Work item:
|
TR.gscim-dlt
|
Subject/title:
|
Technical Report: Guidelines for security consideration for incident management by DLT service provider
|
Status:
|
Under study [Issued from previous study period]
|
Approval process:
|
Agreement
|
Type of work item:
|
Technical report
|
Version:
|
New
|
Equivalent number:
|
-
|
Timing:
|
2026-06 (No priority specified)
|
Liaison:
|
-
|
Supporting members:
|
China Unicom, China Telecom, Alibaba
|
Summary:
|
Typical DLT-based services include online voting, digital payment service, digital integrity proofing service, etc. Distributed Ledger Technology (DLT) has immense potential to transform finance, supply chain, healthcare, etc. Blockchain and DLT systems operate on a decentralized network of computers, known as nodes, which collectively validate and store transactions. This decentralized nature eliminates the need for a central authority, reducing the risk of a single point of failure or manipulation. In this network structure, resources are owned and shared by network members; difficult to maintain since no one owns it. This decentralization in network structure puts new challenges in information security incident management to DLT service provider, e.g., network monitoring, emergency response, information security incident classification, etc. Thus, it necessitates an analysis of security considerations for DLT service provider, especially in its incident management.
|
Comment:
|
-
|
Reference(s):
|
|
|
Historic references:
|
Contact(s):
|
|
ITU-T A.5 justification(s): |
|
|
|
First registration in the WP:
2024-03-12 15:07:18
|
Last update:
2024-06-06 18:16:46
|