• DocumentCode
    718593
  • Title

    Development of the protected telecommunication systems

  • Author

    Zhukova, Marina ; Stefarov, Artem

  • Author_Institution
    Dept. of Inf. Technol. Security, Siberian State Airspace Univ., Krasnoyarsk, Russia
  • fYear
    2015
  • fDate
    21-23 May 2015
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    Nowadays take place active development and approbation of new methodologies and algorithms for solving the problem of complex development of the protected telecommunication systems, security assessment and information security management. A lot of works describe mathematical and theoretic security models. There is no universal security model of telecommunication system that allows to effectively combine the requirements of normatively-methodical documents, threats´ model and attackers´ profile on the stage of planning, allows to generate the list of protective measures and allows to find the optimal set of information security tools. Normatively-methodical documents analysis shows that there is no universal approach for development of the protected telecommunication systems, threats´ model and attackers´ profile creation. Described in the article threats´ model creation methodology allows to effectively solve problem of particular threats´ model creation. The attackers´ profile creation algorithm allows to uniquely classify attacker´s and to create actual threats´ list according to attacker´s level´s of impact to telecommunication system. Both models are the basis of telecommunication systems´ security model. This article describes algorithm of telecommunication systems´ security model creation, basic requirements for protected telecommunication systems and main stages of development of the protected telecommunication systems.
  • Keywords
    telecommunication network planning; telecommunication security; attacker profile; information security management; normatively-methodical document analysis; protected telecommunication system; security assessment; theoretic security model; threat model; Algorithm design and analysis; Biological system modeling; Computational modeling; Information security; Planning; Telecommunications; attacker´s profile; information security; security model; telecommunication system; threat´s models; violator´s model;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Control and Communications (SIBCON), 2015 International Siberian Conference on
  • Conference_Location
    Omsk
  • Print_ISBN
    978-1-4799-7102-2
  • Type

    conf

  • DOI
    10.1109/SIBCON.2015.7147061
  • Filename
    7147061