Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IT-M3016 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2005-12-21 ÃÑÆäÀÌÁö 29
ÇѱÛÇ¥ÁØ¸í °ü¸® Æò¸éÀ» À§ÇÑ º¸¾È : °³¿ä
¿µ¹®Ç¥Áظí SECURITY FOR THE MANAGEMENT PLANE : OVERVIEW
Çѱ۳»¿ë¿ä¾à TMNÀº Åë½Å¸ÁÀ» °ü¸®ÇÏ´Â ¸ÁÀ̹ǷΠTMN¿¡ ´ëÇÑ º¸¾ÈÀº ÀûÀýÇÑ Åë½Å¸ÁÀÇ ¿î¿ëÀ» À§ÇØ ¾ø¾î¼­´Â ¾ÈµÉ °ÍÀÌ´Ù. ¶ÇÇÑ Åë½Å¸ÁÀº TMN¿¡ ÀÇÇØ °ü¸®µÉ ¼ö ÀÖ´Â º¸¾È ±â´ÉÀ» °¡Áö°í ÀÖÀ» ¼öµµ ÀÖ´Ù. M.3400¿¡´Â ÀÌ·¯ÇÑ º¸¾È °ü¸® ±â´ÉÀÌ Á¤ÀǵǾî ÀÖ´Ù. TMNÀÇ º¸¾È Ç¥ÁØÀº »õ·Î¿î º¸¾ÈÇ¥ÁØÀ» ¸¸µé±â º¸´Ù´Â ±¹Á¦ÀûÀ¸·Î ÇÕÀÇµÈ º¸¾È Ç¥ÁØ¿¡ ±Ù°ÅÇÏ¿© Àç»ç¿ëÇÏ´Â °ÍÀÌ ¹Ù¶÷Á÷ÇÏ´Ù.
¿µ¹®³»¿ë¿ä¾à A TMN is intended to manage the underlying telecommunications network; therefore, the security of the TMN is essential to the proper functioning of the telecommunications network. Furthermore, the telecommunications network may incorporate security features that need to be managed by the TMN. Recommendation M.3400 enumerates those security management functions. TMN Security Standards should preferably be based upon internationally agreed security standards as it is beneficial to reuse rather than create new ones. The security services and mechanisms that are used for securing TMN transactions should be provided in a way that allows such customization. Due to the large number of possible combinations of security features, it is desirable to have security profiles (see Appendix I) that cover a broad range of TMN security applications. Standardization will facilitate reuse of solutions and products meaning that security can be introduced faster and at lower cost.
Important benefits of standardized solutions for vendors and users of the systems alike are the economy of scale in product development and component interoperation within a TMN system with regard to security. It is necessary to provide security services and mechanisms to protect TMN transactions among TMN entities (as defined in M.3010) against malicious attacks such as eavesdropping, spoofing, tampering with messages (modification, delay, deletion, insertion, replay, re-routing, misrouting, or re-ordering of messages), repudiation or forgery. Protection includes prevention, detection and recovery from attacks, as well as management of security-related information. Standards should cover both intra-domain (Q and F) and inter-domain (X) interfaces.
±¹Á¦Ç¥ÁØ ITU-T M.3016
°ü·ÃÆÄÀÏ TTAE_IT-M3016.zip TTAE_IT-M3016.zip            

ÀÌÀü
VDSL2 ¼Û¼ö½Å±â ±â¼úÇ¥ÁØ
´ÙÀ½
B2B¿Í C2B »óÀÇ NGN °íÀå°ü¸®¿ä±¸ ¹× ºÐ¼®