[Photo] On the cable network's progress in information security standards – cable networks, communications, transport network – Radio and TV Industry
1, Introduction Current information has become the process of economic globalization, countries in enhancing competition in comprehensive national strategic high ground. With China's sustained economic growth and social progress, information on the network and information security put forward higher requirements. Network and information security has become to maintain social stability and national security the focus of an impact on the overall situation and long-term national interests of crucial importance.
In China Communications Standards Association (CCSA), the network of the communication network and information security sub-cable network and information security, wireless network and information security two-part study on network security management, network security infrastructure The study also for the above two research services. Although the wireless communication becomes more important, but the current run, still a large proportion of wired communications, and other wireless communications air interface than the core network information security technology requirements and wired network security requirements consistent with the information. Therefore, the information security of wired networks is very important.
2, wired network security threats facing
Wired network security threats, including: electromagnetic safety: With the development of listening techniques and computer processing capabilities, the electromagnetic radiation may lead to security problems.
device security: the growing capacity of the current equipment, technology and more complex. Sophisticated technology and equipment more vulnerable to security issues.
link security: communication cables cable laying down the normative. In the Yangtze River, Yellow River, Huaihe River and other rivers on several cable laying, the basic installation and are concentrated in the railway bridge (or the highway bridge), the possible "bridge damaged cables off" communication interruption of a serious situation.
signaling network security: the traditional telephone network, signaling network used to be a closed network of relatively safe. However, with the introduction of soft switching techniques, signaling network has gradually become more open is no doubt increase the security risk.
synchronous external security: synchronous SDH transmission network is the current CDMA network and an important guarantee for the normal operation of the network. At present a large number of networks including CDMA, etc. depend largely on GPS. Problems such as the GPS system will cause incalculable damage to the existing network.
networks by war, natural disasters: the Web suffer from war or natural disasters, the network node may experience a devastating blow to a large number of links may be interrupted.
networks are traffic impact: When the network received traffic impacts, possible avalanche effect: a sharp decline in network performance or even stop the service. Network traffic caused by the impact of unexpected events may also be subject to malicious attacks.
endpoint security: a typical multi-service terminal is a computer, and the traditional dedicated terminal such as telephone, compared silly, smart terminal failure rate, and configuration difficulties have greatly increased.
Network Business Security: multi-service network based on the physical port or line rarely distinguish between users, so business was easy to steal when the dispute.
network resource security: multi-service network, malicious users or not (the virus) the abuse of resources (eg bandwidth) will be a serious threat to the network correctly. Spam e-mail almost destroyed the credibility of the Internet.
communications content security: network transmission of the content may be illegal theft or illicit use.
spread of harmful information: the traditional telecom network is not responsible for the content of information is illegal. With the launch of new services, NGN must pay attention to spread spread of harmful information through the network.
3, hierarchical network and information security
Of communication network security should be layered. According to characteristics of communication systems, communication networks and information security research can be divided into the network of its own security, business to provide security, messaging security and control of four levels of harmful information.
Figure 1
I am an expert from disposablemedicalsuppliers.com, usually analyzes all kind of industries situation, while disposablemedicalsuppliers.com provides the latest news, industry report and quality product, such as Disposable Anal Speculum , Disposable Vaginal Speculum disposable medical suppliers factory, disposable medical suppliers exporter, disposable medical suppliers wholesaler, disposable medical suppliers distributor , china disposable medical suppliers companies