Page 139 - Big data - Concept and application for telecommunications
P. 139
Big data - Concept and application for telecommunications 4
3.2 Terms defined in this Recommendation
This Recommendation defines the following term:
3.2.1 security challenge: A security "difficulty" other than a direct security threat arising from the nature
and operating environment of cloud services, including "indirect" threats. See clauses 7 and 8.
4 Abbreviations and acronyms
This Recommendation uses the following abbreviations and acronyms:
API Application Programming Interface
BCP Business Continuity Plan
CaaS Communications as a Service
CPU Central Processing Unit
CSC Cloud Service Customer
CSN Cloud Service Partner
CSP Cloud Service Provider
CSU Cloud Service User
DNS Domain Name System
IaaS Infrastructure as a Service
IAM Identity and Access Management
ICT Information and Communication Technology
IP Internet Protocol
IT Information Technology
NaaS Network as a Service
OS Operating System
PaaS Platform as a Service
PII Personally Identifiable Information
PKI Public Key Infrastructure
SaaS Software as a Service
SIM Subscriber Identity Module
SLA Service Level Agreement
VM Virtual Machine
5 Conventions
None.
6 Overview
Cloud computing is a paradigm for enabling convenient, on-demand network access to a shared pool of
configurable resources (e.g., networks, servers, storage, applications and services) that can be rapidly
provisioned and released with minimal management effort or service provider interaction. Cloud computing
customers can use these resources to develop, host and run services and applications on demand in a flexible
manner in any device, anytime and anywhere in the cloud computing environment. Cloud computing services
Security, privacy and data protection 131