Font Size: a A A

Research And Application Of Information Security System In Telecom Support System

Posted on:2009-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:H Y TangFull Text:PDF
GTID:2178360245465583Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The situation of information security in the communications industry is very grim at present. With the emerging of viruses, Trojans and hacker attacks, the communication operations also have encountered the destruction similar to the consequences of "911" terrorist activities. Artificial mistakes and a series of accidents can also lead to calamity. The interruptions, paralysis of the communication networks and business systems service, and even the errors of the accounting system or information leakage, may give the whole community irreparable loss. To analyze and solve the information security problems in communications industry has become one of the critical issues for a telecom operator's stable development.As a significant means for enterprise management, rapidly business opening, timely business protecting and optimizing the management of network resources, the telecom support system has been emphasized increasingly by telecom operators, and has played a more important role in the enterprise development. How to establish an Information Security System and to give the telecom support system more effective protection become particularly crucial.DCN Network (Data Communication Network), as a unique carrier network for a provincial telecom operator's telecom support system (also known as the IT systems, information systems), carries more than 20 support systems such as Major Customer Management System, Customer Service System, on-line Billing Acquisition System, IP Network Management System and Integrated Network Management System. The safety of the systems is very important, so building an Information Security System becomes extremely urgent. How to ensure the security of the DCN network and information system over it becomes a critical issue for the whole business operation of the telecom operator.The research on building the Information Security System was carried out, taking the telecom support system of the telecom operator as object and using the DCN network and information systems over it as the main carrier.On the basis of study of the Information Security System model, according to the actual situation of the telecom support system, in the light of domestic and international security standards, making full use of information security theories, an improved Information Security System Model- POO-PDRRA Model, which fits the telecom support system, was developed. The PO2P Model is the short for POO-PDRRA Model.The security assessment for the telecom support system was held, which was about the DCN network and the information assets of the information systems over the DCN, and aimed at the vulnerabilities and threats in the network and systems. Based on the results of security assessment, a security status report on the telecom support system was written.The security requirements are defined on the basis of the security assessment results. According to the POO-PDRRA Model, using P-T-PADIS security service model methodology, the Information Security System was built, which consists of security strategy system, security organization system, security operation system, and security technology system. The effects of application and the advantages of the POO-PDRRA Model were discussed and analyzed.
Keywords/Search Tags:telecom, telecom support system, information security, information security system, information security system model
PDF Full Text Request
Related items