19.11.2014 Views

Towards a Baltic Sea Region Strategy in Critical ... - Helsinki.fi

Towards a Baltic Sea Region Strategy in Critical ... - Helsinki.fi

Towards a Baltic Sea Region Strategy in Critical ... - Helsinki.fi

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CRITICAL INFRASTRUCTURE PROTECTION IN THE BALTIC SEA REGION<br />

Table III—11 TETRA network security measures addressed <strong>in</strong> Modules 4-6 of the ITU-T X.805<br />

security architecture.<br />

Module<br />

Module 4: Service<br />

layer, management<br />

plane<br />

Module 5: Service<br />

layer, control plane<br />

Module 6: Service<br />

layer, end-user plane<br />

Security Measures<br />

• Rights to adm<strong>in</strong>ister and manage services (e.g. management<br />

of group membership) restricted to dispatch and network<br />

adm<strong>in</strong>istration personnel.<br />

• Ma<strong>in</strong>tenance of a log of service adm<strong>in</strong>istrative and<br />

management actions or events.<br />

• Protection of service con<strong>fi</strong>guration, management and<br />

adm<strong>in</strong>istrative <strong>in</strong>formation.<br />

• Backup content and protect connectivity to user service<br />

databases.<br />

• Protect identity of users, user groups and term<strong>in</strong>als (e.g.,<br />

TEI, ITSI, GTSI etc.) utiliz<strong>in</strong>g a service.<br />

• Ma<strong>in</strong>tenance of user activity log conta<strong>in</strong><strong>in</strong>g <strong>in</strong>formation<br />

term<strong>in</strong>al. enabl<strong>in</strong>g/disabl<strong>in</strong>g, location updates vs. time, Call<br />

Detail Records (CDR), supplementary services <strong>in</strong>voked and<br />

so forth.<br />

• Recovery mechanisms for component or l<strong>in</strong>k failures<br />

caus<strong>in</strong>g service loss.<br />

• Encryption of service control <strong>in</strong>formation transported<br />

with<strong>in</strong> the network.<br />

• Error-correction cod<strong>in</strong>g to ensure the correct delivery of<br />

service control <strong>in</strong>formation.<br />

• Cont<strong>in</strong>uous monitor<strong>in</strong>g and control of user calls.<br />

• Restrict service usage (e.g. by check<strong>in</strong>g subscription rights)<br />

to only authorized users, user groups and term<strong>in</strong>als.<br />

• Encryption of user traf<strong>fi</strong>c be<strong>in</strong>g transported by service over<br />

the air <strong>in</strong>terface and/or end-to-end.<br />

• Protect user IP services aga<strong>in</strong>st DoS attacks (e.g., us<strong>in</strong>g<br />

<strong>fi</strong>rewalls, IPSec etc.)<br />

• Reta<strong>in</strong> records of recent service usage history <strong>in</strong> user<br />

term<strong>in</strong>al.<br />

• Jamm<strong>in</strong>g detection and countermeasures (e.g., switch<strong>in</strong>g to<br />

a different frequency) to prevent service loss.<br />

120 NORDREGIO REPORT 2007:5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!