Durch welche organisatorischen, prozessualen und technischen Sicherheitsmaßnahmen kann das angestrebte Schutzniveau sichergestellt werden ?
In diesem Fall betrachten wir alle Einflussfaktoren einer sicheren Cloud:Vom Datenschutz über Compliance Aspekte, wie beispielsweise „key escrow“, also die Offenlegung von Verschlüsselungsverfahren oder „lawful interception“, der Telekommunikationsüberwachung bis hin zu Source Code Analysen bei Individualanwendungen in der Cloud.
www.tuv.comCompanies need to ask themselves what organizational, process-based, and technical security precautions are needed to attain the desired level of protection.
In this case, we take account of all factors that make up a safe cloud: from data security and compliance - for example "key escrows," disclosure issues, encryption procedures or "lawful interception" – through to telecommunications monitoring and the analysis of source codes for individual cloud applications.
www.tuv.comYou can suggest improvements to this PONS entry here:
How can I copy translations to the vocabulary trainer?
Please note that the vocabulary items in this list are only available in this browser. Once you have copied them to the vocabulary trainer, they are available from everywhere.