ImageVerifierCode 换一换
格式:PDF , 页数:18 ,大小:166.22KB ,
资源ID:804460      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-804460.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T X 1032-2010 Architecture of external interrelationships for a telecommunication IP-based network security system (Study Group 17)《电信中基于IP的网络安全系统的外部关系的架构 17号研究组》.pdf)为本站会员(priceawful190)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T X 1032-2010 Architecture of external interrelationships for a telecommunication IP-based network security system (Study Group 17)《电信中基于IP的网络安全系统的外部关系的架构 17号研究组》.pdf

1、 International Telecommunication Union ITU-T X.1032TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (12/2010) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Information and network security Network security Architecture of external interrelationships for a telecommunication IP-based

2、 network security system Recommendation ITU-T X.1032 ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY PUBLIC DATA NETWORKS X.1X.199 OPEN SYSTEMS INTERCONNECTION X.200X.299 INTERWORKING BETWEEN NETWORKS X.300X.399 MESSAGE HANDLING SYSTEMS X.400X.499 DIRECTORY X.50

3、0X.599 OSI NETWORKING AND SYSTEM ASPECTS X.600X.699 OSI MANAGEMENT X.700X.799 SECURITY X.800X.849 OSI APPLICATIONS X.850X.899 OPEN DISTRIBUTED PROCESSING X.900X.999 INFORMATION AND NETWORK SECURITY General security aspects X.1000X.1029 Network security X.1030X.1049Security management X.1050X.1069 Te

4、lebiometrics X.1080X.1099 SECURE APPLICATIONS AND SERVICES Multicast security X.1100X.1109 Home network security X.1110X.1119 Mobile security X.1120X.1139 Web security X.1140X.1149 Security protocols X.1150X.1159 Peer-to-peer security X.1160X.1169 Networked ID security X.1170X.1179 IPTV security X.1

5、180X.1199 CYBERSPACE SECURITY Cybersecurity X.1200X.1229 Countering spam X.1230X.1249 Identity management X.1250X.1279 SECURE APPLICATIONS AND SERVICES Emergency communications X.1300X.1309 Ubiquitous sensor network security X.1310X.1339 CYBERSECURITY INFORMATION EXCHANGE Cyber information exchange

6、X.1500X.1519 Vulnerability/state exchange X.1520X.1539 Event/incident/heuristics exchange X.1540X.1549 Exchange of policies X.1550X.1559 Heuristics and information request X.1560X.1569 Identification and discovery X.1570X.1579 Assured exchange X.1580X.1589 For further details, please refer to the li

7、st of ITU-T Recommendations. Rec. ITU-T X.1032 (12/2010) i Recommendation ITU-T X.1032 Architecture of external interrelationships for a telecommunication IP-based network security system Summary Recommendation ITU-T X.1032 proposes four models that make possible a review of interrelationships betwe

8、en a telecommunication IP-based network security system (TNSS) and various groups of external objects. Each object is considered in terms of its main functions and its probable effect on TNSS construction and functioning principles. This Recommendation provides a basis for developing detailed recomm

9、endations on network security with regard to the effect on external objects. History Edition Recommendation Approval Study Group 1.0 ITU-T X.1032 2010-12-17 17 ii Rec. ITU-T X.1032 (12/2010) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the fiel

10、d of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizi

11、ng telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered

12、by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate

13、both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved wh

14、en all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPER

15、TY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted

16、 by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that

17、 this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2011 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec.

18、ITU-T X.1032 (12/2010) iii Table of Contents Page 1 Scope 1 2 References. 2 3 Definitions 2 3.1 Terms defined elsewhere 2 3.2 Terms defined in this Recommendation . 2 4 Abbreviations and acronyms 3 5 Conventions 3 6 General 3 7 TNSS interrelationships with security systems of information systems and

19、 information structure 3 7.1 Model of interrelationships . 3 7.2 Functions of external objects and their effect on TNSS . 3 8 TNSS interrelationships with telecommunication system objects 5 8.1 Model of TNSS interrelationships 5 8.2 Functions of external objects and their effect on TNSS . 5 9 TNSS i

20、nterrelationships with external organizations . 6 9.1 Model of interrelationships . 6 9.2 Functions of external organizations and their effect on TNSS . 6 10 TNSS interrelationships with security threats sources . 7 10.1 Model of interrelationships . 7 10.2 Functions of external objects and their ef

21、fect on TNSS . 7 Appendix I Possible composition of technical facilities of the telecommunication IP-based network 9 Bibliography. 10 Rec. ITU-T X.1032 (12/2010) 1 Recommendation ITU-T X.1032 Architecture of external interrelationships for a telecommunication IP-based network security system 1 Scope

22、 1.1 A study of any object needs to take into account not only the interconnections between different components within the object, but also the objects external relationships. Through external relationships, the object performs its functions in the context of an overall system. However, these inter

23、relationships may pose a risk due to a variety of threats that can disturb the functioning of the object. A study of these objects is particularly important for a telecommunication IP-based network security system (TNSS), which needs to protect a telecommunication IP-based network mainly against ext

24、ernal threats (see Figure 1). Possible composition of technical components of a telecommunication IP-based network is presented in Appendix I. X.1032(10)_F01Telecommunication IP-based networkTelecommunication IP-based network security system (TNSS)TNSSexternalinterfaces/interrelationspointsInterrela

25、tionships with external objects and external threats in a telecommunication IP-based networkFigure 1 Interrelationships between a telecommunication IP-based network security system and external objects 1.2 The TNSS does not function as a free-running system; it works in close interaction with a numb

