6.
NGN and network security
The convergence of networks towards all-IP architecture provides operators with great opportunities
to reduce their costs, and develop integrated services across fixed and mobile access increasing subscriber
welfare. Network convergence needs to be complemented by convergence in the underlying security of
policies, measures and practices to avoid NGN is subject to the attacks experienced today by IP networks
carrying Internet, e-mail and presence applications.
122
As operators move from trials to wide commercial
roll-out, questions regarding how to guarantee security across multiple networks are becoming more
urgent.
IP-based next generation networks and the traditional circuit switched networks operate in different
environments and are therefore exposed to different types of threats and attacks, both from within or
externally. With converged networks, operators are migrating from a stand-alone “closed” environment,
such as the PSTN, to an open environment. The PSTN infrastructure is controlled by operators, and users
have a lesser amount of information on its structure and functioning, as well as fewer possibilities to
misuse the network. This situation, sometimes labelled as “security by obscurity”,
123
stands in contrast with
the design of the IP infrastructure, based on open protocols, which were not originally designed for
security implementation.
124
IP networks enable the provision of services – such as voice, data, and
multimedia – provided by multiple access and service providers, and are connected with a growing number
of devices, which are moving to open platforms, becoming increasingly powerful, and providing users with
the possibility to actively interact with the network.
Security in a converging environment is not only a technical, but also an economic and social issue.
On the economic side, networks are an integral part of the global information infrastructure, defined as an
essential, indispensable facility for society, whose disruption would rapidly bring about a state of
emergency or could have adverse societal effects in the longer term, and as such they need to be
protected.
125
Governments and businesses alike are eager to adopt innovative services and applications;
however, in order to be able to rely on them, they require appropriate levels of assurance to protect their
information and transactions. Security is essential for the industry to be reliable and competitive in the
global market.
The social dimension of security is also important: consumers are becoming increasingly dependent
on information systems, and convergence of networks and services will expand opportunities to be
connected anytime, anywhere. While the growing empowerment of users enables them to benefit more
from ICTs, it also entails less positive consequences, such as increasing security and vulnerability risks,
which threaten users’ transactions, privacy, and personal data. At the same time, with advanced and
always-connected devices at their disposal, users may unwittingly become a vehicle for security attacks.
126
New and advanced solutions to security issues are being discussed at national and international levels, and
several initiatives are currently underway.
DSTI/ICCP/CISP(2007)2/FINAL
51
The borderless nature of IP networks means that security threats affecting the converged infrastructure
can arise from anywhere. The main challenges across borders include the necessity to improve co–
operation of law enforcement activities against security offences, with particular attention to consistency of
cybercrime legislation and regulations. In addition, international co–ordination and exchange of
information is essential to create a global understanding of security risks and solutions linked to converged
networks.
Although security is a priority in the future networks, it is also important to ensure an appropriate
balance between civil liberties and security solutions – at the technical, policy or regulatory levels – in
order to avoid excesses leading to violation of users’ privacy, or illegitimately limiting individuals’ rights
to anonymity and freedom of expression.
127
It is also important to take into account the direct and indirect
costs which may be incurred from securing networks. These costs also reduce the openness of networks
and may impact on innovation.
At the regulatory level, greater emphasis is put on regulatory oversight in the implementation of
security measures. Already in 2002, the OECD Guidelines for the Security of Information Systems and
Dostları ilə paylaş: |