Committed to connecting the world

  •  
wtisd

ITU-T work programme

[2017-2020] : [SG17] : [Q4/17]

[Declared patent(s)]  - [Publication]

Work item: X.1217 (ex X.fgati)
Subject/title: Guidelines for applying threat intelligence in telecommunication network operation
Status: Approved on 2021-01-07 
Approval process: TAP
Type of work item: Recommendation
Version: -
Equivalent number: -
Timing: -
Liaison: -
Supporting members: -
Summary: Threat intelligence from a telecommunication operator's point of view is a collection of organized, analysed, and refined information about potential and current attacks that may threaten an organization. This information can also include attackers' motivations, intentions, characteristics, and methods, along with their modus operandi or techniques, tactics, and procedures. In network and information security area, the occurrence of large-scale and unexpected cybersecurity incidents has triggered the urgent need for threat intelligence. Threat intelligence can help an organization to reduce risk and improve its overall security. A unified taxonomy, grammar, and presentation of threat intelligence has been defined so that threat intelligence can be shared between different organizations. This Recommendation specifies guidelines for applying threat intelligence in telecommunication network operation after an overview analysis.
Comment: -
Reference(s):
[R 72 ]
  Historic references:
Contact(s):
Yexia Cheng, Editor
Jin Peng, Editor
Lanfang Ren, Editor
ITU-T A.5 justification(s):
Generate A.5 drat TD
[Submit new A.5 justification ]
See guidelines for creating & submitting ITU-T A.5 justifications
First registration in the WP: 2018-04-06 13:41:52
Last update: 2021-01-08 11:40:24