Recommendation: Establish Software Security Measures

Since the public networks are increasingly driven by software, the National Communications System should consider how to protect the public network from penetration by hostile users, especially with regard to harmful manipulation of any software embedded within the public networks that is open to customer access for purposes of network management and control.

Perhaps the most disturbing of the growing network vulnerabilities described in this report is that of increasingly open outside access to network databases. The desire to open access to the public networks must be counterbalanced by a recognition that the integrity of the public networks must be protected. The National Security Telecommunications Advisory Committee (NSTAC) has already addressed two network software issues: automated information processing (AIP) and industry information security (IIS). With the advent of Open Network Architecture, the work done by the NSTAC must be built on, to meet the challenges posed by the emerging public network environment.

REFERENCES

Reudnik, D. 1988. Views on telecommunications technology. Presentation to the Committee on Review of Switching, Synchronization and Network Control in National Security Telecommunications, Washington, D.C., March 16.


Wallace, L. 1988. Perspective on testing, restoration, and network management. Presentation to the Committee on Review of Switching, Synchronization and Network Control in National Security Telecommunications, Washington, D.C., March 16.



The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement