TR 101 771 : 1.1.1
Current
The latest, up-to-date edition.
TIPHON RELEASE 4; SERVICE INDEPENDENT REQUIREMENTS DEFINITION; THREAT ANALYSIS
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Overview
5 System's Design
5.1 Network Architecture
5.2 General Design
5.3 TIPHON Connectivity Scenarios
5.4 Services
6 Security Objectives
6.1 Main Security Objectives
6.2 Customers' (Subscribers') Objectives
6.3 Objectives of (TIPHON) Service and Network
Providers
6.4 Manufacturers' Objectives
7 System's Review
8 Threat Analysis and possible Countermeasures
8.1 Denial of service
8.2 Eavesdropping
8.3 Masquerade
8.4 Unauthorized access
8.5 Loss of information
8.6 Corruption of information
8.7 Repudiation
9 Risk Assessment
9.1 Methodology
9.2 Evaluation of Risks
9.3 Effectiveness of Countermeasures
10 Recommendations
10.1 Security Policy
10.2 Recommendation to the TIPHON Security Profiles
10.3 Recommendation to the TIPHON network
architecture
10.4 Recommendation to TIPHON Services
Annex A: Legislation Issues
A.1 Privacy
A.2 Security Order
A.3 Lawful Interception
A.4 Contract
Annex B: Description of Threats
B.1 Denial of services
B.2 Eavesdropping
B.3 Masquerade
B.4 Modification of information
B.5 Unauthorized access
Annex C: Description and possible examples of
Countermeasures
C.1 Authentication
C.2 Digital Signature
C.3 Access Control
C.4 Virtual Private Network
C.5 Secure Configuration of Operating Systems
C.6 Secure Configuration of Networks
C.7 Protection from Denial of Service Attacks
on Hosts and Media Streams
C.8 Physical Protection
C.9 Encryption
C.10 Intrusion Detection Systems
C.11 Auditing and logging
C.12 Non-Repudiation measures
Annex D: Threat and Countermeasure Template for
Providers
Annex E: Bibliography
History
Specifies the comprehensive analysis of security threats to the TIPHON environment as described in principle in TS 101 313 [9]. It includes a definition of the security objectives, a description of the assets within the TIPHON environment, a list of threats to the TIPHON environment, a risk assessment, and a recommendation of the necessary security countermeasures.
Committee |
TIPHON 8
|
DocumentType |
Standard
|
Pages |
49
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
TR 102 129 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON); REQUIREMENTS DEFINITION STUDY; INTERWORKING OF TIPHON AND IPCABLECOM; ARCHITECTURE, PROTOCOL, QOS AND SECURITY |
TR 102 198 : 1.1.1 | SERVICES AND PROTOCOLS FOR ADVANCED NETWORKS (SPAN); PRELIMINARY ANALYSIS OF MIGRATION TO THE INTERNET NGN |
ETR 232 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY |
ETR 237 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
TS 101 313 : 0.4.2 | TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) - NETWORK ARCHITECTURE AND REFERENCE CONFIGURATIONS - PHASE II: SCENARIO 1 + SCENARIO 2 |
TR 101 750 : 1.1.2 | TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON); SECURITY; STUDIES INTO THE IMPACT OF LAWFUL INTERCEPTION |
ISO/IEC 10181-3:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Access control framework |
TS 101 314 : 4.1.1 | TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 4; ABSTRACT ARCHITECTURE AND REFERENCE POINTS DEFINITION; NETWORK ARCHITECTURE AND REFERENCE POINTS |
ISO/IEC 10181-4:1997 | Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4: |
TS 101 323 : 1.2.3 | TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) - INTEROPERABLE SECURITY PROFILES |
TR 101 882 : 5.1.1 | TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 5; PROTOCOL FRAMEWORK DEFINITION AND INTERFACE REQUIREMENT DEFINITION; GENERAL |
ETR 332 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG) |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.