Tytuł artykułu
Treść / Zawartość
Pełne teksty:
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Inherent heterogeneity of the networks increases risk factor and new security threats emerge due to the variety of network types and their vulnerabilities. This paper presents an example of applied security framework - the INTERSECTION. By referring to the ISO/IEC security standards and to the FP7 INTERSECTION project results, authors underline that in the processes of managing and planning security, investigating technology and business governance should be at least as important as formalizing the need for decisions on security cooperation between operators. INTERSECTION provides security mechanisms and introduces capability possible only with a management solution that is at a higher level than that of any of the connected systems alone.
Słowa kluczowe
Rocznik
Tom
Strony
22--31
Opis fizyczny
Bibliogr. 16 poz., rys., tab.
Twórcy
autor
autor
autor
autor
autor
- Istitute of Telecomunications, University of Technology and Life Science, Prof. Kaliskiego st 7, 85-796 Bydgoszcz, Poland, adamfli@utp.edu.pl
Bibliografia
- [1] J. Dawkings, “A framework for unified network security management: identifying tracking security threats on converged networks”, J. Netw. Sys. Manag., vol. 13, no. 3, 2005.
- [2] C. Onwubiko, A. P. Lenaghan, L. Hebbes, “An integrated security framework for assisting in the defense of computer networks”, in Proc. Mobile Future 2006 and the Symposium on Trends in Communications SympoTIC’06, 2006, pp. 52–55.
- [3] B. Von Solms, “The ten deadly sins of information security management”, Comp. Secur., vol. 23, pp. 371–376, 2004.
- [4] P. Hunter, “Lack on integration undermines IT security”, Netw. Secur., vol. 2003, no. 1, pp. 5–7, 2003.
- [5] M. Sourour, B. Adel, and A. Tarek, “Ensuring security in depth based on heterogeneous network security technologies“, Int. J. Inf. Secur., vol. 8, no. 4, pp. 233–246, 2009.
- [6] Technical Report ISO/IEC TR 15947 “Information technology-security techniques-IT intrusion detection framework. Part 1: Network security management”, 2002.
- [7] M. Withworth, “Outsourced security – the benefits and risks”, Netw. Secur., vol. 2005, no. 10, pp. 16–19, 2005.
- [8] International Standard ISO/IEC 18028-1 “Information technology-security techniques-IT network security. Part 1: Network security management”, 2006.
- [9] ISO 7498-2:1989 – CCIT Rec. X.800 (1991).
- [10] International Standard ISO/IEC 18028-2 “Information technology-security techniques-IT network security. Part 2: Network security architecture”, 2006.
- [11] International Standard ISO/IEC 18043 “Information technology-security techniques-selection, deployment and operations of intrusion detection systems”, 2006.
- [12] D. Moore, V. Paxson, S. Savage, C. Shannon, S. Stainford, and N. Weaver, “Inside the Slammer worm”, IEEE Secur. Priv., vol. 1, no. 4, p. 33–39, 2003.
- [13] Ł. Saganowski, M. Choraś, R. Renk, W. Hołubowicz, “A novel signal-based approach to anomaly detection in IDS systems”, Lecture Notes in Computer Science, vol. 5495, pp. 527–536, 2009.
- [14] Request for Comments RFC 5101, “Specification of the IP flow information export (IPFIX) protocol for the exchange of IP traffic flow information”, 2008.
- [15] K. Anderson, “Convergence: a holistic approach to risk management”, Netw. Secur., vol. 2007, no. 5, pp. 4–7, 2007.
- [16] Polish Telecommunication Law, act from 16th July 2004.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BATA-0013-0037