26、er of external systems. Firstly, these external systems include the telecommunication IP-based network itself, which protects the TNSS. The principles that govern the construction of the transport medium and the service platforms directly determine the requirements and, therefore, the design of the

27、TNSS. Secondly, these external systems include the telecommunication IP-based network users whose requirements should be fulfilled by the telecommunication IP-based network and its TNSS. Some other external organizations can also affect the TNSS construction principles. These organizations include:

28、national regulatory authorities; trusted third parties providing services for security systems (on the “outsourcing“ principle); organizations using telecommunication IP-based network services for the creation of information networks. 2 Rec. ITU-T X.1032 (12/2010) In essence, the main TNSS tasks con

29、sist of the protection of the telecommunication IP-based network and the information transmitted through this network against the various external security threats in the environment in which the TNSS functions. The above list indicates that TNSS has interrelationships with many external objects whi

30、ch may be subdivided into several groups. 1.3 TNSS interrelationships with external objects can either directly or indirectly affect the TNSS requirements, the TNSS construction and the functioning principles. Therefore, these interrelationships should be taken into account in the course of TNSS dev

31、elopment. Existing ITU-T Recommendations address certain aspects of this problem (for example, ITU-T X.842 and ITU-T X.843 address interrelationships with a trusted third party). However, there are many aspects of TNSS interrelationships with external objects that have not yet been considered. 1.4 T

32、his Recommendation covers a general architecture of TNSS interrelationships with external objects. This architecture can be applied to various types of telecommunication IP-based networks and to various telecommunication security systems. This Recommendation provides an overview of all external inte

33、rrelationships of TNSS. This Recommendation may serve as a basis for elaborating more detailed recommendations on network security, with respect to the effect on external objects. 2 References The following ITU-T Recommendations and other references contain provisions which, through reference in thi

34、s text, constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edit

35、ion of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone document, the status of a Recommendation. ITU-T X.800 Recommendation ITU

36、-T X.800 (1991), Security architecture for Open Systems Interconnection for CCITT applications. ITU-T X.805 Recommendation ITU-T X.805 (2003), Security architecture for systems providing end-to-end communications. ITU-T X.842 Recommendation ITU-T X.842 (2000) | ISO/IEC TR14516:2002, Information tech

37、nology Security techniques Guidelines for the use and management of trusted third party services. ITU-T X.843 Recommendation ITU-T X.843 (2000) | ISO/IEC 15945:2002, Information technology Security techniques Specification of TTP services to support the application of digital signatures. 3 Definitio

38、ns 3.1 Terms defined elsewhere None. 3.2 Terms defined in this Recommendation This Recommendation defines the following terms: 3.2.1 security system: A variety of interrelating elements (certain principles, organization and technical measures for security provision) that minimize vulnerability of as

39、sets and resources. Rec. ITU-T X.1032 (12/2010) 3 3.2.2 telecommunication IP-based network security system (TNSS): Security system used in a telecommunication IP-based network. 4 Abbreviations and acronyms This Recommendation uses the following abbreviations and acronyms: ICT Information and Communi

40、cation Technologies TNSS Telecommunication IP-based Network Security System 5 Conventions None. 6 General 6.1 Consideration of TNSS interrelationships with external objects is complicated by the great number of these objects and by various types of relationships and interfaces. Therefore, a major pr

41、oblem is the possibility of decomposition (division) of the set of interrelationships. This Recommendation proposes four types of external interrelationships: TNSS interrelationships with security systems that overlay infrastructure information systems and information structures; TNSS interrelations

42、hips with telecommunication system objects; TNSS interrelationships with other objects, e.g., external organizations; TNSS interrelationships with security threats in the form of either the above-named objects or new objects. These types of interrelationships are considered below in clauses 7, 8, 9

43、and 10, respectively. 6.2 In addition, each of the clauses 7, 8, 9 and 10 employs the decomposition principle. First, a model of interrelationships is defined in a graphical form. This model contains external objects and their interrelationships with TNSS. The functions of each external object are t

44、hen described. Finally, proceeding from these functions, brief assessments are made for: the possible effects of external objects on TNSS (for example, effects on requirements to TNSS, effects on principles of TNSS construction and functioning); the possible types of interrelationship (for example,

45、an electrical interface, organizational requirements, external environment influences). 7 TNSS interrelationships with security systems of information systems and information structure 7.1 Model of interrelationships Figure 2 shows TNSS interrelationships with security systems that overlay infrastru

46、cture information systems which, in turn, have interfaces with information structure security systems. 7.2 Functions of external objects and their effect on TNSS 7.2.1 Information systems employ various kinds of information technologies using telecommunications. Functions of information systems incl

47、ude, for instance, collection, storage and retrieval of information, organization of databases and users sites, technical support of editing, conversion and other kinds of information processing. Information systems can perform functions of remote information transfer and distribution, using telecom

48、munication services (i.e., from 4 Rec. ITU-T X.1032 (12/2010) information-telecommunication networks). Internet is one example of a public information-telecommunication network. Traditional types of communication (for example, telephone communication and facsimile communication) can be effected both

49、 with and without the use of information-telecommunication network. Information system security systems serve to protect the technical processes of these systems and the information stored and transferred within these systems. Information system security systems may affect TNSS in the following way, for example: supplement each other during protection against certain threats, for instance, against information disclosure; and introduce limitations for security protocols used within TNSS. External i

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1