Security guidelines for big data lifecycle management by telecommunication operators |
|
Recommendation ITU-T X.1751 analyses security vulnerabilities and establishes security guidelines for big data lifecycle management by telecommunication operators.
With rapid development of big data technology, the value of data has substantially increased. Big data bring new opportunities to telecommunication services. Previously, data were siloed and managed independently in different telecommunication service systems. Data aggregation and fusion trends are inevitable with the construction of big data services. In the process of data fusion convergence, data flow on platforms and in-service processes. Data face various security vulnerabilities at different stages of their lifecycle.
Recommendation ITU-T X.1751 introduces specific characteristics of telecommunication big data services and data categories, analyses security vulnerabilities of big data lifecycle management and specifies security guidelines for telecommunication operators.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/14267 |
Series title: |
X series: Data networks, open system communications and security X.1750-X.1799: Data security X.1750-X.1759: Big Data Security |
Approval date: |
2020-09-03 |
Provisional name: | X.sgtBD |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1751 (09/2020)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
Security considerations for quantum key distribution networks
|
2020
|
here
|
|