Cyber Security Issues of Telecommunication Infrastructure

被引:1
作者
Risteski, Aleksandar [1 ]
Bogdanoski, Mitko [2 ]
Stoilkovski, Marjan [3 ]
Jovanovic, Miroslav [4 ]
机构
[1] Univ Ss Cyril & Methodius Skopje, Fac Elect Engn & IT, Skopje, Macedonia
[2] Goce Delcev Univ, Mil Acad Gen Mihajlo Apostolski, Shtip, Macedonia
[3] Minist Interior, Cyber Crime Unit, Skopje, Macedonia
[4] Makedonski Telecom AD Skopje, Skopje, Macedonia
来源
CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK | 2014年 / 38卷
关键词
Cyber security; telecommunication infrastructure; attacks; LEA; incident handling;
D O I
10.3233/978-1-61499-446-6-18
中图分类号
C93 [管理学]; D035 [国家行政管理]; D523 [行政管理]; D63 [国家行政管理];
学科分类号
12 ; 1201 ; 1202 ; 120202 ; 1204 ; 120401 ;
摘要
We live in a well-connected and technology dependent world. People, institutions, companies have increasing need for communication in everyday life. Global and seamless connectivity today is enabled by complex telecommunications infrastructure consisting of a large variety of different technologies which are in a continuous process of development and innovations. But, the global connectivity and easy access to modern technology also enables malicious users and their activities. These activities might be of a different nature: starting from passive monitoring to destructive attacks disabling the normal operation of ICT (information and communication technology) infrastructure. Therefore, security issues of the telecommunication infrastructure must be thoroughly addressed by all relevant stakeholders. Although each technology includes certain security mechanisms, it is necessary to create a well-designed security concept for the infrastructure as a whole, taking into consideration not only the technical issues, but also policy framework and legal aspects. The concept must be a subject of constant revision in order to be up to date to current threats. Therefore, the network infrastructure must be always monitored and analyzed, in order to create efficient measures against the security threats. The telecommunication infrastructure in the Republic of Macedonia is owned and operated by state institutions, telecom operators and providers, other companies and universities etc. All of them are faced with a number of malicious activities and attacks exploiting vulnerabilities of the systems, which are well monitored and statistically analyzed. Also, all of them have defined a more or less effective security concept including proactive and reactive measures. However, a common practice of cooperation and exchange of information and experience among the subjects is missing. A national strategy and policy framework are also missing that will benefit all stakeholders resulting in more effective and less expensive solutions as a response to cyber-attacks.
引用
收藏
页码:18 / 35
页数:18
相关论文
共 32 条
[1]  
Acohido B., 2012, US TODAY
[2]  
[Anonymous], 2012, CBR
[3]  
[Anonymous], 2001, Convention sur la cybercriminalite
[4]  
[Anonymous], 2011, EURACTIVE 0125
[5]  
[Anonymous], 2013, KASP LAB ID MINIDUKE
[6]  
[Anonymous], 2013, APTI EXP ON CHIN CYB
[7]  
[Anonymous], 2012, 2012 COST CYBER CRIM
[8]  
[Anonymous], 2010, STRAT CONC DEF SEC M
[9]  
[Anonymous], 2010, National Security Strategy of the United States 2010
[10]  
[Anonymous], 2010, STRONG BRITAIN AGE U