Recommendation ITU-T X.1752 (01/2022) Security guidelines for big data infrastructure and platform
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Security threats and challenges to big data infrastructure and platform
     6.1 Security threats and challenges to big data infrastructure
          6.1.1 Security threats and challenges to data collection
          6.1.2 Security threats and challenges to data storage
          6.1.3 Security threats and challenges to data integration
          6.1.4 Security threats and challenges to data pre-processing
          6.1.5 Security threats and challenges to data management
     6.2 Security threats and challenges to big data platform
          6.2.1 Security threats and challenges to data analysing
          6.2.2 Security threats and challenges to data visualising
7 Security guidelines for big data infrastructure and platform
     7.1 Security guidelines for data source layer
          7.1.1 Security guidelines for underlying infrastructure
          7.1.2 Security guidelines for data storage
     7.2 Security guidelines for processing layer
          7.2.1 Security guidelines for data aggregation
          7.2.2 Security guidelines for data analysing
     7.3 Security guidelines for application layer
          7.3.1 Security guidelines for application system
          7.3.2 Security guidelines for application audit
     7.4 Security guidelines for access layer
          7.4.1 Security guidelines for authentication mechanism
          7.4.2 Security guidelines for API
     7.5 Security guidelines for security management
Bibliography
<\pre>