ITU-T Workshop on Security, Seoul (Korea), May 2002

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

U M T S F o r u m © UMTS 2002 UMTS Security aspects UMTS Forum ICTG Chair Bosco Fernandes Siemens AG
Security Controls and Systems in E-Commerce
Security Standardization in ITU-T
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Security+ Guide to Network Security Fundamentals
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
E-Commerce Security and Fraud Issues and Protections
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Web services security I
Creating a Security Architecture Kim Milford, J.D., CISSP Information Security Manager University of Wisconsin Copyright Kim.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
UNL Network Security Zac Reimer Network Security Analyst UNL Information Services
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
1 Lesson Internet Organization network Fire wall.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Copyright 2004 Integrity Incorporated Carolyn Burke, MA, CISSP, CISM CEO, Integrity Incorporated Mitigate Risk March 23, 2004, 2pm.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
IEC TC57 WG15 - Security Status & Roadmap, TC57 Plenary, May 2007
Working with HIT Systems
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Ch 13 Trustworthiness Myungchul Kim
Configuring Electronic Health Records Privacy and Security in the US Lecture a This material (Comp11_Unit7a) was developed by Oregon Health & Science University.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Information Management System Ali Saeed Khan 29 th April, 2016.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Standard: Security Methods Jason Gibson TCM471 Professor Crum.
Securing Information Systems
Chapter 5a - Pretty Good Privacy (PGP)
Securing Information Systems
Cyber Security Zafar Sadik
Threat and Risk Assessments in a Network Environment
Design for Security Pepper.
EMERGENCY COMMUNICATIONS
Chapter 17 Risks, Security and Disaster Recovery
Chapter 5 Electronic Commerce | Security
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Securing Information Systems
مادسیج، شبکه آموزشی پژوهشی دانشجویان ایران
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
امنیت شبکه علی فانیان
Chapter 5 Electronic Commerce | Security
ISMS Information Security Management System
E-Commerce Security and Fraud Issues and Protections
Identity & Access Management
Chapter 1 – Information Security Overview
Network Security Ola Flygt Växjö University
Welcome to all Participants
CS 575 – Drexel University – Fall 2007
Session 1 – Introduction to Information Security
Presentation transcript:

ITU-T Workshop on Security, Seoul (Korea), 13-14 May 2002 Herbert V. Bertine Co-Chairman, ITU-T Study Group 17 Lucent Technologies ITU-T Workshop on Security, Seoul (Korea), 13-14 May 2002

ITU-T Workshop on Security, Seoul (Korea), 13-14 May 2002 Security architecture and frameworks Security assessment - vulnerability and threat analysis Infrastructure security Service security Application security ITU-T Workshop on Security, Seoul (Korea), 13-14 May 2002 02.05.2019

ITU-T Workshop on Security, Seoul (Korea), 13-14 May 2002 Network, server and protocol security Firewalls Physical security Emergency preparedness Network survivability Disaster recovery ITU-T Workshop on Security, Seoul (Korea), 13-14 May 2002 02.05.2019

ITU-T Workshop on Security, Seoul (Korea), 13-14 May 2002 Cybercrime and denial of service prevention and detection Lawfully authorized electronic surveillance Fraud prevention Authentication including biometric authentication ITU-T Workshop on Security, Seoul (Korea), 13-14 May 2002 02.05.2019

ITU-T Workshop on Security, Seoul (Korea), 13-14 May 2002 Confidentiality Privacy Non-repudiation Integrity Availability Encryption etc. ITU-T Workshop on Security, Seoul (Korea), 13-14 May 2002 02.05.2019

ITU-T Workshop on Security, Seoul (Korea), 13-14 May 2002 www.itu.int ITU-T Workshop on Security, Seoul (Korea), 13-14 May 2002 02.05.2019