2/27/2016 3:33:01 PM
User Rank Platinum
Re: Protecting Telecom Infrastructure from Cyber threats
Great information. Cyber security threats occur in all industries. Telco are becoming more susceptible to cyber security threats while they are working towards implementing new technology. They must take steps to protect sensitive data.
"The Global State of Information Security Survey 2014," a worldwide study conducted by PwC, CIO magazine, and CSOmagazine, polled 456 telecommunications executives to measure and interpret how they combat today's cyber threats.
Exploitation of networks was the most commonly cited impact of security incidents, followed by compromise of data. The breach of employee and customer information increased substantially over last year. Telecom operators reported that compromise of employee records increased 54% and breach of customer records jumped 44%.
Hackers ard mobile devices, BYOD (bring your own device) policies and lack of adequate security policies and protection measures also poses threats for companies
Protecting Telecom Infrastructure from Cyber threats
Almost all the telecommunications service providers (TSPs) recognize their role that they play in helping to "build a safer, more secure and more resilient communication" in their operating geography. Operators realize that the communication services they provide place them in a unique position, for "the ability to communicate" is a key requirement for other critical sectors.
Any cyber breach of telecom's critical infrastructure could result in catastrophic business loss, adverse economic effects, and significant harm to reputation. Service Providers are committed to ensuring the security of their infrastructure to reduce the risk of unplanned disruptions and help resolve problems.
The telecommunication regulatory body in every nation has made 'mandatory' security regulatory compliance for an operator to fulfill; such as in UK - Ofcom guidance on security requirements in sections 105 A to D of the Communications Act 2003, India – DoT Security amendment dated May 30th 2011, United States of America - Federal Information Security Management Act (FISMA) of 2004, National Institute of Standards and Technology (NIST) 800 series of Special Publications (SP), etc.,
The expectations of the CISO at the service provider to have visibility on the list of security features and protocols at each network element and applicable standard, risk exposure, maintenance of vulnerability assessment and penetration testing database for telecom equipment's, mechanism of accepting the feedback and addressing the security issues and formulate the telecom security audit standards and regulatory compliance
Operators should have private cosultants who helps the them to have the important stipulations to mitigate the risks by following ways:
- To create a secure cyber strategy and an assurance framework
- To induct the security certified network elements in production
- To get or carry out a security audit of their network periodically to strengthen the regulatory framework
- To have contemporary security features in network elements
- To build, operate and manage the intrusion, fraud, attack detection systems
- To perform effective security incident response for security threat early warning, vulnerability management and response to security threats
- To reduce the supply-chain risks
- To create cyber security awareness
Italy's 5G auction could exceed a government target of raising €2.5 billion ($2.9 billion) after attracting interest from companies outside the mobile market.
The emerging-markets operator is focusing on the humdrum business of connectivity and keeping quiet about some of its ill-fated 'digitalization' efforts.
Three UK has picked Huawei over existing radio access network suppliers Nokia and Samsung to build its 5G network.
Vendor says that it's its biggest 5G deal to date.
Verizon skates where the puck is going by waiting for standards-based 5G devices to launch its mobile service in 2019.
Orange has been one of the leading proponents of SDN and NFV. In this Telco Transformation radio show, Orange's John Isch provides some perspective on his company's NFV/SDN journey.
Huawei Network Transformation Seminar
The adoption of virtualization technology and cloud architectures by telecom network operators is now well underway but there is still a long way to go before the transition to an era of Network Functions Cloudification (NFC) is complete.
The Small Cell Forum's CEO Sue Monahan says that small cells will be crucial for indoor 5G coverage, but challenges around business models, siting ...
People, strategy, a strong technology roadmap and new business processes are the key underpinnings of Telstra's digital transformation, COO Robyn ...
Eric Bozich, vice president of products and marketing at CenturyLink, talks about the challenges and opportunities of integrating Level 3 into ...
Epsilon's Mark Daley, director of digital strategy and business development, talks about digital transformation from a wholesale service provider ...
Bill Walker, CenturyLink's director of network architecture, shares his insights on why training isn't enough for IT employees and traditional ...