ITU-T STIT-2012 Security in Telecommunications and Information Technology (Study Group 17)《信息技术和通讯安全(研究组17)》.pdf
《ITU-T STIT-2012 Security in Telecommunications and Information Technology (Study Group 17)《信息技术和通讯安全(研究组17)》.pdf》由会员分享,可在线阅读,更多相关《ITU-T STIT-2012 Security in Telecommunications and Information Technology (Study Group 17)《信息技术和通讯安全(研究组17)》.pdf(170页珍藏版)》请在麦多课文档分享上搜索。
1、Printed in SwitzerlandGeneva, 2012ISBN 978-92-61-14001-4Telecommunication Standardization Sector of ITUInternational Telecommunication UnionSecurity in Telecommunications and Information TechnologyAn overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunication
2、sITU-TITU-T2012*37139*Security in telecommunications and information technology An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications January 2012 ITU 2012 All rights reserved. No part of this publication may be reproduced, by any means whatsoever,
3、without the prior written permission of ITU. SECURITY IN TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY Prefix i Foreword Malcolm Johnson Director ITU Telecommunication Standardization Bureau Until relatively recently, information and communication technology (ICT) security was mainly of concern to a
4、pplication areas such as banking, aerospace and defence. However, with the rapid and widespread growth in the use of data communications and, particularly the Internet, security is now a universal concern. The increased profile of ICT security may be attributed in part to widely-reported incidents s
5、uch as viruses, hackers and threats to personal privacy, but the reality is that, as computing and networking are now such an important part of daily life, the need for effective security measures to protect the ICT systems of governments, industry, commerce, critical infrastructures and individual
6、users is now imperative. Also, many countries now have data protection laws that require adherence to recognized standards of protection. To be truly effective, security must be considered at all stages of the system lifecycle, from inception and design through implementation, deployment and finally
7、, decommissioning. Failure to give adequate consideration to security at any of these stages can result in systems or data being compromised. Standards bodies have a vital role to play by promoting awareness of ICT security issues, by ensuring that security considerations are a fundamental part of s
8、pecifications, and by providing technical standards and guidance to help implementers and users to ensure communication systems and services are sufficiently robust to withstand cyber-attacks. ITU-T has long been active in ICT security work but the workload has recently grown quite dramatically in r
9、esponse to new and evolving threats and the demands of our members for standards to help counter these threats. This manual highlights some of the key elements of that work and provides an introduction to the extensive resources available from the ITU-T to help users address the ICT security challen
10、ges we face. Standardization is a key building block in constructing a global culture of cybersecurity. We can and will win the war against cyber-threats by building on the work of the thousands of dedicated individuals from public administrations, the private sector and academia, who come together,
11、 in organizations like the ITU, to develop security standards and guidelines for best practice. The work is not glamorous, or high profile, but it is nonetheless essential to safeguard our digital future. I would like to express my appreciation to the engineers of the ITU Telecommunication Standardi
12、zation Bureau who, in conjunction with experts from the ITU membership, have worked, and continue to work, so tirelessly to develop these standards and guidelines. I hope that you will find this manual helpful in gaining a better understanding of ICT security issues and the work of the ITU-T and I w
13、elcome feedback from readers for future editions. Malcolm Johnson Director Telecommunication Standardization Bureau, ITU SECURITY IN TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY ii Acknowledgements Acknowledgements This manual was prepared with the contribution of numerous authors who either contri
14、buted to the generation of the relevant ITU-T Recommendations or participated in the ITU-T Study Group meetings, workshops and seminars. Credit should be given to the Rapporteurs, editors, and security coordinators of the ITU Study Groups, to Martin Euchner, SG 17 Advisor and Georges Sebek, the form
15、er SG 17 counsellor, and in particular to Herb Bertine, the former Chairman of the lead Study Group in ITU-T for work on telecommunications security and Mike Harrop, the former Rapporteur for the security project and chief editor of this manual. SECURITY IN TELECOMMUNICATIONS AND INFORMATION TECHNOL
16、OGY Executive Summary iii Executive Summary This manual provides a broad introduction to the ICT security work of the ITU-T and, more specifically, it summarizes how the ITU-T is responding to global cybersecurity challenges with Recommendations, guidance documents and outreach initiatives. It is pr
17、imarily directed towards those who have responsibility for, or an interest in, information and communications security and the related standards, as well as those who simply need to gain a better understanding of ICT security issues. The manual can be used in various ways according to the organizati
18、on, role and needs of the user. The introductory chapters provide an overview of the current key areas of the ITU-T security work together with a discussion of the basic requirements for the protection of ICT applications, services and information. The threats and vulnerabilities that drive security
19、 requirements are highlighted and the role of standards in meeting the requirements is examined. Some of the features that are needed to protect the various entities involved in providing, supporting and using information and communications technology and services are discussed. In addition, the imp
20、ortance of ICT security standards is explained and examples are given of how the ITU-T security work is evolving to meet security requirements. The generic security architectures for open systems and end-to-end communications are then introduced together with some examples of application-specific ar
21、chitectures. These architectures each establish a framework within which the multiple facets of security can be applied in a consistent manner. They also standardize the underlying concepts of security services and mechanisms and contribute to a standardized vocabulary for ICT security terms and bas
22、ic concepts. The general principles introduced in these architectures form the basis for many of the other standards on security services, mechanisms and protocols, some of which are discussed later in the text. Security management embraces many activities associated with controlling and protecting
23、access to system and network resources, event monitoring and reporting, policy and auditing, as well as managing the information related to these functions and activities. The topics of information security management, risk management and asset management are the focus of one section. Management act
24、ivities associated with securing the network infrastructure are discussed later in the text in a section that covers the need to secure the data used to monitor and control the telecommunications network as well as topics related to network management and common security management services. The Dir
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITUTSTIT2012SECURITYINTELECOMMUNICATIONSANDINFORMATIONTECHNOLOGYSTUDYGROUP17 信息技术 通讯 安全 研究 17 PDF

链接地址:http://www.mydoc123.com/p-803508.html