{"title":"电信行业数据管理的挑战和解决方案","authors":"","doi":"10.30534/ijeter/2023/031132023","DOIUrl":null,"url":null,"abstract":"This paper addresses data management threats, challenges, and measures for mitigation of such data threats in the telecommunication industry. The telecommunications industry handles tonnes of essential, personal and sensitive data on staff, clients and customers. This data is critical in developing product lines and marketing strategies for telecom companies, opening them up to opportunities that otherwise would have been beyond their reach. As a result, telecom companies’ databases are rendered vulnerable to violation and unauthorised access from insiders, third-party entities, as well as hackers. They have become premium target for cyberattacks, malware, interference, data theft and loss of vital data. While systems for the management of data in the telecom industry are crucial in gathering, storing, and analysing data, it is equally important for such systems to be efficient enough to provide a safe and secure mode of accessing, analysing and storing data assets. This is to prevent illegitimate use of sensitive data, cyberattacks, malware and data infringements on telecom data assets.","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data Management Challenges and Resolutions in the Telecommunication Industry\",\"authors\":\"\",\"doi\":\"10.30534/ijeter/2023/031132023\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper addresses data management threats, challenges, and measures for mitigation of such data threats in the telecommunication industry. The telecommunications industry handles tonnes of essential, personal and sensitive data on staff, clients and customers. This data is critical in developing product lines and marketing strategies for telecom companies, opening them up to opportunities that otherwise would have been beyond their reach. As a result, telecom companies’ databases are rendered vulnerable to violation and unauthorised access from insiders, third-party entities, as well as hackers. They have become premium target for cyberattacks, malware, interference, data theft and loss of vital data. While systems for the management of data in the telecom industry are crucial in gathering, storing, and analysing data, it is equally important for such systems to be efficient enough to provide a safe and secure mode of accessing, analysing and storing data assets. This is to prevent illegitimate use of sensitive data, cyberattacks, malware and data infringements on telecom data assets.\",\"PeriodicalId\":13964,\"journal\":{\"name\":\"International Journal of Emerging Trends in Engineering Research\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Emerging Trends in Engineering Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.30534/ijeter/2023/031132023\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Emerging Trends in Engineering Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30534/ijeter/2023/031132023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Engineering","Score":null,"Total":0}
Data Management Challenges and Resolutions in the Telecommunication Industry
This paper addresses data management threats, challenges, and measures for mitigation of such data threats in the telecommunication industry. The telecommunications industry handles tonnes of essential, personal and sensitive data on staff, clients and customers. This data is critical in developing product lines and marketing strategies for telecom companies, opening them up to opportunities that otherwise would have been beyond their reach. As a result, telecom companies’ databases are rendered vulnerable to violation and unauthorised access from insiders, third-party entities, as well as hackers. They have become premium target for cyberattacks, malware, interference, data theft and loss of vital data. While systems for the management of data in the telecom industry are crucial in gathering, storing, and analysing data, it is equally important for such systems to be efficient enough to provide a safe and secure mode of accessing, analysing and storing data assets. This is to prevent illegitimate use of sensitive data, cyberattacks, malware and data infringements on telecom data assets.