Security Management of Next Generation Telecommunications Networks and Services / Edition 1

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $102.25
Usually ships in 1-2 business days
(Save 20%)
Other sellers (Hardcover)
  • All (7) from $102.25   
  • New (6) from $102.25   
  • Used (1) from $121.31   


This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to encryption and associated credentials management/control. The book will highlight deficiencies in existing protocols used for management and the transport of management information.

Read More Show Less

Product Details

Meet the Author

STUART JACOBS is Principal Consultant for YCS Consulting LLC and a Lecturer at Boston University Metropolitan College. He serves as an Industry Security Subject Matter Expert for the Telecommunications Management and Operations Committee (TMOC) of the Alliance for the Telecommunications Industry Solutions (ATIS). Mr. Jacobs has also served as a technical editor of ATIS Joint Committee Technical Reports and ITU-T Recommendations.

Read More Show Less

Table of Contents

Preface xi

Acknowledgments xv


1.1 Evolution of Networking Concepts 4

1.1.1 The Public Switched Telephone Network 4

1.1.2 Computer/Data Communications Networks 5

1.1.3 Network Architectures 6

1.1.4 Data Network Complexity 8

1.2 A Network Security Historical Perspective 13

1.2.1 ISO/IEC 7498–1 (ITU-T X.200) Coverage of Management 14

1.2.2 ISO/IEC 7498–4 (ITU-T X.700) Coverage of Security Management 15

1.2.3 ISO/IEC 7498–2 (ITU-T X.800) Coverage of Security and Management 15

1.2.4 The Security Frameworks (ITU-T X.810–ITU-T X.816) 23

1.2.5 The ITU-T X.805 Approach to Security 25

1.3 Network and Security Management Systems 26

1.3.1 Element and Network Management Systems 26

1.3.2 Operations Support Systems 27

1.4 Evolution of Network and Security Management Concepts 29

1.4.1 Telecommunications Management Network 29

1.4.2 Next Generation Operations Systems and Software 47

1.4.3 Enhanced Telecom Operations Map 50

1.5 How the Need for Information Security has Changed 57

1.6 Summary 61

Further Reading and Resources 62


2.1 A Little Network History 63

2.1.1 Point-to-Point Data Communications 64

2.1.2 Early Commercial Packet Switching 64

2.1.3 The ARPANET: Internet 64

2.1.4 Ethernet and IEEE 802.3 70

2.1.5 Network Address Translation 71

2.2 Common Network Organizations 72

2.2.1 Wired Local Area Networks 74

2.2.2 Wireless Networks 83

2.2.3 Metropolitan Area Networks 87

2.2.4 Wide Area Networks 94

2.2.5 Networks Are Now Layered upon Networks 96

2.2.6 Additional Networking Developments 96

2.2.7 Security Mechanisms in Modern Networks 105

2.3 Next-Generation Networks and Interfaces 108

2.3.1 Framework and Topology of the NGN 108

2.3.2 IP Multimedia Subsystem 125

2.4 Summary 133

Further Reading and Resources 136


3.1 Cybercrime as a Driver for Information Security Management 140

3.2 Governance as a Driver for Information Security Management 142

3.2.1 What Is Governance? 142

3.2.2 Information System Security Governance 143

3.3 Information Security Management Frameworks 145

3.3.1 ISO/IEC 27000 Series 146

3.3.2 The Information Technology Infrastructure Library Framework 164

3.3.3 COBIT Framework 167

3.3.4 FISMA Framework 173

3.4 A Holistic Approach for Security Management 176

3.4.1 Organizational Aspects of Security Governance and Management 176

3.4.2 Policies and Policy Hierarchies 180

3.4.3 Functional and Operational Security Requirements 183

3.5 Summary 189

Further Reading and Resources 189


4.1 Asset Identification: Definition and Inventorying 193

4.2 Impact Analysis 224

4.2.1 Existing System Impact Analysis 224

4.2.2 New System Impact Analysis 236

4.2.3 Risk Mitigation Analysis 240

4.2.4 Malicious Security Events and Threat Assessment 243

4.3 Risk Mitigation Controls Acquisition or Development 257

4.3.1 Procedural Risk Mitigation Controls 257

4.3.2 New Technical Risk Mitigation Controls 258

4.4 Risk Mitigation Controls Deployment Testing 273

4.5 Summary 274

Further Reading and Resources 275


5.1 Securing Management Applications and Communications 278

5.1.1 Security within Element and Network Management Systems 278

5.1.2 Telecommunications Management Network Security 279

5.1.3 Operations Support System Security Needs 281

5.1.4 Reflections on Past ITU Treatment of Managing Security 285

5.1.5 Management of Security Services and Mechanisms Revisited 288

5.1.6 A Security Management Framework 291

5.2 Security Operations and Maintenance 296

5.2.1 Operational Security Compliance Programs 297

5.2.2 Security Operations Reviews and Audits 301

5.2.3 Security Event Response and Incident Management 302

5.2.4 Penetration Testing 304

5.2.5 Common Criteria Evaluated Systems 306

5.2.6 Accreditation and Certification 309

5.3 Withdrawal from Service 312

5.4 Summary 314

5.5 Concluding Remarks 314

Further Reading and Resources 314

Appendices 318

Appendix A: Role of Cryptography in Information Security

Appendix B: Authentication of Subjects

Appendix C: Network Security Mechanisms

Appendix D: Example Company Security Policy

Appendix E: Example Generic Detailed Security Requirements

Appendix F: Securing Common Network Protocols

Appendix G: Security Mapping between M.3400 and M.3050 320

Appendix H: State Privacy Laws as of 2010 328

Appendix I: Example RFP Security Appendix

Appendix J: RFP Security Analysis of ABC Proposal

Appendix K: Example Security Statement of Work 339

Appendix L: Example Solaris Operating System Audit Procedures 348

Appendix M: Example Procedure for Basic Hardening of a Windows XP Professional Operating System 352

Appendix N: Example Network Audit Procedure 356

Appendix O: Example Unix–Linux Operating System

Audit Procedures 360

Index 365

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)