Abstract

The article considers the features of telecommunications equipment (hereinafter referred TCE) protection from computer attacks by setting up of protective mechanisms. Information about existing developments of TCE protection area is given in the article. Data about the most significant threats to information security of TCE is presented. The areas of applicability of existing recommendations for setting up TCE are shown; their limitations and disadvantages in terms of ensuring information security are highlighted. An original method of TCE protection is for the first time proposed by the authors to neutralize the identified shortcomings in the theoretical basis. The improvements in TCE protection at the control, data and protocol planes are graphically presented in the article. Conducted researches have shown that settings, suggested by the authors, do not seriously affect performance. TCE protection with integrated security means can be considered as the first line of defense for communication networks. Fixing of computer attacks at the specified line will allow specialists to timely identify illegal actions and develop the necessary management decisions. The proposed method of TCE protection can be applied to the model lines of equipment, produced by the largest telecommunications companies.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call