Naranjo Rico, 2018 - Google Patents
Holistic business approach for the protection of sensitive data: study of legal requirements and regulatory compliance at international level to define and implement …Naranjo Rico, 2018
View PDF- Document ID
- 377439662285333616
- Author
- Naranjo Rico J
- Publication year
External Links
Snippet
The purpose of this work is to show the challenge of data protection faced by companies today to meet the relevant requirements of existing regulations, and, on the other hand, to identify the use of encryption as a solution to comply with these requirements. For this, a …
- 238000000034 method 0 title abstract description 106
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jansen et al. | Guidelines on security and privacy in public cloud computing | |
US10567359B2 (en) | Cluster of secure execution platforms | |
Dotson | Practical cloud security | |
Khansa et al. | Assessing innovations in cloud security | |
Sargiotis | Data security and privacy: Protecting sensitive information | |
Jansen et al. | Sp 800-144. guidelines on security and privacy in public cloud computing | |
Gurkok | Securing cloud computing systems | |
Schou et al. | Information Assurance Handbook | |
Paul | Official (ISC) 2 Guide to the CSSLP | |
Rasner | Cybersecurity and third-party risk: Third party threat hunting | |
Hausman et al. | Cloud Essentials: CompTIA Authorized Courseware for Exam CLO-001 | |
Tiwari et al. | India’s “Aadhaar” Biometric ID: Structure, Security, and Vulnerabilities | |
Naranjo Rico | Holistic business approach for the protection of sensitive data: study of legal requirements and regulatory compliance at international level to define and implement data protection measures using encryption techniques | |
Parker | Healthcare regulations, threats, and their impact on cybersecurity | |
De Oliveira et al. | Monitoring personal data transfers in the cloud | |
Sudarsan et al. | Security and privacy of big data | |
Shaul et al. | Practical Oracle Security: Your Unauthorized Guide to Relational Database Security | |
Coombs | Cloud Security for Dummies | |
Bitar et al. | Gdpr: Securing personal data in compliance with new eu-regulations | |
Wang | Data Security and Privacy Protection: A Comprehensive Guide | |
Gilbert et al. | Secure data management in cloud environments | |
Divadari et al. | Managing data protection and privacy on cloud | |
Sharma et al. | OVERVIEW OF DATA SECURITY, CLASSIFICATION AND CONTROL MEASURE: A STUDY. | |
Basson | The right to privacy: how the proposed POPI Bill will impact data security in a Cloud Computing environment | |
Fife et al. | The Official (Isc) 2 Ccsp Cbk Reference |