Security in Telecommunications and Information Technology - October 2004
Acknowledgements
Contents
Preface
Executive Summary
1 Scope of Manual
2 Basic Security Architectures and Services
    2.1 The Open Systems Security Architecture (X.800)
    2.2 The Lower and Upper Layer Security Models (X.802 and X.803)
    2.3 The Security Frameworks (X.810-X.816)
        2.3.1 The Security Framework Overview (X.810)
        2.3.2 The Authentication Framework (X.811)
        2.3.3 The Access Control Framework (X.812)
        2.3.4 The Non-repudiation Framework (X.813)
        2.3.5 The Confidentiality Framework (X.814)
        2.3.6 The Integrity Framework (X.815)
        2.3.7 The Audit and Alarms Framework (X.816)
    2.4 Security Architecture for Systems Providing End-to-End Communications (X.805)
3 The Fundamentals of Protection: Threats, Vulnerabilities and Risks
4 Security Requirements for Telecommunication Networks
    4.1 Rationale
    4.2 General Security Objectives for Telecommunications Networks
5 Public Key and Privilege Management Infrastructures
    5.1 Secret Key and Public Key Cryptography
    5.2 Public Key Certificates
    5.3 Public Key Infrastructures
    5.4 Privilege Management Infrastructure
6 Applications
    6.1 VoIP using H.323 Systems
        6.1.1 Security issues in Multimedia and VoIP
        6.1.2 How security is provisioned for VoIP
    6.2 IPCablecom System
        6.2.1 Security Issues in IPCablecom
        6.2.2 Security mechanisms in IPCablecom
    6.3 Secure Fax Transmission
        6.3.1 Fax security using HKM and HFX
        6.3.2 Fax security using RSA
    6.4 Network Management Applications
        6.4.1 Network Management Architecture
        6.4.2 Management Plane and Infrastructure Layer Intersection
        6.4.3 Management Plane and Services Layer Intersection
        6.4.4 Management Plane and Application Layer Intersection
        6.4.5 Common Security Management Services
    6.5 E-prescriptions
        6.5.1 PKI and PMI considerations for e-health applications
        6.5.2 Salford's E-prescription System
    6.6 Secure Mobile End-to-End Data Communications
        6.6.1 Framework of security technologies for mobile end-to-end data communications
        6.6.2 PKI considerations for Secure Mobile End-to-End Data Communications
7 Availability Dimension and Infrastructure Layer
    7.1 Path topologies and end-to-end path availability calculations
    7.2 Enhance the availability of a transport network - Overview
    7.3 Protection
        7.3.1 Multiplex Section 1:1 Protection Switching
        7.3.2 Multiplex Section 1+1 Protection Switching
        7.3.3 MS-SPRing Protection Switching
        7.3.4 SNCP Protection Switching
    7.4 Restoration
    7.5 Outside plant
8 Incident Organization and Security Incident Handling (Guidelines) for Telecommunications Organizations
    8.1 Definitions
    8.2 Rationale
9 Conclusions
References
Annex A - Catalogue of ITU-T Recommendations related to security
Annex B - Security Terminology
B.1 List of security-related terms and definitions
B.2 Security-related Acronyms
Annex C - List of Study Groups and Security-related Questions
ITU-T security building blocks