Security in Telecommunications and Information Technology 2012
An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications

The purpose of the ITU-T Manual on Security in Telecommunications and Information Technology is to provide a broad introduction to the security work of ITU-T. It is directed towards those who have responsibility for, or an interest in, information and communications security and the related standards, and those who simply need to gain a better understanding of ICT security issues and the corresponding ITU-T Recommendations.
- Click to access:
-
Click to download PDF - 10.29MBPDF
-
Click to Read online and shareREAD
Securing the network infrastructure
The data used to monitor and control the telecommunications network is often transmitted on a separate network that carries only the network management traffic (i.e., no user traffic). This network is often referred to as the telecommunication management network (TMN) as described in Recommendation ITU-T M.3010. It is imperative that this traffic be secured. The management traffic is usually categorized in terms of information required to perform fault, configuration, performance, accounting and security management functions. Network security management deals with setting up a secure management network as well as managing the security of information related to the three security planes of the ITU-T X.805 security architecture.
- Click to access:
-
Click to download PDF - 1.08MBPDF
-
Click to Read online and shareREAD