Advertisment

Network security worries telecom sector

author-image
CIOL Bureau
Updated On
New Update

NEW DELHI: “Connectivity is not an issue but security is a major issue today in all sectors including the most emerging telecom sector,” according to Vivek Gupta Security Consultant, IBM Global Services India Private Limited.

Advertisment

The jobs of the CIOs have become the most critical with the increasing number of cyber frauds in the industry. He said that the organizations should stress on right kind of security, he added.

He was delivering the keynote address on security requirements for enhancing Telecommunication Reliability at the third International Conference on Network Security India 2006 here.

“IBM has developed a six layer security system to minimize breach of security in organisations. The organisations should follow the six layers through — strategy, technology, applications, organisation, processes and facility and security,” Gupta added.

Advertisment

Brig. A.K. Wahie, commander, Army Cyber Security Establishment, India Army, stressed on Risk Assessment and Management. He suggested the organisations to follow three the 'R'- Resistance, Recognition and Recovery.

“Customise vendor software to minimize risk. Organisations should restrict access to vulnerable files and directories to strengthen security,” Wahie said.

S.D. Saxena, director - Finance, Bharat Sanchar Nigam Ltd, pointing out on the recent phone tapping case, said that it is not possible for any unauthorized person to enter the BSNL network and illegally tap their phones.

Advertisment

“We have taken special care in it and with the recent incident of phone tapping the security system has become more stringent,” he said. However, he admitted that there were risks for someone to breach the security system.

The panel also said that 75 percent of network attacks are from within the network and stressed on user access control. The panel was chaired by Member-Services, Department of Telecommunication, Arun Kumar Saxena.

The two-day conference, which will conclude tomorrow, aims to provide professional insights and understanding on planning and managing a secured critical architecture.

tech-news