<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">National Security and Strategic Planning</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">National Security and Strategic Planning</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Национальная безопасность и стратегическое планирование</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="print">2307-1400</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">35574</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>Информационная безопасность</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject>Information Security</subject>
    </subj-group>
    <subj-group>
     <subject>Информационная безопасность</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">AN OVERVIEW OF MODERN TELECOMMUNICATION NETWORKS SECURITY CHALLENGES</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>ОБЗОР ЗАДАЧ БЕЗОПАСНОСТИ СОВРЕМЕННЫХ ТЕЛЕКОММУНИКАЦИОННЫХ СЕТЕЙ</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>ОСУОЛАЛЕ</surname>
       <given-names>ТИАМИЙУ А </given-names>
      </name>
      <name xml:lang="en">
       <surname>OSUOLALE</surname>
       <given-names>TIAMIYU A </given-names>
      </name>
     </name-alternatives>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">Санкт-Петербургский государственный университет телекоммуникаций имени проф. М.А. Бонч-Бруевича</institution>
     <country>ru</country>
    </aff>
    <aff>
     <institution xml:lang="en">Санкт-Петербургский государственный университет телекоммуникаций имени проф. М.А. Бонч-Бруевича</institution>
     <country>ru</country>
    </aff>
   </aff-alternatives>
   <volume>2013</volume>
   <issue>2</issue>
   <fpage>37</fpage>
   <lpage>43</lpage>
   <self-uri xlink:href="https://futurepubl.ru/en/nauka/article/35574/view">https://futurepubl.ru/en/nauka/article/35574/view</self-uri>
   <abstract xml:lang="ru">
    <p>Еще недавно цифровая безопасность не рассматривалась в качестве дела, затрагивающего каждого, но в наши дни всякий осознает важность безопасной работы вычислительных и сетевых систем. Это имеет важное значение, т.к. многие стороны нашего бизнеса и частной жизни опираются на вычислительные и телекоммуникационные сети. Безопасность телекоммуникационных сетей способствует доверительным отношениям между заинтересованными сторонами. В статье представлен обзор задач, стоящих перед безопасными телекоммуникационными сетями, и предлагаются пути решения обозначенных задач.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>Not long ago, digital security was not seeing as everybody’s business, very unlike nowadays when everyone believe that it is imperative that computing and networking systems operate securely. And this is of utmost importance as many aspects of our business and private life rely on computing systems and telecommunication networks. Telecommunication networks security promotes trust among stakeholders. This paper presents an overview of challenges facing modern telecommunication networks security and suggest ways forward at facing those challenges.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>сетевая безопасность</kwd>
    <kwd>кибербезопасность</kwd>
    <kwd>электронная коммерция</kwd>
    <kwd>информированность и подготовка в области безопасности</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>network security</kwd>
    <kwd>cyber security</kwd>
    <kwd>e-commerce</kwd>
    <kwd>security awareness</kwd>
    <kwd>security training</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p>ОБЗОР ЗАДАЧ БЕЗОПАСНОСТИ СОВРЕМЕННЫХ ТЕЛЕКОММУНИКАЦИОННЫХ СЕТЕЙ</p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Kevin Fitchard. (in press). 2013: The year mobile data revenue will eclipse voice in the US. Retrieved from http://gigaom. com/2013/03/13/2013-the-year-mobile-datarevenue-will-eclipse-voice-in-the-us/.</mixed-citation>
     <mixed-citation xml:lang="en">Kevin Fitchard. (in press). 2013: The year mobile data revenue will eclipse voice in the US. Retrieved from http://gigaom. com/2013/03/13/2013-the-year-mobile-datarevenue-will-eclipse-voice-in-the-us/.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">E-marketer. (20103). B2C Ecommerce Climbs Worldwide, as Emerging Markets Drive Sales Higher. Retrieved from http://www. emarketer.com/Article/ B2C-EcommerceClimbs-Worldwide-Emerging-Markets-DriveSales-Higher/ 1010004.</mixed-citation>
     <mixed-citation xml:lang="en">E-marketer. (20103). B2C Ecommerce Climbs Worldwide, as Emerging Markets Drive Sales Higher. Retrieved from http://www. emarketer.com/Article/ B2C-EcommerceClimbs-Worldwide-Emerging-Markets-DriveSales-Higher/ 1010004.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Keneth C. Laudon and Jane P. Laudon. (2007). Managing the Digital Firm. International Journal of Computers, Communications &amp; Control Vol. II, No. 1, pp. 103-105.</mixed-citation>
     <mixed-citation xml:lang="en">Keneth C. Laudon and Jane P. Laudon. (2007). Managing the Digital Firm. International Journal of Computers, Communications &amp; Control Vol. II, No. 1, pp. 103-105.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">ITU. (2013). ICT Facts and Figures [PDF file]. Retrieved from ITU website:http://www.itu.int/en/ITU-D/Statistics/Documents/ facts/ICTFactsFigures2013. pdf.</mixed-citation>
