ATIS 0100010-2007 Security for Next Generation Networks - An End User Perspective.pdf
《ATIS 0100010-2007 Security for Next Generation Networks - An End User Perspective.pdf》由会员分享,可在线阅读,更多相关《ATIS 0100010-2007 Security for Next Generation Networks - An End User Perspective.pdf(25页珍藏版)》请在麦多课文档分享上搜索。
1、 ATIS-0100010 SECURITY FOR NEXT GENERATION NETWORKS - AN END USER PERSPECTIVE TECHNICAL REPORT The Alliance for Telecommunication Industry Solutions (ATIS) is a technical planning and standards development organization that is committed to rapidly developing and promoting technical and operations st
2、andards for the communications and related information technologies industry worldwide using a pragmatic, flexible and open approach. Over 1,100 participants from over 300 communications companies are active in ATIS 22 industry committees and its Incubator Solutions Program. Notice of Disclaimer or,
3、 when used in the context of authentication, provides an authentication that with high assurance can be asserted to be genuine, and that can not subsequently be refuted. 6.4 Audit Logging Audit logs are created to allow for the incident post-mortems and resulting investigation. They are also require
4、d to support repudiation services. For a detailed discussion on audit logging, see T1.276-2003 3. 6.5 Data Confidentiality and Privacy Additional security requirements are usually placed on the user plane due to the nature of IP traffic Requirements need to be based on the premise of achieving, at a
5、 minimum, the same level of security that would be provided by a legacy TDM system. In developing the analogy with the legacy system, consideration must be given to whether the user is trying to achieve a limited level of privacy for the session or requires a higher level of security that provides c
6、onfidentiality of the content. While users and enterprises often will express the need for security of the voice traffic or secure VoIP, they will not differentiate between confidentiality, privacy, and other security services. They will state their requirement as security or encryption. In the case
7、 of security of the user channel, when questioned, the user wants the same level of privacy that was present on a legacy system. Legacy systems offer no formal confidentiality mechanisms; they only offer a level of privacy implicit in their point-to-point local loop design. Confidentiality implies a
8、 degree of back traffic (i.e., stored encrypted traffic) protection - the encrypted traffic will resist brute force attack for specified number of years. Conversely, privacy does ATIS-0100010 8 not provide any degree of back traffic protection; it refers more to the rights of individuals and organiz
9、ations to control the collection, storage, and dissemination of their information or information about themselves. Unlike confidentiality, which has a weak legal definition, privacy is defined by the Organization for Economic Co-Operation and Development (OECD) . The European Union and numerous nati
10、onal laws. Care must be taken to ensure that those users security requirements are understood; whether they require confidentiality or they actually require privacy equivalent to a TDM network. The User-Network and Network-Network Interfaces will provide for both privacy enhancing technologies as we
11、ll as more formal confidentiality technologies based on the user requirement. These confidentiality technologies will meet FIPS 140-2 as discussed in 6.10; however, privacy-enhancing technologies will just provide various degrees of privacy protection. 6.5.1 Contrasting Data Confidentiality and Priv
12、acy Confidentiality is perhaps the most confusing term in the information security community. It is a: Label for data: “This document is confidential”; Security service: “Confidentiality is provided by cryptography”; or Security policy: “This information will be treated as confidential.” More formal
13、ly, the definition is given as assurance that information is not disclosed to unauthorized entities or processes. Many individuals when speaking about security are referring indirectly to confidentiality. They may also use the term encryption, or as discussed previously privacy. Strictly speaking, c
14、onfidentiality - with its requirement to protect the information long after the information interchange has completed is a limited requirement for the VoIP space. Most telephone calls are less than three (3) minutes in length, with a requirement for protection of the contents of the bearer path for
15、a very short duration. In these cases, the needed level of confidentiality can be provided by privacy-enhancing technologies instead of cryptography. Privacy and Data Confidentiality are terms often confused by the popular press and used as synonyms by some well-meaning technical documentation. It i
16、s proposed that in this context the definitions for privacy, as defined by the ATIS-0100523.2007, ATIS Telecom Glossary 2007, be used. ATIS-0100523.2007 8 defines privacy as: privacy: 1. In a communications system or network, the protection given to information to conceal it from unauthorized person
17、s having access to the system or network at large. Synonym segregation. 2. In a communications system, protection given to unclassified information, such as radio transmissions of law enforcement personnel, that requires safeguarding from unauthorized persons. 3. In a communications system, the prot
18、ection given to prevent unauthorized disclosure of the information in the system. Note 1: The required protection may be accomplished by various means, such as by communications security measures and by directives to operating personnel. Note 2: The limited protection given certain voice and data tr
19、ansmissions by commercial crypto equipment is sufficient to deter a casual listener, but cannot withstand a competent cryptanalytic attack. 4. The right of individuals to control or influence what information related to them may be collected and stored and by whom and to whom that information may be
20、 disclosed. ATIS-0100010 9 NOTE - Because this term relates to the right of individuals, it cannot be very precise and its use should be avoided except as a motivation for requiring security 7498-2. The term privacy enhancing technologies means by inference, technologies that limit surveillance. Sim
21、ilarly, the term data confidentiality mechanisms are technologies that provide for maintaining the confidentiality of data. It should be also noted that encryption is a data confidentiality mechanism, but it is not the only data confidentiality mechanism. Many times the term encryption is used collo
22、quially to refer to a broad class of data confidentiality mechanisms. The distinction must be made since new legislation requirements such as the Health Information Privacy and Portably Act (HIPPA) require both privacy enhancing technologies as well as data confidentiality mechanisms. 6.5.2 Data Con
23、fidentiality Requirements for the User Plane In order to achieve at least the same level of data confidentiality protection that is present in TDM systems, NGN must implement services which ensure data confidentiality. These mechanisms must ensure that the information in a Network system and transmi
24、tted information is accessible for reading or modification only by authorized parties. These confidentiality mechanisms must also provide an appropriate level of “back-traffic” (i.e., stored encrypted traffic) protection that will protect the information for the desired length of time. In order to v
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATIS01000102007SECURITYFORNEXTGENERATIONNETWORKSANENDUSERPERSPECTIVEPDF

链接地址:http://www.mydoc123.com/p-540846.html