International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 4 | Views: 139 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Research Paper | Information Technology | India | Volume 6 Issue 1, January 2017 | Popularity: 5.1 / 10


     

Cybersecurity Strategies for Legacy Telecom Systems: Developing Tailored Cybersecurity Strategies to Secure aging Telecom Infrastructures against Modern Cyber Threats, Leveraging your Experience with Legacy Systems and Cybersecurity Practices

Jeevan Manda


Abstract: In today's digital age, telecommunications systems form the backbone of global connectivity, enabling everything from basic phone calls to complex internet communications. However, many telecom infrastructures, particularly legacy systems, are aging and not equipped to handle the sophisticated cyber threats that proliferate in our interconnected world. This abstract explores the urgent need for tailored cybersecurity strategies to secure these older telecom systems against modern cyber threats. Legacy telecom systems, often built decades ago, were designed without the foresight of today?s cyber threat landscape. These systems are increasingly vulnerable to cyberattacks due to outdated software, hardware limitations, and lack of built-in security features. As cybercriminals become more adept at exploiting these weaknesses, the risks to national security, economic stability, and personal privacy grow exponentially. Securing these aging infrastructures requires a multifaceted approach. Firstly, a thorough assessment of existing vulnerabilities within legacy systems is crucial. This involves identifying outdated protocols, unpatched software, and potential entry points for attackers. Following this, implementing robust security measures such as firewalls, intrusion detection systems, and encryption can significantly enhance the security posture of these systems. Moreover, adopting a zero-trust architecture, which assumes that threats can come from both inside and outside the network, adds an extra layer of defense. Regularly updating and patching software, although challenging in legacy systems, is essential to mitigate vulnerabilities. Additionally, employee training on cybersecurity best practices can prevent common threats like phishing and social engineering attacks. Collaboration between telecom companies, cybersecurity experts, and regulatory bodies is also vital to develop standardized security protocols and share threat intelligence.


Keywords: Legacy telecom systems, cybersecurity, aging infrastructure, cyber threats, tailored strategies, network security


Edition: Volume 6 Issue 1, January 2017


Pages: 2487 - 2494


DOI: https://www.doi.org/10.21275/SR24907112157



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Jeevan Manda, "Cybersecurity Strategies for Legacy Telecom Systems: Developing Tailored Cybersecurity Strategies to Secure aging Telecom Infrastructures against Modern Cyber Threats, Leveraging your Experience with Legacy Systems and Cybersecurity Practices", International Journal of Science and Research (IJSR), Volume 6 Issue 1, January 2017, pp. 2487-2494, URL: https://www.ijsr.net/getabstract.php?paperid=SR24907112157, DOI: https://www.doi.org/10.21275/SR24907112157



Downloads: 357 | Views: 1000 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir


Downloads: 301 | Views: 558 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Information Technology, India, Volume 8 Issue 1, January 2019

Pages: 456 - 460

Analysis of Blockchain and its Working Principle

S. Banupriya, G. Renuka Devi


Downloads: 266 | Views: 407 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Information Technology, China, Volume 9 Issue 1, January 2020

Pages: 107 - 112

Network Optimization using Multi-Agent Genetic Algorithm

Sikandar Hanif


Downloads: 260 | Views: 471 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Information Technology, Malaysia, Volume 8 Issue 1, January 2019

Pages: 64 - 70

University of the Future (UotF): Redesign Business Model for Local University in Malaysia through Humanising Education and 4IR

Nor Zaiasron Bin Yahaya, Abdul Rahman Bin Ahmad Dahlan


Downloads: 254 | Views: 418 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Information Technology, India, Volume 9 Issue 1, January 2020

Pages: 477 - 479

IoT Based Smart Street Light for Energy Efficiency and Safety

Tanmay Patil, Arjun Ramendra


Top