X.805

Solo disponible en BuenasTareas
  • Páginas : 34 (8256 palabras )
  • Descarga(s) : 7
  • Publicado : 8 de agosto de 2010
Leer documento completo
Vista previa del texto
Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Summary This Recommendation defines the general security-related architectural elements that when appropriately applied can provide end-to-end network security. Introduction The telecommunications and information technology industries are seeking cost-effectivecomprehensive security solutions. A secure network should be protected against malicious and inadvertent attacks and should have high availability, appropriate response time, reliability, integrity, scalability, and provide accurate billing information. Security capabilities in products are crucial to the overall network security (including applications and services). However, as more products are combinedto provide total solutions, the interoperability, or the lack thereof, will define the success of the solution. Security must not only be a thread of concern for each product or service, but must be developed in a manner that promotes the interweaving of security capabilities in the overall end-to-end security solution. To achieve such a solution in multi-vendor environment, network securityshould be designed around a standard security architecture.

© ITU 2003 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU.

1

CONTENTS 1 Scope........................................................................................................................3 2References................................................................................................................3 3 Terms and definitions ..............................................................................................3 4 Abbreviations and acronyms....................................................................................3 5 Security Architecture...............................................................................................4 6 Security Dimensions ................................................................................................5 6.1 Access Control Security Dimension ....................................................................5 6.2 Authentication Security Dimension .....................................................................5 6.3Non-repudiation Security Dimension ..................................................................5 6.4 Data Confidentiality Security Dimension ............................................................5 6.5 Communication Security Dimension ...................................................................5 6.6 Data Integrity Security Dimension......................................................................5 6.7 Availability Security Dimension..........................................................................6 6.8 Privacy Security Dimension.................................................................................6 7 Security Layers ........................................................................................................6 7.1 The Infrastructure SecurityLayer ........................................................................7 7.2 The Services Security Layer ................................................................................7 7.3 The Applications Security Layer .........................................................................7 8 SecurityPlanes.........................................................................................................7 8.1 The Management Security Plane .........................................................................8 8.2 The Control Security Plane ..................................................................................8 8.3 The End-User Security Plane...............................................................................8 9 Security Threats...
tracking img