Page 169 - Big data - Concept and application for telecommunications
P. 169

Big data - Concept and application for telecommunications                       4


            a)      local reporting of the event;

            b)      remote reporting of the event;
            c)      logging of the event; and
            d)      recovery action.
            Examples of such security-relevant events are:

            a)      a specific security violation;
            b)      a specific selected event; and
            c)      an overflow on a count of the number of occurrences.

            Standardization in this field will take into consideration the transmission of relevant information for event
            reporting and event logging and the syntactic and semantic definition to be used for the transmission of
            event reporting and event logging.
            The event detection function could help to detect the security violations of the big data analysis and usage
            among the data pre-processing entity, data collection entity, the data analysis entity and the data application
            entity.

            11.6    Key exchange

            The key exchange function allows for key sharing in encipherment implementations, especially that of the
            symmetric encipherment algorithm.

            11.7    Security audit trail

            Security  audit  trails  provide  a  valuable  security  mechanism  as  potentially  they  permit  detection  and
            investigation  of  breaches  of  security  by  permitting  a  subsequent  security  audit.  A  security  audit  is  an
            independent review and examination of system records and activities in order to test for adequacy of system
            controls,  to  ensure  compliance  with  established  policy  and  operational  procedures,  to  aid  in  damage
            assessment and to recommend any indicated changes in controls, policy and procedures. A security audit
            requires the recording of security-relevant information in a security audit trail and the analysis and reporting
            of information from the security audit trail. As logging or recording is considered to be a security mechanism
            it  is  described  in  this  clause.  The  analysis  and  report  generation  is  considered  a  security  management
            function.
            Collection of security audit trail information may be adapted to various requirements by specifying the kind
            of security-relevant events to be recorded (e.g., apparent security violations or completion of successful
            operations).
            The known existence of a security audit trail may serve as a deterrent to some potential sources of security
            attacks.
            OSI security audit trail considerations consider what information shall optionally be logged, under what
            conditions that information shall be logged and the syntactic and semantic definition to be used for the
            interchange of the security audit trail information.
            This  function  could  be  used  to  audit  the  behaviour  of  the  entities  when  analysing  and  using  big  data
            set/analysis results in mobile Internet services.

            11.8    Security recovery

            Security recovery deals with requests from mechanisms such as event handling and management functions
            and takes recovery actions as the result of applying a set of rules. These recovery actions may be of three
            kinds:
            –       immediate, where the system should be recovered as soon as possible, commonly within one day;
            –       temporary, where the system needs to be recovered within a few days, such as a week;



                                                                   Security, privacy and data protection   161
   164   165   166   167   168   169   170   171   172   173   174