Security in Telecommunications and Information Technology
Acknowledgements
Contents
Preface
Executive Summary
1 Scope of Manual
2 Basic Security Architectures and Services
2.1 The Open Systems Security Architecture (X.800)
2.2 The Lower and Upper Layer Security Models (X.802 and X.803)
2.3 The Security Frameworks (X.810-X.816)
2.4 Security Architecture for Systems Providing End-to-End Communications (X.805)
3 The Fundamentals of Protection: Threats, Vulnerabilities and Risks
4 Security Requirements for Telecommunication Networks
4.1 Rationale
4.2 General Security Objectives for Telecommunications Networks
5 Public Key and Privilege Management Infrastructures
5.1 Secret Key and Public Key Cryptography
5.2 Public Key Certificates
5.3 Public Key Infrastructures
5.4 Privilege Management Infrastructure
6 Applications
6.1 VoIP using H.323 Systems
6.2 IPCablecom System
6.3 Secure Fax Transmission
6.4 Network Management Applications
6.5 E-prescriptions
6.6 Secure Mobile End-to-End Data Communications
7 Availability Dimension and Infrastructure Layer
7.1 Path topologies and end-to-end path availability calculations
7.2 Enhance the availability of a transport network
� Overview
7.3 Protection
7.4 Restoration
7.5 Outside plant
8 Incident Organization and Security Incident Handling (Guidelines) for Telecommunications Organizations
8.1 Definitions
8.2 Rationale
9 Conclusions
References
Annex A � Catalogue of ITU-T Recommendations related to security
Annex B � Security Terminology
B.1 List of security-related terms and definitions
B.2 Security-related Acronyms
Annex C � List of Study Groups and Security-related Questions