(continuation of a part of Question 10/17 studied during 2001-2004)
Recommendations X.800, X.802 and X.803 describe security within the context of open systems. The security architecture for systems providing end-to-end communications is provided in Recommendation X.805. A comprehensive set of detailed security frameworks covering aspects of security such as authentication, access control, non-repudiation, confidentiality, integrity, and security audit and alarms has been established (X.810, X.811, X.812, X.813, X.814, X.815 and X.816). To provide Generic Upper Layers Security (GULS), Recommendations X.830, X.831, X.832, X.833, X.834 and X.835 have been developed. In cooperation with ISO/IEC JTC 1/SC 27, Recommendations X.841, X.842 and X.843 on security information objects and trusted third party services have been established. A continued effort to maintain and enhance these security Recommendations to satisfy the needs of emerging technologies [i.e., the Global Information Infrastructure (GII), the Next Generation Network (NGN) and Internet Protocol based networks] and services is required.
Increasingly, telecommunications carriers and their information systems and networks are faced with security threats from a wide range of sources, including computer-assisted fraud, espionage, sabotage, vandalism, fire or flood. Sources of damage such as computer viruses, computer hacking and denial of service attacks have become more common, more ambitious and increasingly sophisticated.
The telecommunications and information technology industries are seeking cost-effective comprehensive security solutions that could be applied to various types of networks, services and applications. To achieve such solutions in multi-vendor environment, network security should be designed around the standard security architectures and standard security technologies.
Taking into account the security threats to communication environment and the current advancement of security countermeasures against the threats, new security requirements and solutions should be investigated.
Security for new types of networks as well as security for new services should be studied.
a) How should a complete, coherent communications security solution be
b) What is the architecture for a complete, coherent communications security
c) What is the framework for applying the security architecture in order to establish a new security
d) What is the framework for applying security architecture in order to assess (and consequently improve) an existing security
e) What are the architectural underpinnings for security ?
i) What is the security architecture of emerging technologies ?
f) How should the upper and lower layer security model Recommendations be modified to adapt them to the changing environment and what new Recommendations may be
ii) What is the architecture for end-to-end security ?
iii) What is the security architecture for mobile environment ?
iv) What technical security architectures are required ? For example:
- What is the open systems security architecture ?
- What is the IP-based networks security architecture ?
- What is the NGN security architecture ?
g) How should architectural standards be structured with respect to existing Recommendations on
h) How should the security framework Recommendations be modified to adapt them to emerging technologies and what new framework Recommendations may be
i) How are security services applied to provide security solutions ?
- Development of a comprehensive set of Recommendations for providing standard security solutions for telecommunications in collaboration with other Standards Development Organizations and ITU-T Study Groups.
- Maintenance and enhancements of Recommendations in the X.800 series
Recommendations: X series Recommendations
Questions: E/17, G/17, I/17, J/17, K/17 and L/17
Study Groups: ITU-T SG 2, 4, 9, 11, 13 and 16
Standardization bodies: ISO/IEC JTC 1/SC 27; IETF; ATIS T1M1 and T1S1; ETSI
Other bodies: 3GPP, 3GPP2