Page 170 - Big data - Concept and application for telecommunications
P. 170

4                                Big data - Concept and application for telecommunications



            –       long term, where it would take a relatively longer time to recover the system, for example, one
                    month.

            The security recovery function could be used for recovery of the mobile Internet service provider's assets
            such as system, software, hardware etc., when they are attacked by an attacker or malicious user.

            11.9    User reminder

            User reminder provides a mechanism to guarantee that the data collected from the mobile Internet service
            usage will be used in the big data analysis has been authorized by the mobile Internet services user.
            The key point is that for a certain mobile Internet service that needs to collect user data, the service is to
            send a reminder to the user, to display it, and to briefly explain it to the user.
            The user can be reminded whether data collection is planned and what data will be collected. They will also
            be informed how the data will be processed and handled.

            11.10  Relationship between security functions and security requirements

            The security functions listed and described in clause 9 are used to satisfy some of the security requirements.
            The mapping of security functions to security requirements is shown in Table 3.

            In Table 3, the symbol "√" in each cell indicates that the security requirement is related to a particular security
            function. More precisely, the marked security requirement should be supported by the implementation of
            the marked function.


                       Table 3 – Illustration of relationship between security requirements and security functions


                  Functions
                            Autho- Authen-  Digital   Encipher-  Event     Key     Security   Security   User

                            rization  tication  signature   ment   detection  exchange  audit trail  recovery  reminder
            Requirements
             Algorithm(s)                                          √
             check
             Authentication           √        √         √                  √
             Authorization     √      √
             Data                                                                                       √
             minimization
             Data retention                                                                             √
             limits
             Data source       √                                   √
             check
             Incident                                              √                           √
             response for
             malware
             Information       √      √        √         √                  √
             protection
             Resistance to                     √         √                  √
             fake data
             Secure audit                                                            √
             Secure data                       √         √                  √
             acquisition
             Secure data                                 √                  √
             storage
             User consent                                                                               √





            162      Security, privacy and data protection
   165   166   167   168   169   170   171   172   173   174   175