     <mixed-citation xml:lang="en">ITU. (2013). ICT Facts and Figures [PDF file]. Retrieved from ITU website:http://www.itu.int/en/ITU-D/Statistics/Documents/ facts/ICTFactsFigures2013. pdf.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">ITU. (2013). Mobile-cellular telephone subscriptions [Excel file]. Retrieved from ITU website: http://www.itu.int/en/ITU-D/ Statistics/Documents /statistics /2013/Mobile_ cellular_2000-2012.xls.</mixed-citation>
     <mixed-citation xml:lang="en">ITU. (2013). Mobile-cellular telephone subscriptions [Excel file]. Retrieved from ITU website: http://www.itu.int/en/ITU-D/ Statistics/Documents /statistics /2013/Mobile_ cellular_2000-2012.xls.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">ITU. (2013). Percentage of Individuals using the Internet [Excel file]. Retrieved from ITU website: http://www.itu.int/en/ITU-D/Statistics/Documents /statistics/2013/Individuals_ Internet_2000-2012.xls.</mixed-citation>
     <mixed-citation xml:lang="en">ITU. (2013). Percentage of Individuals using the Internet [Excel file]. Retrieved from ITU website: http://www.itu.int/en/ITU-D/Statistics/Documents /statistics/2013/Individuals_ Internet_2000-2012.xls.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">yStats. (2013). Global B2C E-Commerce and Online Payment Report 2013 [Brochure]. Retrieved from http://www.ystats.com/en/reports/preview.php? reportId=1033&amp;start=0.</mixed-citation>
     <mixed-citation xml:lang="en">yStats. (2013). Global B2C E-Commerce and Online Payment Report 2013 [Brochure]. Retrieved from http://www.ystats.com/en/reports/preview.php? reportId=1033&amp;start=0.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">yStats. (2012). Africa Internet &amp; B2C E-Commerce Report 2012 [Brochure]. Retrieved from http://www.ystats.com/en/reports/ preview.php?reportId= 939&amp;start=0.</mixed-citation>
     <mixed-citation xml:lang="en">yStats. (2012). Africa Internet &amp; B2C E-Commerce Report 2012 [Brochure]. Retrieved from http://www.ystats.com/en/reports/ preview.php?reportId= 939&amp;start=0.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B9">
    <label>9.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Biztech Africa. (2013). Kenya Internet users surpass 16 million. Retrieved from http:// www.biztechafrica.com/article/kenya-internet-users-surpass-16-million /5806/.</mixed-citation>
     <mixed-citation xml:lang="en">Biztech Africa. (2013). Kenya Internet users surpass 16 million. Retrieved from http:// www.biztechafrica.com/article/kenya-internet-users-surpass-16-million /5806/.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B10">
    <label>10.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Dr KF Lai. (2013). Africa finding its own solutions using mobile tech. Retrieved from http://www.bizcommunity.com/Article/111/394/88287.html.</mixed-citation>
     <mixed-citation xml:lang="en">Dr KF Lai. (2013). Africa finding its own solutions using mobile tech. Retrieved from http://www.bizcommunity.com/Article/111/394/88287.html.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B11">
    <label>11.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">CCK Kenya. (2013). Kenya Declares War on Cybercriminals. Retrieved from http:// www.cck.go.ke/news/2013/War_on_cybercrime.html.</mixed-citation>
     <mixed-citation xml:lang="en">CCK Kenya. (2013). Kenya Declares War on Cybercriminals. Retrieved from http:// www.cck.go.ke/news/2013/War_on_cybercrime.html.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B12">
    <label>12.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">iResearch. (2013). 2012-2013 China Online Shopper Behavior Report. Retrieved from http://www.iresearchchina.com/reports/ 4830.html.</mixed-citation>
     <mixed-citation xml:lang="en">iResearch. (2013). 2012-2013 China Online Shopper Behavior Report. Retrieved from http://www.iresearchchina.com/reports/ 4830.html.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B13">
    <label>13.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Premium Times Nigeria. (2013). Gay Activist Hacks Nigerian Government’s Website Over Country’s Anti-Gay Law. Retrieved from http:// premium-timesng.com/news/140270gay-activist-hacks-nigerian-governmentswebsite-over-countrys-anti-gay-law.html.</mixed-citation>
     <mixed-citation xml:lang="en">Premium Times Nigeria. (2013). Gay Activist Hacks Nigerian Government’s Website Over Country’s Anti-Gay Law. Retrieved from http:// premium-timesng.com/news/140270gay-activist-hacks-nigerian-governmentswebsite-over-countrys-anti-gay-law.html.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B14">
    <label>14.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">The Telegraph UK. (2009). Thousands of NHS medical records lost. Retrieved from http://www.telegraph.co.uk/health/healthnews/5381605/Thousands-of-NHS-medicalrecords-lost.html.</mixed-citation>
     <mixed-citation xml:lang="en">The Telegraph UK. (2009). Thousands of NHS medical records lost. Retrieved from http://www.telegraph.co.uk/health/healthnews/5381605/Thousands-of-NHS-medicalrecords-lost.html.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B15">
    <label>15.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">PRWeb. (2013). Nuspire Networks Study Reveals Rise in IT Network Security Vulnerabilities at Remote Locations. Retrieved from http://www.prweb.com /releases/2013/ nuspire/prweb10873482.htm.</mixed-citation>
     <mixed-citation xml:lang="en">PRWeb. (2013). Nuspire Networks Study Reveals Rise in IT Network Security Vulnerabilities at Remote Locations. Retrieved from http://www.prweb.com /releases/2013/ nuspire/prweb10873482.htm.</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
