Improving Security Management for Mobile Operators

نویسنده

  • Christos K. Dimitriadis
چکیده

By Christos K. Dimitriadis, Ph.D., CISA, CISM Mobile operators are organizations that provide telecommunication services over a cellular interface. The mobile industry initially consisted of infrastructures that provided voice and very limited data services through mobile phones. Modern mobile operators provide a wide range of multimedia data services, including video-on-demand and mobile Internet access. This transformation created new demands in service provision, requiring enhanced versions of supporting services such as charging, billing, roaming, interworking and addressing, along with the necessary security services for protecting information confidentiality, integrity and availability. As a result, the infrastructure of modern mobile operators consists of a number of heterogeneous systems that host critical information in many forms and are usually handled by complex information technology (IT) governance systems. This article aims to present existing problems in the security management systems of mobile operators, as captured by extensive security assessments conducted in a number of major operators. It presents difficulties in the implementation of international IT governance and security management standards, focusing on sharing experiences and proposing solutions to existing security issues in the specific environment of mobile operators, following the fundamental principle that security in practice is based on the knowledge we have regarding the vulnerabilities applied in a specific environment. 3 The Mobile Operator’s Environment The multitude and magnitude of systems that process or store critical or legal sensitive data in combination with the fast infrastructure upgrades define an environment with important challenges for managing security. Figure 1 presents a simplified overview of a mobile operator’s infrastructure. A typical third-generation (3G) mobile operator’s infrastructure, based on the Universal Mobile Telecommunications System (UMTS), consists of three main components: the UMTS Terrestrial Radio Access Network (UTRAN), the core network and the corporate network. The UTRAN is a collection of systems (including the antennae and their controllers, among other systems) that provide access to the subscribers through their mobile phones. The mobile core network serves traffic switching and signaling for voice and data mobile connections, linking the UTRAN with other voice and data networks, including the Internet. The mobile core network hosts a number of critical systems, including the gateways for voice and data service provision, as well as databases that hold subscriber data. All of these systems contain sensitive corporate or subscriber information. The corporate network indicatively hosts the billing system, which collects call detail records (CDRs) from various core network components—usually through a billing gateway, the enterprise resource planning (ERP) system, the fraud detection system, the data warehouse system, systems for subscriber management and customer relations, and other systems supporting the business functions of the mobile operator. Most of these systems handle critical

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC

Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...

متن کامل

The Effect of Word-Of-Mouth Advertisements on the Responses of Clients (Case Study: Mobile Operators)

Customer reviews in social media contain valuable electronic word-of-mouth (eWOM) information of products, which facilitates firms’ business strategy and individual consumers’ comparison shopping. This study examined the effects of eWOM motivations on customers’ behavioral intentions in the Mobile operators setting. eWOM advertising is very important because nowadays many customer buying decisi...

متن کامل

Towards Central Vulnerability Management by Mobile Phone Operators

The application of XML-based approaches in passing vulnerability information between vulnerability management devices or software residing on wired networks has been demonstrated. We propose a proof of concept framework for mobile operators that extends this use of XML into the area of vulnerability management on public land mobile networks. Our proposed framework allows for a pro-active centra...

متن کامل

Providing a Multidimensional Measurement Model for Assessing Mobile Telecommunication Service Quality (MS-Qual)

Because of the need to develop specific measurement scales for different services industries, this study aimed to empirically develop a reliable and valid model specifically for measuring mobile telecommunication service quality. A multidimensional measurement model (MS-Qual) has been proposed based on an extensive literature review and then, to assess the model validity, convergent and discrim...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006