Telecom Security
Policy Framework
Why Policy
• All pervasive use of IP based technologies
• Sophisticated methods of communication
flows with complex encryption techniques
• Many Telecom Service Providers (TSPs),
vendors and solution providers
Threats
Major threats to any Telecom Networks
are:
• Information Leak and Manipulation
• Service Denial and Degradation of Service
• Technological Dependence
• Natural and Manmade Disasters
Objectives
• To have a robust, secure, safe and cost
effective Telecom Network ensuring
continuity of service
• To ensure adequate communication security
for different types of communication needs
• To provide assistance to security agencies for
law enforcement and national security
Components of the Security Policy
• Security of the Telecom Network from various
threats and vulnerabilities
• Communication assistance to the Law Enforcement
and Security Agencies for lawful discharge of their
duties
• Security of Communication, Information and Data
for user trust and confidence
• Creation of a robust modern Telecom Network with
sound national/ international security standards
• Secured Communication for strategic needs
• Communication for public safety and emergency
• Disaster Management
• Capability and Capacity Creations
Thanks