Page 175 - Big data - Concept and application for telecommunications
P. 175

Big data - Concept and application for telecommunications                       4


                                                    Table of Contents


            1      Scope

            2      References
            3      Definitions
                   3.1   Terms defined elsewhere
                   3.2   Terms defined in this Recommendation

            4      Abbreviations and acronyms
            5      Conventions

            6      Overview
                   6.1   Specification of the data in this Recommendation
                   6.2   Data security threats for cloud service customers
                   6.3   Existing requirements related to about data security
                   6.4   Data security lifecycle

            7      Guidelines for security controls related to data security
                   7.1   Security controls in create stage
                   7.2   Security controls in transmit stage
                   7.3   Security controls in storage stage

                   7.4   Security controls in use stage
                   7.5   Security controls in migrate stage
                   7.6   Security controls in destroy stage
                   7.7   Security controls in backup and restore stage

            Appendix I – Guidelines for using security controls
            Bibliography




































                                                                   Security, privacy and data protection   167
   170   171   172   173   174   175   176   177   178   179   180