12.07.2015 Views

INTERNATIONAL ISO/IEC STANDARD 18028-1

INTERNATIONAL ISO/IEC STANDARD 18028-1

INTERNATIONAL ISO/IEC STANDARD 18028-1

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>ISO</strong>/<strong>IEC</strong><strong>18028</strong>-1:2006(E)13.2.5.3 Security ControlsThere are a number of technical security controls to manage the risks from identified threats to radio networks,including those for:— secure authentication,— encryption with effective algorithms,— protected base stations,— firewalls,— malicious code (virus, trojans, etc.) protection,— anti-spam.13.2.6 Broadband Networking13.2.6.1 BackgroundBroadband networking is a group of technologies which allow individual subscribers high speed access to anInternet point-of-presence. Currently, there are four main technologies:— 3G,— Cable,— Satellite,— DSL.For DSL, there are two main types. There is asymmetric (ADSL), where the upload speed from the user islower (quarter to half of the download speed, and symmetric (SDSL), where the upload and download speedsare the same. In either case, the download speed is typically from 128 kbps to 2-8 Mbps, depending on theproduct. Cable and satellite technologies also have similar types of product.The main reasons for adopting broadband technologies is that they are a high-speed, always on technologyavailable more cheaply that conventional communications. All technologies allow access to the Internet andhence span only from the Internet to the subscriber's premises. Use of the Internet as a universal carrierallows links to other sites to be constructed speedily and cheaply, perhaps with the deployment of VPNs forsecure links.13.2.6.2 Security RisksBroadband is simply an 'always on' high-speed link between a subscriber and the Internet. These featuresmake the subversion of a broadband-connected system a valuable proposition for hackers, and lead directlyto the following risks:— disclosure, modification or deletion of information, as a result of unauthorized remote access,— propagation of malicious code,— upload/download and execution of unauthorized code,— identity theft,— mis-configuration of client systems,— introduction of software vulnerabilities,— network congestion,— DoS.© <strong>ISO</strong>/<strong>IEC</strong> 2006 - All rights reserved 35

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!