O'Reilly logo

FTTx Networks by Weyl Wang, Kevin Bourg, Brian Lane, James Farmer

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 17

Identifying Network Threats and Security Vulnerabilities

Abstract

This chapter provides a high-level view of challenges an operator must be aware of in the deployment of an access network. Guidelines are provided to various agencies and sources of information which maintain real-time updates on security threats. Topics such as denial of service attacks and management protection are highlighted.

Keywords

Denial of service; DoS; Firewall; Management; Network security

Introduction

As an operator begins deploying services to subscribers there are a large number of factors which may cause a lack of sleep. An operator is typically faced with issues such as IPTV pixilation or voice quality issues or maybe even the random Internet point-of-presence ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required