Committed to connecting the world


ITU-T work programme

[2009-2012] : [SG17] : [Q2/17]

[Declared patent(s)]  - [Publication]

Work item: X.Suppl.16 (ex X.1037; X.rev;)
Status: Agreed on 2012-09-07 
Approval process: Agreement
Type of work item: Supplement
Version: New
Provisional name: X.1037; X.rev;
Equivalent number: -
Timing: -
Liaison: -
Subject/title: Supplement 16 to ITU-T X.800-X.849 series - Supplement on architectural systems for security controls for preventing fraudulent activities in public carrier networks
Summary: This Recommendation describes a methodology for evaluation systems of security controls for preventing fraudulent activities, and criteria for selection of these systems, with regard to architectural characteristics of communications service provider (CSP) networks at their present-day level of development. The Recommendation includes technical methods for addressing security controls and estimating losses caused by fraudulent activities, and also provides guidelines for the exchange of information related to fraudulent activities.
Comment: -
Base text(s):
Roman Khokhlov, Editor
ITU-T A.5 reference(s):
Generate A.5 drat TD
[Submit new A.5 reference ]
See guidelines for creating & submitting ITU-T A.5 justifications
First registration in the WP: 2010-05-31 08:53:56
Last update: 2013-01-08 07:37:42