0% found this document useful (0 votes)
191 views6 pages

Telecom Network Security Policy

This document outlines a telecom security policy framework. It discusses the need for such a framework due to the widespread use of IP technologies, complex encryption methods, and multiple telecom providers. The policy aims to create a robust, secure telecom network that ensures continuous service and communication security. It seeks to provide assistance to security agencies while protecting networks from threats like information leaks, service outages, technological dependence and natural disasters through components that ensure network, communication, and data security as well as disaster management capabilities.

Uploaded by

Ragini Kumari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
191 views6 pages

Telecom Network Security Policy

This document outlines a telecom security policy framework. It discusses the need for such a framework due to the widespread use of IP technologies, complex encryption methods, and multiple telecom providers. The policy aims to create a robust, secure telecom network that ensures continuous service and communication security. It seeks to provide assistance to security agencies while protecting networks from threats like information leaks, service outages, technological dependence and natural disasters through components that ensure network, communication, and data security as well as disaster management capabilities.

Uploaded by

Ragini Kumari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Telecom Security

Policy Framework
Why Policy

• All pervasive use of IP based technologies

• Sophisticated methods of communication


flows with complex encryption techniques

• Many Telecom Service Providers (TSPs),


vendors and solution providers
Threats

Major threats to any Telecom Networks


are:
• Information Leak and Manipulation
• Service Denial and Degradation of Service
• Technological Dependence
• Natural and Manmade Disasters
Objectives
• To have a robust, secure, safe and cost
effective Telecom Network ensuring
continuity of service
• To ensure adequate communication security
for different types of communication needs
• To provide assistance to security agencies for
law enforcement and national security
Components of the Security Policy
• Security of the Telecom Network from various
threats and vulnerabilities
• Communication assistance to the Law Enforcement
and Security Agencies for lawful discharge of their
duties
• Security of Communication, Information and Data
for user trust and confidence
• Creation of a robust modern Telecom Network with
sound national/ international security standards
• Secured Communication for strategic needs
• Communication for public safety and emergency
• Disaster Management
• Capability and Capacity Creations
Thanks

You might also like