DocumentCode :
718593
Title :
Development of the protected telecommunication systems
Author :
Zhukova, Marina ; Stefarov, Artem
Author_Institution :
Dept. of Inf. Technol. Security, Siberian State Airspace Univ., Krasnoyarsk, Russia
fYear :
2015
fDate :
21-23 May 2015
Firstpage :
1
Lastpage :
4
Abstract :
Nowadays take place active development and approbation of new methodologies and algorithms for solving the problem of complex development of the protected telecommunication systems, security assessment and information security management. A lot of works describe mathematical and theoretic security models. There is no universal security model of telecommunication system that allows to effectively combine the requirements of normatively-methodical documents, threats´ model and attackers´ profile on the stage of planning, allows to generate the list of protective measures and allows to find the optimal set of information security tools. Normatively-methodical documents analysis shows that there is no universal approach for development of the protected telecommunication systems, threats´ model and attackers´ profile creation. Described in the article threats´ model creation methodology allows to effectively solve problem of particular threats´ model creation. The attackers´ profile creation algorithm allows to uniquely classify attacker´s and to create actual threats´ list according to attacker´s level´s of impact to telecommunication system. Both models are the basis of telecommunication systems´ security model. This article describes algorithm of telecommunication systems´ security model creation, basic requirements for protected telecommunication systems and main stages of development of the protected telecommunication systems.
Keywords :
telecommunication network planning; telecommunication security; attacker profile; information security management; normatively-methodical document analysis; protected telecommunication system; security assessment; theoretic security model; threat model; Algorithm design and analysis; Biological system modeling; Computational modeling; Information security; Planning; Telecommunications; attacker´s profile; information security; security model; telecommunication system; threat´s models; violator´s model;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Control and Communications (SIBCON), 2015 International Siberian Conference on
Conference_Location :
Omsk
Print_ISBN :
978-1-4799-7102-2
Type :
conf
DOI :
10.1109/SIBCON.2015.7147061
Filename :
7147061
Link To Document :
بازگشت