Page 139 - Big data - Concept and application for telecommunications
P. 139

Big data - Concept and application for telecommunications                       4


            3.2     Terms defined in this Recommendation

            This Recommendation defines the following term:
            3.2.1   security challenge: A security "difficulty" other than a direct security threat arising from the nature
            and operating environment of cloud services, including "indirect" threats. See clauses 7 and 8.


            4       Abbreviations and acronyms
            This Recommendation uses the following abbreviations and acronyms:

            API     Application Programming Interface
            BCP     Business Continuity Plan

            CaaS    Communications as a Service
            CPU     Central Processing Unit

            CSC     Cloud Service Customer
            CSN     Cloud Service Partner

            CSP     Cloud Service Provider
            CSU     Cloud Service User
            DNS     Domain Name System

            IaaS    Infrastructure as a Service
            IAM     Identity and Access Management

            ICT     Information and Communication Technology
            IP      Internet Protocol

            IT      Information Technology
            NaaS    Network as a Service

            OS      Operating System
            PaaS    Platform as a Service
            PII     Personally Identifiable Information

            PKI     Public Key Infrastructure
            SaaS    Software as a Service

            SIM     Subscriber Identity Module
            SLA     Service Level Agreement
            VM      Virtual Machine


            5       Conventions

            None.


            6       Overview

            Cloud computing is a paradigm for enabling convenient, on-demand network access to a shared pool of
            configurable  resources  (e.g.,  networks,  servers,  storage,  applications  and  services)  that  can  be  rapidly
            provisioned and released with minimal management effort or service provider interaction. Cloud computing
            customers can use these resources to develop, host and run services and applications on demand in a flexible
            manner in any device, anytime and anywhere in the cloud computing environment. Cloud computing services


                                                                   Security, privacy and data protection   131
   134   135   136   137   138   139   140   141   142   143   144