Security management of next generation telecommunications networks and services / (Record no. 40591)

MARC details
000 -LEADER
fixed length control field 09935nam a2200853 i 4500
001 - CONTROL NUMBER
control field 6670811
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230927112356.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151222s2013 nju ob 001 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118741580
Qualifying information ebook
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780470565131
Qualifying information print
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781118741665
Qualifying information electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1118741668
Qualifying information electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1118741587
Qualifying information electronic
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9781118741580
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)mat06670811
035 ## - SYSTEM CONTROL NUMBER
System control number (IDAMS)0b00006481f6fcc3
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Jacobs, Stuart,
Relator term author.
245 10 - TITLE STATEMENT
Title Security management of next generation telecommunications networks and services /
Statement of responsibility, etc. Stuart Jacobs.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, New Jersey :
Name of producer, publisher, distributor, manufacturer IEEE Press Wiley,
Date of production, publication, distribution, manufacture, or copyright notice [2014]
264 #2 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture [Piscataqay, New Jersey] :
Name of producer, publisher, distributor, manufacturer IEEE Xplore,
Date of production, publication, distribution, manufacture, or copyright notice [2014]
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (xvi, 373 pages).
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement IEEE Press series on networks and services management ;
Volume/sequential designation 14
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Preface xi -- Acknowledgments xv -- 1 INTRODUCTION 1 -- 1.1 Evolution of Networking Concepts 4 -- 1.1.1 The Public Switched Telephone Network 4 -- 1.1.2 Computer/Data Communications Networks 5 -- 1.1.3 Network Architectures 6 -- 1.1.4 Data Network Complexity 8 -- 1.2 A Network Security Historical Perspective 13 -- 1.2.1 ISO/IEC 7498-1 (ITU-T X.200) Coverage of Management 14 -- 1.2.2 ISO/IEC 7498-4 (ITU-T X.700) Coverage of Security Management 15 -- 1.2.3 ISO/IEC 7498-2 (ITU-T X.800) Coverage of Security and Management 15 -- 1.2.4 The Security Frameworks (ITU-T X.810-ITU-T X.816) 23 -- 1.2.5 The ITU-T X.805 Approach to Security 25 -- 1.3 Network and Security Management Systems 26 -- 1.3.1 Element and Network Management Systems 26 -- 1.3.2 Operations Support Systems 27 -- 1.4 Evolution of Network and Security Management Concepts 29 -- 1.4.1 Telecommunications Management Network 29 -- 1.4.2 Next Generation Operations Systems and Software 47 -- 1.4.3 Enhanced Telecom Operations Map 50 -- 1.5 How the Need for Information Security has Changed 57 -- 1.6 Summary 61 -- Further Reading and Resources 62 -- 2 OVERVIEW OF CURRENT AND FUTURE NETWORKS 63 -- 2.1 A Little Network History 63 -- 2.1.1 Point-to-Point Data Communications 64 -- 2.1.2 Early Commercial Packet Switching 64 -- 2.1.3 The ARPANET: Internet 64 -- 2.1.4 Ethernet and IEEE 802.3 70 -- 2.1.5 Network Address Translation 71 -- 2.2 Common Network Organizations 72 -- 2.2.1 Wired Local Area Networks 74 -- 2.2.2 Wireless Networks 83 -- 2.2.3 Metropolitan Area Networks 87 -- 2.2.4 Wide Area Networks 94 -- 2.2.5 Networks Are Now Layered upon Networks 96 -- 2.2.6 Additional Networking Developments 96 -- 2.2.7 Security Mechanisms in Modern Networks 105 -- 2.3 Next-Generation Networks and Interfaces 108 -- 2.3.1 Framework and Topology of the NGN 108 -- 2.3.2 IP Multimedia Subsystem 125 -- 2.4 Summary 133 -- Further Reading and Resources 136 -- 3 SECURITY MANAGEMENT IN CURRENT AND FUTURE NETWORKS 139 -- 3.1 Cybercrime as a Driver for Information Security Management 140.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.2 Governance as a Driver for Information Security Management 142 -- 3.2.1 What Is Governance? 142 -- 3.2.2 Information System Security Governance 143 -- 3.3 Information Security Management Frameworks 145 -- 3.3.1 ISO/IEC 27000 Series 146 -- 3.3.2 The Information Technology Infrastructure Library Framework 164 -- 3.3.3 COBIT Framework 167 -- 3.3.4 FISMA Framework 173 -- 3.4 A Holistic Approach for Security Management 176 -- 3.4.1 Organizational Aspects of Security Governance and Management 176 -- 3.4.2 Policies and Policy Hierarchies 180 -- 3.4.3 Functional and Operational Security Requirements 183 -- 3.5 Summary 189 -- Further Reading and Resources 189 -- 4 RISK MANAGEMENT IN CURRENT AND FUTURE NETWORKS 191 -- 4.1 Asset Identification: Definition and Inventorying 193 -- 4.2 Impact Analysis 224 -- 4.2.1 Existing System Impact Analysis 224 -- 4.2.2 New System Impact Analysis 236 -- 4.2.3 Risk Mitigation Analysis 240 -- 4.2.4 Malicious Security Events and Threat Assessment 243 -- 4.3 Risk Mitigation Controls Acquisition or Development 257 -- 4.3.1 Procedural Risk Mitigation Controls 257 -- 4.3.2 New Technical Risk Mitigation Controls 258 -- 4.4 Risk Mitigation Controls Deployment Testing 273 -- 4.5 Summary 274 -- Further Reading and Resources 275 -- 5 OPERATIONAL MANAGEMENT OF SECURITY 277 -- 5.1 Securing Management Applications and Communications 278 -- 5.1.1 Security within Element and Network Management Systems 278 -- 5.1.2 Telecommunications Management Network Security 279 -- 5.1.3 Operations Support System Security Needs 281 -- 5.1.4 Reflections on Past ITU Treatment of Managing Security 285 -- 5.1.5 Management of Security Services and Mechanisms Revisited 288 -- 5.1.6 A Security Management Framework 291 -- 5.2 Security Operations and Maintenance 296 -- 5.2.1 Operational Security Compliance Programs 297 -- 5.2.2 Security Operations Reviews and Audits 301 -- 5.2.3 Security Event Response and Incident Management 302 -- 5.2.4 Penetration Testing 304 -- 5.2.5 Common Criteria Evaluated Systems 306.