• TR 101 771 : 1.1.1

    Current The latest, up-to-date edition.

    TIPHON RELEASE 4; SERVICE INDEPENDENT REQUIREMENTS DEFINITION; THREAT ANALYSIS

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date: 

    Publisher:  European Telecommunications Standards Institute

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Intellectual Property Rights
    Foreword
    1 Scope
    2 References
    3 Definitions and abbreviations
       3.1 Definitions
       3.2 Abbreviations
    4 Overview
    5 System's Design
       5.1 Network Architecture
       5.2 General Design
       5.3 TIPHON Connectivity Scenarios
       5.4 Services
    6 Security Objectives
       6.1 Main Security Objectives
       6.2 Customers' (Subscribers') Objectives
       6.3 Objectives of (TIPHON) Service and Network
            Providers
       6.4 Manufacturers' Objectives
    7 System's Review
    8 Threat Analysis and possible Countermeasures
       8.1 Denial of service
       8.2 Eavesdropping
       8.3 Masquerade
       8.4 Unauthorized access
       8.5 Loss of information
       8.6 Corruption of information
       8.7 Repudiation
    9 Risk Assessment
       9.1 Methodology
       9.2 Evaluation of Risks
       9.3 Effectiveness of Countermeasures
    10 Recommendations
       10.1 Security Policy
       10.2 Recommendation to the TIPHON Security Profiles
       10.3 Recommendation to the TIPHON network
            architecture
       10.4 Recommendation to TIPHON Services
    Annex A: Legislation Issues
          A.1 Privacy
          A.2 Security Order
          A.3 Lawful Interception
          A.4 Contract
    Annex B: Description of Threats
          B.1 Denial of services
          B.2 Eavesdropping
          B.3 Masquerade
          B.4 Modification of information
          B.5 Unauthorized access
    Annex C: Description and possible examples of
             Countermeasures
          C.1 Authentication
          C.2 Digital Signature
          C.3 Access Control
          C.4 Virtual Private Network
          C.5 Secure Configuration of Operating Systems
          C.6 Secure Configuration of Networks
          C.7 Protection from Denial of Service Attacks
               on Hosts and Media Streams
          C.8 Physical Protection
          C.9 Encryption
          C.10 Intrusion Detection Systems
          C.11 Auditing and logging
          C.12 Non-Repudiation measures
    Annex D: Threat and Countermeasure Template for
             Providers
    Annex E: Bibliography
    History

    Abstract - (Show below) - (Hide below)

    Specifies the comprehensive analysis of security threats to the TIPHON environment as described in principle in TS 101 313 [9]. It includes a definition of the security objectives, a description of the assets within the TIPHON environment, a list of threats to the TIPHON environment, a risk assessment, and a recommendation of the necessary security countermeasures.

    General Product Information - (Show below) - (Hide below)

    Committee TIPHON 8
    Document Type Standard
    Publisher European Telecommunications Standards Institute
    Status Current

    Standards Referenced By This Book - (Show below) - (Hide below)

    TR 102 129 : 1.1.1 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON); REQUIREMENTS DEFINITION STUDY; INTERWORKING OF TIPHON AND IPCABLECOM; ARCHITECTURE, PROTOCOL, QOS AND SECURITY
    TR 102 198 : 1.1.1 SERVICES AND PROTOCOLS FOR ADVANCED NETWORKS (SPAN); PRELIMINARY ANALYSIS OF MIGRATION TO THE INTERNET NGN

    Standards Referencing This Book - (Show below) - (Hide below)

    ETR 232 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY
    ETR 237 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS
    TS 101 313 : 0.4.2 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) - NETWORK ARCHITECTURE AND REFERENCE CONFIGURATIONS - PHASE II: SCENARIO 1 + SCENARIO 2
    TR 101 750 : 1.1.2 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON); SECURITY; STUDIES INTO THE IMPACT OF LAWFUL INTERCEPTION
    ISO/IEC 10181-3:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Access control framework
    TS 101 314 : 4.1.1 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 4; ABSTRACT ARCHITECTURE AND REFERENCE POINTS DEFINITION; NETWORK ARCHITECTURE AND REFERENCE POINTS
    ISO/IEC 10181-4:1997 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4:
    TS 101 323 : 1.2.3 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) - INTEROPERABLE SECURITY PROFILES
    TR 101 882 : 5.1.1 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 5; PROTOCOL FRAMEWORK DEFINITION AND INTERFACE REQUIREMENT DEFINITION; GENERAL
    ETR 332 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG)
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective