Category Archives: Telecom Security
ETSI Security Workshop 2012
Material from ETSI Security Workshops is usefull information for learning and understanding what is happening in the industry. Here are the main links: Permanent link to latest workshop Link to 2012 workshop Presentations of the 2012 workshop
ETSI Security Whitepaper 2012
ETSI has published new revision of their security whitepaper . ETSI in Wikipedia: The European Telecommunications Standards Institute (ETSI) is an independent, non-profit, standardization organization in the telecommunications industry in Europe, with worldwide projection. ETSI has been successful in standardizing … Continue reading
Asmonia Project, addressing security in Mobile Networks
ASMONIA Project is an interesting approach to address security in Mobile Networks. For persons working on the field, it is worth to look on this material. ASMONIA = Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative … Continue reading
ITU Terms and Definitions
ITU (International Telecommunication Union, intro) has online database for terms and definitions for 6 languages. Currently there are more than 100000 terms. For the term “information security” it can find a match in ITU-T. Term : information security Definition … Continue reading
Revenue Assurance in Telecommunications, Webcast by KPMG
This is interesting material for anyone who is interested on this topic. link to webcast page.
ISO 27000 serie of standards for Information Security
ISO 27000 serie is THE set of standard for Information Security, a must to have and look for people working in the area. Good overviews and lists are available wikipedia ISO 27000 Series * ISO/IEC 27000 — Information security management … Continue reading
ITU-T Study Group 17
ITU-T Study Group 17 works on security related issues. In the technical Flyer, the building block are listed as Security Architecture and Frameworks Telecommunication Security Protocols Security in Frame Relay Security Techniques Directory Services and Authentication Network Management Security Systems … Continue reading