{"id":399529,"date":"2024-10-20T04:43:28","date_gmt":"2024-10-20T04:43:28","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-2813-2020\/"},"modified":"2024-10-26T08:31:45","modified_gmt":"2024-10-26T08:31:45","slug":"ieee-2813-2020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-2813-2020\/","title":{"rendered":"IEEE 2813-2020"},"content":{"rendered":"
New IEEE Standard – Active. This standard can be applied to internet-based business scenarios, and can also be served serve as a practical guide to achieve help assess business security risk control through the big data technology. This standard can be applied in other types of organization, including public or privately-owned or state-owned enterprises, associations, or organizations, or by individuals, to improve assessment of their protection capability against business security risks based on big data technology.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 2813\u2122-2020 Front cover <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 1.\u2002Overview 1.1\u2002Scope 1.2\u2002Word usage <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 2.\u2002Normative references 3.\u2002Definitions, acronyms, and abbreviations 3.1\u2002Definitions 3.2\u2002Acronyms and abbreviations <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4.\u2002Big data business security risk assessment framework 4.1\u2002General 4.2\u2002Portrait level 4.3\u2002Algorithm level <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4.4\u2002Risk types <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.\u2002Big data business security risk assessment technology 5.1\u2002Portrait level <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.2\u2002Algorithm level <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.\u2002Data protection 6.1\u2002Overview <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 6.2\u2002Data collection 6.3\u2002Data storage 6.4\u2002Data transmission 6.5\u2002Data processing <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 6.6\u2002Data transfer 6.7\u2002Data deletion 6.8\u2002Personal data security <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Back cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Big Data Business Security Risk Assessment<\/b><\/p>\n |