User guide
Security
92
1/1551-HSC 901 35/3 Uen C 2005-12-02
Encryption of subscriber traffic is generally considered outside the EDA
scope.
9.6 Other Security Measures
General security measures should also be implemented in order to secure
the network.
9.6.1 Management Security Policies
Another type of attacker is trusted personnel misusing their authority.
In this case nearly any threat is possible, because these people often have
knowledge about security systems. However, one measure is to provide
staff with strictly personal passwords to be used when logging into EDA
equipment. This is supported by the EDA management system.
9.6.2 Network Monitoring and Intrusion Detection
An important tool in network security is the ability of monitoring and logging
the activity on the network and within the entities. In this case, attacks can
potentially be detected, or it is possible to backtrack an attack scenario to
find the source of the attack, in order to prosecute attackers and take
measures to prevent future successful attacks.