Font Size: a A A

The Research On Security Architecture Of Carrier Metro Broadbank Network

Posted on:2008-05-03Degree:MasterType:Thesis
Country:ChinaCandidate:M SunFull Text:PDF
GTID:2178360272457148Subject:Industry Technology and Engineering
Abstract/Summary:PDF Full Text Request
With the widely progress of the IP network and highly growth of the broadband network users on the carrier network, the network security become more important and more influential for the telecom carrier industry, and become the very important factor which will affect the carrier network operation and the end user's behavior. For the telecom carriers, the security issues will not only relate to the network application system, but also relate to the reliable and stable operation of the network and the possible network attack from end user or the other ISP.Firstly, this article makes an introduction and analysis to the current security development status of in-country and international carriers, and uses the advanced network security methodologies as the basis to build security architecture for carrier metro broadband network.Secondly, the methodology of risk control aim at different object and layer on the carrier metro broadband network is brought forth based on the related theories and assessments of risk management. According to the risk control methodology, the security demands and develop requirements of the security architecture are brought out.Thirdly, according to the security risk control of carrier metro broadband network, the factors consist in the framework of network security insurance architecture are brought out.Finally, based on the current level of the security technology, the develop methodology of the security architecture is brought forth, which will make the whole security system with reasonable structure, high security, low risk and easy management. With this methodology, the system risk of carrier metro broadband network will be controllable.
Keywords/Search Tags:Carrier, Information Security, Risk Management, Security Architecture, Defense-in-Depth
PDF Full Text Request
Related items