Rec. ITU-T X.1751 (09/2020) Security guidelines for big data lifecycle management by telecommunication operators
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
7 Characteristics of telecommunication big data services and data categories
     7.1 Characteristics of telecommunication big data services
     7.2 Data categories
8 Lifecycle of data in telecommunication big data services
9 Security vulnerabilities in data lifecycle of telecommunication big data services
     9.1 Data collection stage
          9.1.1 Security vulnerability of device and system
          9.1.2 Security vulnerability of configuration and management
     9.2 Data transmission stage
          9.2.1 Security vulnerability of configuration and management
     9.3 Data storage stage
          9.3.1 Security vulnerability of device and system
          9.3.2 Security vulnerability of configuration and management
     9.4 Data usage stage
          9.4.1 Security vulnerability of device and system
          9.4.2 Security vulnerability of configuration and management
     9.5 Data sharing stage
          9.5.1 Security vulnerability of device and system
          9.5.2 Security vulnerability of configuration and management
     9.6 Data destruction stage
     9.7 Relationship of security vulnerability to data lifecycle
10 Security guidelines for data lifecycle of telecommunication big data services
     10.1 Data collection stage
          10.1.1 Security guidelines for device and system
          10.1.2 Security guidelines for configuration and management
     10.2 Data transmission stage
          10.2.1 Security guidelines for configuration and management
     10.3 Data storage stage
          10.3.1 Security guidelines for device and system
          10.3.2 Security guidelines for configuration and management
     10.4 Data usage stage
          10.4.1 Security guidelines for device and system
          10.4.2 Security guidelines for configuration and management
     10.5 Data sharing stage
          10.5.1 Security guidelines for device and system
          10.5.2 Security guidelines for configuration and management
     10.6 Data destruction stage
          10.6.1 Security guidelines for data management
Bibliography