Loading in 2 Seconds...
Loading in 2 Seconds...
Information Security Challenges in Telecom Michael T. Clark, Ph.D. CEO 13 October 2004 Safe Harbor
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Michael T. Clark, Ph.D.
13 October 2004
Source: Businessworld, 4th Oct 2004
COMMERCEe-enabled business environment
The security framework and tools to organize, manage and deliver content, services and process
Value add services
Jamming in cellular frequencies.
SMS vulnerability – corrupt messages transmitted to handset and
gateways crash software and corrupt SMS packets.
Traffic interruption and monitoring in WI-FI network leads to
unauthorized access of signals.
Hacks get access to credit card transactional information – a vulnerability in General Packet Radio Service (GPRS).
Abuse of database by third party service bureaus.Key IS challenges
System dependency on internet technologies results in illegal intrusions, disruption, disablement and corruption of critical infrastructure.
Open architecture challenges privacy, safety, integrity and processes.
Vulnerabilities in wireless networks…microwave systems; TDM/GSM/CDMA cellular; WLANS.Key IS challenges - continued
Management and third party
World Bank’s four pillars of public policy for electronic security:
Legal and regulatory framework; electronic transactions; laws governing legal validity; security of payment systems; data privacy and its impact; money laundering
External monitoring of e-security practices
Managing digital identities
Precautions in network, applications and process compliances
Indian telecom laws and regulation.Assigning responsibilities: regulator
Public private partnership.
Engage international agencies and institutions on IS.
Develop Indian brand-identity at highest level of IS.Assigning responsibilities: industry
Transactional security will be the key offer in the full-fledged security solution market bundled with security point-products.
Telecom (bandwidth) service providers will implement full-fledged IS management system.
Security outsourcing would enable service providers to focus on their core-competencies.
Uniform regulations for converged environments; harmonized international IS regimes.IS business drivers ahead…