Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Security management of next generation telecommunications networks and services / (Record no. 9054)

MARC details
000 -LEADER
fixed length control field 07091cam a2200373 i 4500
001 - CONTROL NUMBER
control field 17743038
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190718103823.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130517s2014 njua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2013011611
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780470565131 (hardback)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .J329 2014
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number J.S.S
Edition number 23
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Jacobs, Stuart,
Relator term author.
9 (RLIN) 33407
245 10 - TITLE STATEMENT
Title Security management of next generation telecommunications networks and services /
Statement of responsibility, etc Stuart Jacobs.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, New Jersey :
Name of publisher, distributor, etc IEEE Press/Wiley,
Date of publication, distribution, etc [2014]
300 ## - PHYSICAL DESCRIPTION
Extent xv, 373 pages :
Other physical details illustrations (chiefly color) ;
Dimensions 25 cm.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Source rdacarrier
490 0# - SERIES STATEMENT
Series statement IEEE Press series on networks and services management
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Preface xi Acknowledgments xv 1 INTRODUCTION 1 1.1 Evolution of Networking Concepts 4 1.1.1 The Public Switched Telephone Network 4 1.1.2 Computer/Data Communications Networks 5 1.1.3 Network Architectures 6 1.1.4 Data Network Complexity 8 1.2 A Network Security Historical Perspective 13 1.2.1 ISO/IEC 7498--1 (ITU-T X.200) Coverage of Management 14 1.2.2 ISO/IEC 7498--4 (ITU-T X.700) Coverage of Security Management 15 1.2.3 ISO/IEC 7498--2 (ITU-T X.800) Coverage of Security and Management 15 1.2.4 The Security Frameworks (ITU-T X.810--ITU-T X.816) 23 1.2.5 The ITU-T X.805 Approach to Security 25 1.3 Network and Security Management Systems 26 1.3.1 Element and Network Management Systems 26 1.3.2 Operations Support Systems 27 1.4 Evolution of Network and Security Management Concepts 29 1.4.1 Telecommunications Management Network 29 1.4.2 Next Generation Operations Systems and Software 47 1.4.3 Enhanced Telecom Operations Map 50 1.5 How the Need for Information Security has Changed 57 1.6 Summary 61 Further Reading and Resources 62 2 OVERVIEW OF CURRENT AND FUTURE NETWORKS 63 2.1 A Little Network History 63 2.1.1 Point-to-Point Data Communications 64 2.1.2 Early Commercial Packet Switching 64 2.1.3 The ARPANET: Internet 64 2.1.4 Ethernet and IEEE 802.3 70 2.1.5 Network Address Translation 71 2.2 Common Network Organizations 72 2.2.1 Wired Local Area Networks 74 2.2.2 Wireless Networks 83 2.2.3 Metropolitan Area Networks 87 2.2.4 Wide Area Networks 94 2.2.5 Networks Are Now Layered upon Networks 96 2.2.6 Additional Networking Developments 96 2.2.7 Security Mechanisms in Modern Networks 105 2.3 Next-Generation Networks and Interfaces 108 2.3.1 Framework and Topology of the NGN 108 2.3.2 IP Multimedia Subsystem 125 2.4 Summary 133 Further Reading and Resources 136 3 SECURITY MANAGEMENT IN CURRENT AND FUTURE NETWORKS 139 3.1 Cybercrime as a Driver for Information Security Management 140 3.2 Governance as a Driver for Information Security Management 142 3.2.1 What Is Governance? 142 3.2.2 Information System Security Governance 143 3.3 Information Security Management Frameworks 145 3.3.1 ISO/IEC 27000 Series 146 3.3.2 The Information Technology Infrastructure Library Framework 164 3.3.3 COBIT Framework 167 3.3.4 FISMA Framework 173 3.4 A Holistic Approach for Security Management 176 3.4.1 Organizational Aspects of Security Governance and Management 176 3.4.2 Policies and Policy Hierarchies 180 3.4.3 Functional and Operational Security Requirements 183 3.5 Summary 189 Further Reading and Resources 189 4 RISK MANAGEMENT IN CURRENT AND FUTURE NETWORKS 191 4.1 Asset Identification: Definition and Inventorying 193 4.2 Impact Analysis 224 4.2.1 Existing System Impact Analysis 224 4.2.2 New System Impact Analysis 236 4.2.3 Risk Mitigation Analysis 240 4.2.4 Malicious Security Events and Threat Assessment 243 4.3 Risk Mitigation Controls Acquisition or Development 257 4.3.1 Procedural Risk Mitigation Controls 257 4.3.2 New Technical Risk Mitigation Controls 258 4.4 Risk Mitigation Controls Deployment Testing 273 4.5 Summary 274 Further Reading and Resources 275 5 OPERATIONAL MANAGEMENT OF SECURITY 277 5.1 Securing Management Applications and Communications 278 5.1.1 Security within Element and Network Management Systems 278 5.1.2 Telecommunications Management Network Security 279 5.1.3 Operations Support System Security Needs 281 5.1.4 Reflections on Past ITU Treatment of Managing Security 285 5.1.5 Management of Security Services and Mechanisms Revisited 288 5.1.6 A Security Management Framework 291 5.2 Security Operations and Maintenance 296 5.2.1 Operational Security Compliance Programs 297 5.2.2 Security Operations Reviews and Audits 301 5.2.3 Security Event Response and Incident Management 302 5.2.4 Penetration Testing 304 5.2.5 Common Criteria Evaluated Systems 306 5.2.6 Accreditation and Certification 309 5.3 Withdrawal from Service 312 5.4 Summary 314 5.5 Concluding Remarks 314 Further Reading and Resources 314 Appendices 318 Appendix A: Role of Cryptography in Information Security Appendix B: Authentication of Subjects Appendix C: Network Security Mechanisms Appendix D: Example Company Security Policy Appendix E: Example Generic Detailed Security Requirements Appendix F: Securing Common Network Protocols Appendix G: Security Mapping between M.3400 and M.3050 320 Appendix H: State Privacy Laws as of 2010 328 Appendix I: Example RFP Security Appendix Appendix J: RFP Security Analysis of ABC Proposal Appendix K: Example Security Statement of Work 339 Appendix L: Example Solaris Operating System Audit Procedures 348 Appendix M: Example Procedure for Basic Hardening of a Windows XP Professional Operating System 352 Appendix N: Example Network Audit Procedure 356 Appendix O: Example Unix--Linux Operating System Audit Procedures 360 Index 365
520 ## - SUMMARY, ETC.
Summary, etc "This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to encryption and associated credentials management/control. The book will highlight deficiencies in existing protocols used for management and the transport of management information. "--
Assigning source Provided by publisher.
520 ## - SUMMARY, ETC.
Summary, etc "This book considers the evolution of network deployed security mechanisms throughout NGN (Next Generation Networking) infrastructures"--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Networking / Security.
Source of heading or term bisacsh
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract
Uniform Resource Identifier <a href="http://repository.fue.edu.eg/xmlui/handle/123456789/3603">http://repository.fue.edu.eg/xmlui/handle/123456789/3603</a>
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Acquisition method Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Computer Science ) Main library Main library A2 06/06/2015 Academic bookshop 699.00 Purchase   005.8 J.S.S 00011594 19/02/2025 06/06/2015 Books