[go: up one dir, main page]

Naranjo Rico, 2018 - Google Patents

Holistic business approach for the protection of sensitive data: study of legal requirements and regulatory compliance at international level to define and implement …

Naranjo Rico, 2018

View PDF
Document ID
377439662285333616
Author
Naranjo Rico J
Publication year

External Links

Snippet

The purpose of this work is to show the challenge of data protection faced by companies today to meet the relevant requirements of existing regulations, and, on the other hand, to identify the use of encryption as a solution to comply with these requirements. For this, a …
Continue reading at openaccess.uoc.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Jansen et al. Guidelines on security and privacy in public cloud computing
US10567359B2 (en) Cluster of secure execution platforms
Dotson Practical cloud security
Khansa et al. Assessing innovations in cloud security
Sargiotis Data security and privacy: Protecting sensitive information
Jansen et al. Sp 800-144. guidelines on security and privacy in public cloud computing
Gurkok Securing cloud computing systems
Schou et al. Information Assurance Handbook
Paul Official (ISC) 2 Guide to the CSSLP
Rasner Cybersecurity and third-party risk: Third party threat hunting
Hausman et al. Cloud Essentials: CompTIA Authorized Courseware for Exam CLO-001
Tiwari et al. India’s “Aadhaar” Biometric ID: Structure, Security, and Vulnerabilities
Naranjo Rico Holistic business approach for the protection of sensitive data: study of legal requirements and regulatory compliance at international level to define and implement data protection measures using encryption techniques
Parker Healthcare regulations, threats, and their impact on cybersecurity
De Oliveira et al. Monitoring personal data transfers in the cloud
Sudarsan et al. Security and privacy of big data
Shaul et al. Practical Oracle Security: Your Unauthorized Guide to Relational Database Security
Coombs Cloud Security for Dummies
Bitar et al. Gdpr: Securing personal data in compliance with new eu-regulations
Wang Data Security and Privacy Protection: A Comprehensive Guide
Gilbert et al. Secure data management in cloud environments
Divadari et al. Managing data protection and privacy on cloud
Sharma et al. OVERVIEW OF DATA SECURITY, CLASSIFICATION AND CONTROL MEASURE: A STUDY.
Basson The right to privacy: how the proposed POPI Bill will impact data security in a Cloud Computing environment
Fife et al. The Official (Isc) 2 Ccsp Cbk Reference