Sign In

Full text access may be available.

To access full text, please use your member or institutional sign in.

Formats Non-Member Member
$31.0 $31.0
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, books, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)

In this final chapter, we provide an overview of modern network and infrastructure management as a context for the management of deployed security mechanisms. In this review we discuss the need for management mechanisms specific to the management of security at all layers within the Telecommunications Management Network (TMN). We then progress to a discussion of operational security, necessary mechanisms, including forensics, third-party access reviews, and certification. We conclude our treatment of security management with consideration of how to withdraw equipment from service without exposing information to unauthorized access. The third aspect of security management considered is that of compliance. Compliance links back to security policies and requirements that must be adhered to by operations and management personnel.