Page 157 - Big data - Concept and application for telecommunications
P. 157

Big data - Concept and application for telecommunications                       4


                                                    Table of Contents


            1      Scope
            2      References

            3      Definitions
                   3.1   Terms defined elsewhere
                   3.2   Terms defined in this Recommendation

            4      Abbreviations and acronyms
            5      Conventions
            6      Overview of big data analysis in mobile Internet services

            7      Threats in mobile Internet big data analysis services
                   7.1   Analysis result overuse
                   7.2   Data analysis without user's consent

                   7.3   Data disclosure
                   7.4   Data forgery
                   7.5   Disclosure information
                   7.6   Disclosure of inferred information
                   7.7   Disclosure of user behaviour information
                   7.8   Inaccurate or mistaken analysis

                   7.9   Location information overuse
                   7.10 Over analysis
                   7.11 Trojan and viruses
                   7.12 Unauthorized access
                   7.13 Unauthorized analysis

                   7.14 Unauthorized analytical application
            8      Relationship of security threats to entities
            9      Security requirements
                   9.1   Analysis algorithm(s) check

                   9.2   Authentication
                   9.3   Authorization
                   9.4   Data minimization
                   9.5   Data retention limits
                   9.6   Data source check

                   9.7   Incident response for malware
                   9.8   Information protection
                   9.9   Resistance to fake data
                   9.10 Secure data acquisition
                   9.11 Secure audit
                   9.12 Secure data storage

                   9.13 User consent



                                                                   Security, privacy and data protection   149
   152   153   154   155   156   157   158   159   160   161   162