New Reduced price! EG 201 620 : 1.1.1 View larger

EG 201 620 : 1.1.1

M00045060

New product

EG 201 620 : 1.1.1

INTELLIGENT NETWORKS (IN) - SECURITY STUDIES FOR CORDLESS TERMINAL MOBILITY (CTM)

European Telecommunications Standards Institute

More details

In stock

$35.10

-55%

$78.00

More info

Table of Contents

Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions and abbreviations
   3.1 Definitions
   3.2 Abbreviations
4 Security Objectives
   4.1 Customers' (Subscribers') Objectives
   4.2 CTM Service Providers' and Network Providers'
        Objectives
   4.3 Manufacturers' Objectives
   4.4 Objectives Derived from the CTM Service Descriptions
   4.5 Main Objectives
5 Legislation Issues
   5.1 Privacy
   5.2 Security Order
   5.3 Lawful Interception
   5.4 Contract
6 Architecture
   6.1 Functional Architecture
   6.2 Network Procedures
   6.3 Management Procedures
7 Threat Analysis and Risk Assessment
   7.1 Threats
   7.2 Threats Related to CTM Network Procedures
   7.3 Risk Measurement
   7.4 Risk Assessment for the CTM Network Procedures
   7.5 Consolidated Risk Assessment
   7.6 Conclusion
8 Security Requirements and Security Services
   8.1 Authentication
   8.2 Access Control
   8.3 Confidentiality
   8.4 Integrity
   8.5 General Security Policy
   8.6 Threats and counteracting security measures
9 Resulting Security Architecture
   9.1 Radio access part
   9.2 Service data access part
   9.3 Network part
   9.4 Policy part
   9.5 Concluding remarks
10 Security Mechanisms
   10.1 Radio Access Part
   10.2 Service Data Access Part
   10.3 Network part
Annex A (informative): Use of CT2 for CTM
      A.1 Portable Part (PP) authentication
      A.2 Fixed Part (FP) authentication
      A.3 Identities and associated parameters
      A.4 Registration
      A.5 On-air (de)-registration acknowledgement
      A.6 ZAP facility
      A.7 Ciphering
      A.8 Comparison of CT2 and DECT regarding security for CTM
      A.9 Conclusions
Annex B (informative): Threats with minor risk and
        countermeasures
Bibliography
History

Abstract

Networking security aspects of CTM cases A, B and C Access security issues of CTM, particularly relating to authorization.

General Product Information

Document Type Standard
Status Current
Publisher European Telecommunications Standards Institute
Committee NA 6