Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAT.3G-32.371(R7-7.2.0) ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2008-04-09 ÃÑÆäÀÌÁö 0
ÇѱÛÇ¥Áظí IMT-2000 3GPP-Åë½Å °ü¸®; º¸¾È°ü¸® °³³ä°ú ¿ä±¸»çÇ×(R7)
¿µ¹®Ç¥Áظí IMT-2000 3GPP-Telecommunication management; Security Management concept and requirements(R7)
Çѱ۳»¿ë¿ä¾à
¿µ¹®³»¿ë¿ä¾à The present document defines, in addition to the requirements defined in 3GPP TS 32.101 [1] and 3GPP TS 32.102 [2], the requirements for Security Management IRP.
The purpose of the present document is to specify the necessary security features, services and functions to protect the network management data, including Requests, Responses, Notifications and Files, exchanged across the Itf N.
Telecommunication network security can be breached by weaknesses in operational procedures, physical installations, communication links, computational processes and data storage. Of concern here in the present document is the security problems resulting from the weaknesses inherent in the communication technologies (i.e., the 3GPP defined Interface IRPs and their supporting protocol stacks) deployed across the Itf-N.
Appropriate level of security for a telecommunication network is essential. Secured access to the network management applications, and network management data, is essential. The 3GPP-defined Interface IRPs (and their supporting protocol stacks), deployed across the Itf-N, are used for such access, and therefore, their security is considered essential.
Many network management security standards exist. However, there is no recommendation on how to apply them in the Itf-N context. Their deployment across the Itf-N is left to operators. The present document and the corresponding solutions identify and recommend security standards in the Itf-N context.
The business case for secured Itf-N is complex as it does not relate to the functions of the Interface IRPs (the functions are constant) but rather, it relates to variants such as the cost of recovering from security breaks, the probability of security incidents and the cost of implementing Security Management, all of which differs depending on specific deployment scenarios.
The present document describes the security functions for a 3G network in terms of Security Domains (subclause 4.1). Clause 5 defines the Itf-N Security Management scope in terms of its context (subclause 5.1) and the possible threats that can occur there are defined in clause 6. Clause 7 specifies the Itf N security Requirements.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAT.3G-32.371(R7-7.2.0).zip TTAT.3G-32.371(R7-7.2.0).zip            

ÀÌÀü
IMT-2000 3GPP-Åë½Å °ü¸®; Itf-NÀÇ ºÎºÐ ¼­½ºÆæ¼Ç ÅëÇÕÂüÁ¶Á¡À» À§ÇÑ º¸¾È ¼­ºñ½º; Á¤º¸ ¼­ºñ½º(R7)
´ÙÀ½
IMT-2000 3GPP-Åë½Å °ü¸®; Itf-NÀÇ ºÎºÐ ¼­½ºÆæ¼Ç ÅëÇÕÂüÁ¶Á¡À» À§ÇÑ º¸¾È ¼­ºñ½º; XML Á¤ÀÇ(R7)