|Description||Service Providers, Network Operators and Public Safety should deploy tools to detect unexpected changes to file systems on Network Elements and Management Infrastructure systems where feasible and establish procedures for reacting to changes. Use techniques such as cryptographic hashes.|
|Industry Role(s)||Service Provider; Network Operator|
|Keyword(s)||Cyber Security;Intrusion Detection;Network Design;Network Elements;Network Operations;|
ITU-T Rec. X.1051.