The document summarizes the work of the International Telecommunication Union (ITU) Study Group 17 on cybersecurity and telecommunication security standards. Some key activities discussed include the ITU Global Cybersecurity Agenda framework, identity management efforts, securing next generation networks, and challenges around strategic direction, legal issues, and cooperation across standards bodies.
11. NGN architecture overview (Y.2012) Transport stratum Service stratum Control Media Management Functions A NI Transport C ontrol Functions Resource and Admission Control Functions NNI UNI Application Support Functions & Service Support Functions Applications Transport Functions End-User Functions Other Networks Service Control Functions Network Attachment Control Functions Service User Profiles T ransport User Profiles
12.
13. NGN Security Trust Model Trusted Zone Trusted but Vulnerable Zone Untrusted Zone Network Elements controlled by the NGN provider Network Elements not always controlled by the NGN provider NGN network Elements Network Border Elements (NBE) TE-BE TE TE Provider- controlled Equipment TE-BE TE TE
14. NGN Peering Trust Model Trusted Zone Trusted but Vulnerable Zone Untrusted Zone NGN network Elements Domain Border Elements (DBE) NGN network Elements Domain Border Elements (DBE) Provider B from Provider A’s point of view Provider A