DocumentCode
718593
Title
Development of the protected telecommunication systems
Author
Zhukova, Marina ; Stefarov, Artem
Author_Institution
Dept. of Inf. Technol. Security, Siberian State Airspace Univ., Krasnoyarsk, Russia
fYear
2015
fDate
21-23 May 2015
Firstpage
1
Lastpage
4
Abstract
Nowadays take place active development and approbation of new methodologies and algorithms for solving the problem of complex development of the protected telecommunication systems, security assessment and information security management. A lot of works describe mathematical and theoretic security models. There is no universal security model of telecommunication system that allows to effectively combine the requirements of normatively-methodical documents, threats´ model and attackers´ profile on the stage of planning, allows to generate the list of protective measures and allows to find the optimal set of information security tools. Normatively-methodical documents analysis shows that there is no universal approach for development of the protected telecommunication systems, threats´ model and attackers´ profile creation. Described in the article threats´ model creation methodology allows to effectively solve problem of particular threats´ model creation. The attackers´ profile creation algorithm allows to uniquely classify attacker´s and to create actual threats´ list according to attacker´s level´s of impact to telecommunication system. Both models are the basis of telecommunication systems´ security model. This article describes algorithm of telecommunication systems´ security model creation, basic requirements for protected telecommunication systems and main stages of development of the protected telecommunication systems.
Keywords
telecommunication network planning; telecommunication security; attacker profile; information security management; normatively-methodical document analysis; protected telecommunication system; security assessment; theoretic security model; threat model; Algorithm design and analysis; Biological system modeling; Computational modeling; Information security; Planning; Telecommunications; attacker´s profile; information security; security model; telecommunication system; threat´s models; violator´s model;
fLanguage
English
Publisher
ieee
Conference_Titel
Control and Communications (SIBCON), 2015 International Siberian Conference on
Conference_Location
Omsk
Print_ISBN
978-1-4799-7102-2
Type
conf
DOI
10.1109/SIBCON.2015.7147061
Filename
7147061
Link To Document