电信基础设施的网络安全问题

A. Risteski, M. Bogdanoski, Marjan Stoilkovski, M. Jovanovic
{"title":"电信基础设施的网络安全问题","authors":"A. Risteski, M. Bogdanoski, Marjan Stoilkovski, M. Jovanovic","doi":"10.3233/978-1-61499-446-6-18","DOIUrl":null,"url":null,"abstract":"We live in a well connected and technology dependent world. People, institutions, companies have increasing need for communication in everyday life. Global and seamless connectivity today is enabled by complex telecommunications infrastructure consisted of a large variety of different technologies which are in a continuous process of development and innovations. But, the global connectivity and easy access to modern technology also enables malicious users and their activities. These activities might be of different nature: starting from passive monitoring to destructive attacks disabling the normal operation of ICT (information and communication technology) infrastructure. Therefore, security issues of telecommunication infrastructure must be thoroughly addressed by all relevant stakeholders. Although each technology includes certain security mechanisms, it is necessary to create well designed security concept for the infrastructure as a whole, taking into consideration not only the technical issues, but also policy framework and legal aspects. The concept must be a subject of constant revision in order to be up to date to current threats. Therefore, the network infrastructure must be always monitored and analyzed, in order to create efficient measures against the security threats. The telecommunication infrastructure in the Republic of Macedonia is owned and operated by state institutions, telecom operators and providers, other companies and universities etc. All of them are faced with number of malicious activities and attacks exploiting vulnerabilities of the systems, which are well monitored and statistically analyzed. Also, all of them has defined more or less effective security concept including proactive and reactive measures. However, a common practice of cooperation and exchange of information and experience among the subjects is missing. A national strategy and policy framework are also missing. Their creation and devoted implementation would be beneficial for all stakeholders resulting in more effective and less expensive solutions as a response to cyber attacks","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Cyber Security Issues of Telecommunication Infrastructure\",\"authors\":\"A. Risteski, M. Bogdanoski, Marjan Stoilkovski, M. Jovanovic\",\"doi\":\"10.3233/978-1-61499-446-6-18\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We live in a well connected and technology dependent world. People, institutions, companies have increasing need for communication in everyday life. Global and seamless connectivity today is enabled by complex telecommunications infrastructure consisted of a large variety of different technologies which are in a continuous process of development and innovations. But, the global connectivity and easy access to modern technology also enables malicious users and their activities. These activities might be of different nature: starting from passive monitoring to destructive attacks disabling the normal operation of ICT (information and communication technology) infrastructure. Therefore, security issues of telecommunication infrastructure must be thoroughly addressed by all relevant stakeholders. Although each technology includes certain security mechanisms, it is necessary to create well designed security concept for the infrastructure as a whole, taking into consideration not only the technical issues, but also policy framework and legal aspects. The concept must be a subject of constant revision in order to be up to date to current threats. Therefore, the network infrastructure must be always monitored and analyzed, in order to create efficient measures against the security threats. The telecommunication infrastructure in the Republic of Macedonia is owned and operated by state institutions, telecom operators and providers, other companies and universities etc. All of them are faced with number of malicious activities and attacks exploiting vulnerabilities of the systems, which are well monitored and statistically analyzed. Also, all of them has defined more or less effective security concept including proactive and reactive measures. However, a common practice of cooperation and exchange of information and experience among the subjects is missing. A national strategy and policy framework are also missing. Their creation and devoted implementation would be beneficial for all stakeholders resulting in more effective and less expensive solutions as a response to cyber attacks\",\"PeriodicalId\":437935,\"journal\":{\"name\":\"Cyber Security and Resiliency Policy Framework\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cyber Security and Resiliency Policy Framework\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3233/978-1-61499-446-6-18\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cyber Security and Resiliency Policy Framework","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/978-1-61499-446-6-18","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

我们生活在一个互联互通、依赖科技的世界。人们、机构、公司在日常生活中对沟通的需求越来越大。当今的全球无缝连接是由复杂的电信基础设施实现的,这些基础设施由各种不同的技术组成,这些技术处于不断发展和创新的过程中。但是,全球连接和对现代技术的轻松访问也使恶意用户及其活动成为可能。这些活动可能具有不同的性质:从被动监测到破坏性攻击,使信息和通信技术基础设施无法正常运作。因此,电信基础设施的安全问题必须由所有相关利益相关者彻底解决。虽然每种技术都包含一定的安全机制,但有必要为整个基础设施创建设计良好的安全概念,不仅要考虑技术问题,还要考虑策略框架和法律方面的问题。这一概念必须不断加以修订,以适应当前的威胁。因此,必须始终对网络基础设施进行监控和分析,以便创建有效的措施来应对安全威胁。马其顿共和国的电信基础设施由国家机构、电信运营商和供应商、其他公司和大学等拥有和经营。它们都面临着大量的恶意活动和利用系统漏洞的攻击,这些活动和攻击都得到了很好的监控和统计分析。同时,他们都定义了或多或少有效的安全概念,包括主动和被动的措施。然而,各主体之间缺乏一种共同的合作和交流信息和经验的做法。国家战略和政策框架也缺失。它们的创建和投入实施将有利于所有利益相关者,从而为应对网络攻击提供更有效、成本更低的解决方案
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Cyber Security Issues of Telecommunication Infrastructure
We live in a well connected and technology dependent world. People, institutions, companies have increasing need for communication in everyday life. Global and seamless connectivity today is enabled by complex telecommunications infrastructure consisted of a large variety of different technologies which are in a continuous process of development and innovations. But, the global connectivity and easy access to modern technology also enables malicious users and their activities. These activities might be of different nature: starting from passive monitoring to destructive attacks disabling the normal operation of ICT (information and communication technology) infrastructure. Therefore, security issues of telecommunication infrastructure must be thoroughly addressed by all relevant stakeholders. Although each technology includes certain security mechanisms, it is necessary to create well designed security concept for the infrastructure as a whole, taking into consideration not only the technical issues, but also policy framework and legal aspects. The concept must be a subject of constant revision in order to be up to date to current threats. Therefore, the network infrastructure must be always monitored and analyzed, in order to create efficient measures against the security threats. The telecommunication infrastructure in the Republic of Macedonia is owned and operated by state institutions, telecom operators and providers, other companies and universities etc. All of them are faced with number of malicious activities and attacks exploiting vulnerabilities of the systems, which are well monitored and statistically analyzed. Also, all of them has defined more or less effective security concept including proactive and reactive measures. However, a common practice of cooperation and exchange of information and experience among the subjects is missing. A national strategy and policy framework are also missing. Their creation and devoted implementation would be beneficial for all stakeholders resulting in more effective and less expensive solutions as a response to cyber attacks
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Cyber Security Issues of Telecommunication Infrastructure Development of Defense-Oriented Application Software under Fire: The Case of Israel Protecting and Preserving Ground Water with Monitoring Systems and Vulnerability Maps Education as a Long-Term Strategy for Cyber Security Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT Body
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1