Tải bản đầy đủ (.pptx) (56 trang)

NGN networks and security

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (636.88 KB, 56 trang )


GVHD :Ths.Hà Văn Kha Ly
SVTH :Mai Thanh Minh
Phan Anh Dũng




!
"#$
"

NGN SECURITY ARCHITECTURE – BEST PRACTI CE

%&'$





 !

"  #$%&'(#)$
#*+!

"

,-

%"


*." !

#

/ ""+

(

*

(0

12

2

00
NGN SECURI TY ARCHITECTURE – BEST PRACTICE
EXAMPLE

"##!""+
"

#+(-  +"+
 "

3"(

*+


)4.



,(".

(
EXAMPLE (CONTD.)

# "#5

'67687% 9'6'*."
 "

#++  ".:6;" <&'=6/
"0/

# (1*/<. 9>96
?.&:66@"*@

#"ABC,D"A+
#0* 
EXAMPLE

#E.  

@3( " +7'F7669. 
 +$7666"" * 1(+
.#".4
A


#".#$  '6768 
G:7:(#.  (-HD$#"""
(3+-.  @/(1@/(<.3"
C
%
#)#
%*
(#)D%6'!
Access Control
Authentication
Non-Repudiation
Data Confidentiality
Communication
Data Integrity
Availability
Privacy
8 Security Dimensions
Management Plane
Control Plane
Vulnerabilities
Threats
Attacks
Destruction
Corruption
Disclosure
Interruption
Removal
Applications Security
Services Security

Infrastructure Security
SECURITY LAYERS
End-User Plane
+<-4
APPIN’S NGN FRAMEWORK

C B"

+2 





$++

2 +B<
<
APPIN’S NGN FRAMEWORK FEATURES (ITU-T
REC. X.805)
22
@4
(

( 
" 


APPIN’S PROPOSED NGN FRAMEWORK
FEATURES
(I+@

(",
0 
#
2#"

2
2
CONCERNS OF OPERATOR

@+  !

##!"

+5BJ

 

)

@

(
@+
H+!
EXAMPLE - IMPLEMENTATION
IPSEC AND OSS


8+@.(
+

(++3+"-"


(++3+"-"


 "+( <"


(G,.C<
A
IPSEC IMPLEMENTATION
IPSEC IN NGN
IPSEC DPI

$++0("(

G + 0(

.0($(, 0(
,-)// " 
+- 

G($,)//4
" ,,
IMPLEMENTATION REQUIREMENTS


2+"." <(.
8.+ .-+!

"!<""#+
+5

3+3!

D'6;4--44

+3

 
IMPLEMENTATION REQUIREMENTS (CONTD.)

#5

(K,

K((# K(!K 

K@C.+-

-#@#@!"#)0!
*+4"++
*@*@!

Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×