• TS 102 165-2 : 4.2.1

    Current The latest, up-to-date edition.

    TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date: 

    Publisher:  European Telecommunications Standards Institute

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Intellectual Property Rights
    Foreword
    1 Scope
    2 References
    3 Definitions and abbreviations
       3.1 Definitions
       3.2 Abbreviations
       3.3 Notation
    4 Architecture considerations for security in ICT
       4.1 Mapping to 3GPP and NGN architectures
       4.2 Use of functions from ISO/IEC 15408
       4.3 Requirements model in communications security
    5 Authentication counter-measures
       5.1 Introduction
       5.2 Authentication service requirements
       5.3 Overall stage 1 model for authentication
       5.4 Specific authentication models (stage 2 models)
    6 Access control counter-measures
       6.1 Introduction
       6.2 Overall stage 1 model for access control
       6.3 Specific access control models (stage 2 models)
    7 Confidentiality service
       7.1 Introduction
       7.2 Provided services
       7.3 Overall stage 1 model for confidentiality
       7.4 Specific confidentiality models (stage 2 models)
    8 Integrity service
       8.1 Introduction
       8.2 Provided services
       8.3 Requirements statements for integrity service
            functional capabilities (ISO/IEC 15408-2)
       8.4 Overall stage 1 model for integrity
       8.5 Specific integrity models (stage 2 models)
       8.6 Implicit authentication
    9 Non-repudiation service
       9.1 Overview
       9.2 Requirements statements for non-repudiation service
            functional capabilities (ISO/IEC 15408-2)
       9.3 Overall stage 1 model for non-repudiation
       9.4 Specific non-repudiation stage 2 models
    10 Subscription Services
    11 Authorization services
    12 Key management service
       12.1 Overview
       12.2 Symmetric key management
       12.3 Asymmetric key management
    Annex A (informative): Modelling techniques in
            countermeasure development
          A.1 Introduction
          A.2 Use of UML patterns
          A.3 Use of UML stereotypes
    Annex B (informative): Use of IPsec to implement
            countermeasures
          B.1 Overview
          B.2 IPsec architecture
          B.3 Key management for IPsec
          B.4 IPsec implementation of authentication and integrity
          B.5 IPsec implementation of data confidentiality
    Annex C (informative): Bibliography
    History

    Abstract - (Show below) - (Hide below)

    Describes by means of an information model and functional entity behavioural model, the security countermeasures for the ICT in general.

    General Product Information - (Show below) - (Hide below)

    Committee TISPAN 07
    Document Type Standard
    Publisher European Telecommunications Standards Institute
    Status Current

    Standards Referenced By This Book - (Show below) - (Hide below)

    TR 102 780 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS
    TR 181 004 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN GENERIC CAPABILITIES AND THEIR USE TO DEVELOP SERVICES
    EG 202 549 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); DESIGN GUIDE; APPLICATION OF SECURITY COUNTERMEASURES TO SERVICE CAPABILITIES
    EG 202 387 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES
    TR 102 420 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); REVIEW OF ACTIVITY ON SECURITY
    SR 002 564 : 2.0.0 APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH
    TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
    TR 101 878 : 5.1.1 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 5; SERVICE CAPABILITY DEFINITION; SERVICE CAPABILITIES FOR A MULTI MEDIA CALL
    TS 187 016 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; IDENTITY PROTECTION (PROTECTION PROFILE)
    TS 102 285 : 1.1.1 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON); TIPHON/UMTS HARMONIZATION: GENERAL ASPECTS
    TS 102 556 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); PROTECTION PROFILE
    TS 187 003 : 3.4.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; SECURITY ARCHITECTURE

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
    TS 133 210 : 13.0.0 DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+) (GSM); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; NETWORK DOMAIN SECURITY (NDS); IP NETWORK LAYER SECURITY (3GPP TS 33.210 VERSION 14.0.0 RELEASE 14)
    TR 133 978 : 8.0.0 UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; SECURITY ASPECTS OF EARLY IP MULTIMEDIA SUBSYSTEM (IMS)
    TS 187 001 : 3.9.1 NETWORK TECHNOLOGIES (NTECH); NGN SECURITY (SEC); REQUIREMENTS
    TR 187 002 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); TISPAN NGN SECURITY (NGN SEC); THREAT, VULNERABILITY AND RISK ANALYSIS
    TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
    ISO/IEC 9798-4:1999 Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function
    ISO/IEC 10181-3:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Access control framework
    ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
    TS 187 003 : 3.4.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; SECURITY ARCHITECTURE
    ISO/IEC 10181-4:1997 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4:
    ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
    ISO/IEC 17799:2005 Information technology Security techniques Code of practice for information security management
    ISO/IEC 10181-6:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Integrity framework
    EN 300 392-7 : 3.3.1 TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); PART 7: SECURITY
    TS 101 882-2 : 4.1.1 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 4; PROTOCOL FRAMEWORK DEFINITION; PART 2: REGISTRATION AND SERVICE ATTACHMENT SERVICE META-PROTOCOL DEFINITION
    ISO/IEC 13335-1:2004 Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management
    TS 101 303 : 4.1.1 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 4; SERVICE INDEPENDENT REQUIREMENTS DEFINITION; SERVICE AND NETWORK MANAGEMENT FRAMEWORK; OVERVIEW AND INTRODUCTION
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective