U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

USE OF INFORMATION TECHNOLOGY STANDARDS TO SECURE TELECOMMUNICATIONS NETWORKS (FROM POLICE TECHNOLOGY: ASIA PACIFIC POLICE TECHNOLOGY CONFERENCE, P 239-248, 1993, JULIA VERNON AND DES BERWICK, EDS. -- SEE NCJ-145004)

NCJ Number
145030
Author(s)
J Snare
Date Published
1993
Length
10 pages
Annotation
The security requirements of telecommunications networks can be considered in terms of the data, functions, hardware, software, terminal, and network elements.
Abstract
Security can be provided through a combination of physical, logical, procedural, and personal mechanisms. Many developments in information technology are generating a wide range of threats as well as new mechanisms for logical protection. The primary logical security services are authentication, access control, confidentiality, data integrity, and nonrepudiation. These services set parameters for use, control invocation, monitor performance, log anomalous events and errors, and allow audit and tracing. Current trends indicate that cryptographic techniques will find an increasing role in the provision of satisfactory security standards in both network infrastructure and application protection. Consistent implementation architectures and plans should be developed using specific system characteristics and a relevant risk analysis. The availability and use of logical security service and mechanism standards can potentially minimize design and implementation costs. 11 references

Downloads

No download available

Availability