and Telecommunications, Beijing, [email protected] 3 China Mobile Group Design Institute Co., Ltd. Sichuan Branch, Chengdu [email protected] Information ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002