In tern e t U se rs in M illion s Ac co rd in g to C o u n tries 166.32 166 47.08 33 28.64 26.5 22.23Abstract -Security and cyber-terrorism have become increasingly important issues for organizations and the society. We propose a risk management framework from a bottom-up perspective, i.e. modeling the different types of attacks (or risk types) that an organization could experience. A quantitative model is presented to measure the economic impact of security risk. In addition to risk management, a further goal of this research is to apply data mining techniques to predict and prevent security attacks in an effective manner.
report on the current status of key management technologies, which motivates the Lucent's activities described in this issue. Finally, we summarize the papers in this issue, which we hope will smooth the way for more advancement in upcoming technologies.
Service and Networking TrendsToday, most service providers still run two parallel networks-one for voice and one for data services. Applications are converging on top of these networks. Intelligent services in the voice network create additional value for service providers. As in the voice network, higher-layer services in the data network influence the lower layers of the network infrastructure.The converged network of the future will be more feature rich than today's network, and it will be driven by the customers' business needs. The so-called "optical communication networks for the next-generation Internet" will provide a client/server relationship among enterprise clients and various applications residing on servers in a number of data centers through a high-capacity heterogeneous network. The network will provide essential applications and services to the clients it supports.This logical separation of the network and services will enable the applications to operate more effectively. It will free them from the constraints of physical topology and allow them to focus on the challenge of meeting service requirements, such as dynamic allocation of resources, easy addition of new
This paper presents an overview of the service and network management architecture of Lucent Technologies'
CyberCarrier Solution. Businesses of all sizes and from all sectors are choosing to outsource large portions of
their information technology (IT) operations to Internet‐based data centers that host application
service providers (ASPs). Many network service providers (NSPs) have decided to become
CyberCarrier service providers (CCSPs)—that is, they have decided to expand their businesses to
include ASP data center hosting services. Managing these new ASP data center hosting services is one of the most
urgent challenges encountered by a CCSP, and its solution is arguably critical to a CCSP's long‐term
success. Although introducing ASP data center hosting services increases and diversifies a CCSP's revenue, it
also significantly complicates the CCSP's management processes. This paper defines an abstract management
functional architecture that divides the CCSP management problem into tractable pieces and addresses each of them.
Then it explains how the CyberCarrier Solution maps onto that functional architecture. Finally, it explores how
Lucent will evolve its CyberCarrier Solution through future management system innovations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.