TS 121 133-2000

Universal Mobile Telecommunications System (UMTS); 3G Security; Security Threats and Requirements (3G TS 21.133 Version 3.1.0 Release 1999)


 

 

非常抱歉,我们暂时无法提供预览,您可以试试: 免费下载 TS 121 133-2000 前三页,或者稍后再访问。

如果您需要购买此标准的全文,请联系:

点击下载后,生成下载文件时间比较长,请耐心等待......

 

标准号
TS 121 133-2000
发布日期
2000年01月01日
实施日期
2014年04月16日
废止日期
中国标准分类号
/
国际标准分类号
/
发布单位
ETSI - European Telecommunications Standards Institute
引用标准
27
适用范围
This specification takes notice of the Security Principles and Objectives as set out in [1]. It contains an evaluation of perceived threats to 3GPP and produces subsequently a list of security requirements to address these threats. As teleservices and applications will not@ in general@ be standardised@ it is difficult to predict their exact nature. Therefore@ this specification considers all security threats and aims at listing generic security requirements that shall be applicable irrespective of the actual services offered. The list of threats and requirements may however need to be updated as the 3GPP system evolves. The threat analysis performed relies to a large extent on previous experiences with 2G systems@ in particular GSM@ and takes into account known problems from that area. The security requirements listed in this specification shall be used as input for the choice of security features and the design of the 3GPP security architecture as specified in [2]. The structure of this technical specification is as follows: clause 2 lists the references used in this specification; clause 3 lists the definitions and abbreviations used in this specification; clause 4 contains a reference to the general objectives for 3G security; clause 5 contains an overview of the context in which the security architecture of 3G is designed; clause 6 contains a list of identified security threats to 3G@ and gives some results from the threat analyses that have been performed; clause 7 contains an overview of the risk assessment resulting from the threat analyses performed clause 8 contains the resulting list of security requirements for 3G and indicates how these requirements relate to the threats and the security objectives . Finally@ Annex A gives some more detailed information on threats and risks connected to so called false base station attacks.




Copyright ©2007-2022 ANTPEDIA, All Rights Reserved
京ICP备07018254号 京公网安备1101085018 电信与信息服务业务经营许可证:京ICP证110310号