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5.2.6 Accreditation and Certification 309 -- 5.3 Withdrawal from Service 312 -- 5.4 Summary 314 -- 5.5 Concluding Remarks 314 -- Further Reading and Resources 314 -- Appendices 318 -- Appendix A: Role of Cryptography in Information Security -- Appendix B: Authentication of Subjects -- Appendix C: Network Security Mechanisms -- Appendix D: Example Company Security Policy -- Appendix E: Example Generic Detailed Security Requirements -- Appendix F: Securing Common Network Protocols -- Appendix G: Security Mapping between M.3400 and M.3050 320 -- Appendix H: State Privacy Laws as of 2010 328 -- Appendix I: Example RFP Security Appendix -- Appendix J: RFP Security Analysis of ABC Proposal -- Appendix K: Example Security Statement of Work 339 -- Appendix L: Example Solaris Operating System Audit Procedures 348 -- Appendix M: Example Procedure for Basic Hardening of a Windows XP Professional Operating System 352 -- Appendix N: Example Network Audit Procedure 356 -- Appendix O: Example Unix-Linux Operating System -- Audit Procedures 360 -- Index 365.
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Restricted to subscribers or individual electronic text purchasers.
520 ## - SUMMARY, ETC.
Summary, etc. An authoritative guide for improving the security of enterprise and service provider networks everywhereUnlike traditional enterprise networks, where users connect to IT resources within an organization's demilitarized zone (DMZ), next generation networks (NGN) serve users logging onto virtualized resources from a diverse array of devices and locations. Clearly, NGNs require an integrated approach to the management of security rather than unmanageable and non-integrated add-on solutions.In contrast to most books on the subject, which limit coverage of security management to discussions of SNMP authentication and confidentiality mechanisms, this book considers it a governance issue that needs to follow the "Plan, Do, Check, and Act" approach pioneered by W. Edwards Deming. Following an account of the evolution of standardized network management concepts over the last twenty years, author Stuart Jacobs:. Analyzes existing security standards and management frameworks of NGNs. Reviews authentication, authorization, confidentiality, integrity, non-repudiation, vulnerabilities, threats, risk management, and other key security concepts. Details effective approaches to encryption and associated credentials management/control. Considers secure interoperability between telecommunications service provider management systems and between service providers over security domain boundaries. Highlights the critical need for well-organized information security policies, security structures, and approaches for clearly defining security requirements and security procedures. Presents an integrated security management framework that expands on TMN and eTOM security functional areas. Provides in-depth coverage of operations security (OPSEC)-the area in which the "Act" and "Check" aspects are most fully realizedSecurity Management of Next Generation Telecommunications Networks and Services is a valuable resource for telecommunications and IT professionals, as well as enterprise systems engineers/architects.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on PDF viewed 12/22/2015.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
695 ## -
-- Internet
695 ## -
-- Maintenance engineering
695 ## -
-- Malware
695 ## -
-- Multiresolution analysis
695 ## -
-- Next generation networking
695 ## -
-- Organizations
695 ## -
-- Program processors
695 ## -
-- Protocols
695 ## -
-- Reliability
695 ## -
-- Risk management
695 ## -
-- Security
695 ## -
-- Standards
695 ## -
-- Standards organizations
695 ## -
-- Telecommunications
695 ## -
-- Testing
695 ## -
-- ARPANET
695 ## -
-- Access control
695 ## -
-- Approximation methods
695 ## -
-- Authentication
695 ## -
-- Batteries
695 ## -
-- Computers
695 ## -
-- Context
695 ## -
-- Discrete wavelet transforms
695 ## -
-- Fuel cells
695 ## -
-- Information security
695 ## -
-- Integrated circuit interconnections
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element IEEE Xplore (Online Service),
Relator term distributor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Wiley,
Relator term publisher.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9780470565131
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title IEEE Press series on networks and services management ;
Volume/sequential designation 14
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier <a href="https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6670811">https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6670811</a>

No items available.

© 2023 IMPA Library | Customized & Maintained by Sérgio Pilotto


Powered by Koha