BS ISO IEC 27033-6 pdf download

admin
BS ISO IEC 27033-6 pdf download

BS ISO IEC 27033-6 pdf download.Information technology — Security techniques — Network security
1 Scope
This part of ISO/IEC 27033 describes the threats, security requirements, security control and design techniques associated with wireless networks. It provides guidelines for the selection, implementation and monitoring of the technical controls necessary to provide secure communications using wireless networks. The information in this part of ISO/IEC 27033 is intended to be used when reviewing or selecting technical security architecture/design options that involve the use of wireless network in accordance with ISO/IEC 27033-2. Overall, ISO/IEC 27033-6 will aid considerably the comprehensive definition and implementation of security for any organization’s wireless network environment. It is aimed at users and implementers who are responsible for the implementation and maintenance of the technical controls necessary to provide secure wireless networks.
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC 27000, ISO/IEC 27033-1 and the following apply. 3.1 access point wireless access point device or piece of equipment that allows wireless devices to connect to a wired network Note 1 to entry: The connection uses a wireless local area network (WLAN) or related standard. 3.2 base station wireless base station equipment that provides the connection between mobile or cellular phones and the core communication network 3.3 Bluetooth wireless technology standard for exchanging data over short distances Note 1 to entry: “Bluetooth” is a trademark owned by the Bluetooth SIG. 3.4 core network part of a mobile telecommunication network that connects the access network to the wider communication network EXAMPLE The Internet and other public networks are examples of wider communication networks. 3.5 femto cell home cell small cell small, low-power cellular base station (3.2) Note 1 to entry: A femto cell is typically designed for use in a home or small businesses. 3.6 hardening process of securing a system by reducing its surface of vulnerability Note 1 to entry: Hardening typically includes the removal of unnecessary software, unnecessary usernames or logins and the disabling or removal of unnecessary services. 3.7 machine to machine technologies that allow both wireless and wired systems to communicate with other devices of the same type 3.8 power ratio signal-to-noise ratio measure that compares the level of a desired signal to the level of background noise Note 1 to entry: It is defined as the ratio of signal power to the noise power. 3.9 radio access network part of a mobile telecommunication system that implements a radio access technology such as WCDMA or LTE to provide access for end-user devices to the core network (3.4) Note 1 to entry: The radio access network resides between the end-user device and the core network. Note 2 to entry: A mobile phone is an example of an end-user device.3.10 radio network controller network element in a 3G mobile network which controls the base stations, interface to the core network (3.4) and carries out the radio resource management and mobility management functions of the network 3.11 Wi-Fi wireless local area networking technology that allows electronic devices to network, mainly using the 2,5 GHz and 5 GHz radio bands Note 1 to entry: “Wi-Fi” is a trademark of the Wi-Fi Alliance. Note 2 to entry: “Wi-Fi” is generally used as a synonym for “WLAN” since most modern WLANs are based on these standards.
6 Overview
More and more users of communication and processing devices are opting to use wireless interfaces to connect to their network of choice. With ubiquitous wireless networks, users see the benefit of lower costs, always-on connectivity and automatic connection setup as a driver for choosing a wireless connection over a wire line connection. Particularly for wireless networks, availability of unlicensed frequency bands, the high cost of installing a cabling infrastructure into an established or old premise, business or residential zone and the flexibility to allow additional users to connect to the network can make the choice attractive. For example, in most countries, for Wi-Fi connectivity, one just needs to apply to a service provider for an Internet connection. It is then connected to a wireless access point or router which broadcasts the signal. Network Interface Cards (NIC) in the communications devices or computing device generally come as standard and users need only enable the interface to start the communication process with the wireless network.