Cyber security issues of telecommunication infrastructure

Risteski, Aleksandar and Bogdanoski, Mitko and Stoilkovski, Marjan and Jovanovic, Miroslav (2014) Cyber security issues of telecommunication infrastructure. In: Cyber Security and Resiliency Policy Framework. 38 of NATO Science for Peace and Security Series - D: Information and Communication Security . IOS Press. ISBN 978-1-61499-445-9


Download (1586Kb) | Preview

Download (290Kb) | Preview
Official URL:


We live in a well connected and technology dependent world. People, institutions, companies have increasing need for communication in everyday life. Global and seamless connectivity today is enabled by complex telecommunications infrastructure consisted of a large variety of different technologies which are in a continuous process of development and innovations. But, the global connectivity and easy access to modern technology also enables malicious users and their activities. These activities might be of different nature: starting from passive monitoring to destructive attacks disabling the normal operation of ICT (information and communication technology) infrastructure. Therefore, security issues of telecommunication infrastructure must be thoroughly addressed by all relevant stakeholders. Although each technology includes certain security mechanisms, it is necessary to create well designed security concept for the infrastructure as a whole, taking into consideration not only the technical issues, but also policy framework and legal aspects. The concept must be a subject of constant revision in order to be up to date to current threats. Therefore, the network infrastructure must be always monitored and analyzed, in order to create efficient measures against the security threats. The telecommunication infrastructure in the Republic of Macedonia is owned and operated by state institutions, telecom operators and providers, other companies and universities etc. All of them are faced with number of malicious activities and attacks exploiting vulnerabilities of the systems, which are well monitored and statistically analyzed. Also, all of them has defined more or less effective security concept including proactive and reactive measures. However, a common practice of cooperation and exchange of information and experience among the subjects is missing. A national strategy and policy framework are also missing. Their creation and devoted implementation would be beneficial for all stakeholders resulting in more effective and less expensive solutions as a response to cyber attacks

Item Type: Book Section
Subjects: Natural sciences > Computer and information sciences
Engineering and Technology > Electrical engineering, electronic engineering, information engineering
Divisions: Faculty of Computer Science
Depositing User: Mitko Bogdanoski
Date Deposited: 31 Oct 2014 11:35
Last Modified: 07 Aug 2015 06:44

Actions (login required)

View Item View Item