security In telecommunications, protection of system and network resources from external attack or internal subversion, thereby ensuring that those resources are available only to those who have the legitimate right to use them and, further, to ensure that they are used only for legitimate purposes. Security encompasses the following dimensions. • Physical security involves control over the personnel who have access to the facilities in which the hardware systems (e.g., terminals, servers, and PBXs) reside. Access control includes security guards, locks and keys, electronic combination locks, and electronic card key systems. Physical security also entails low-tech tools such as document shredders and burn bags, which jointly serve to make paper documents and electronic media unusable after they have served their purposes. Physical security also encompasses all measures required to protect wireline and wireless transmissions from physical wiretaps and other means of signal interception. • Authentication includes all security measures designed to verify or validate the identity of a user or station prior to granting access to resources. 74570c19.qxd 9/12/07 12:41 AM Page 432 |