Unlawful access: This typically occurs when a hacker or malicious software gains access to your data by exploiting a vulnerability in an IT system. With the increased level of data protection, an increased effort for managing and operating the system is also implied. This judgement incorporates an organisation’s data governance on one side, and regulatory and legal requirements on the other side. We suggest that organisations categorise data into classes, and choose the Cloud Encryption Key Management Strategy for a given data-class, based on the degree of protection this class deserves. Swiss companies should choose their Cloud Encryption Key Management Strategy wisely. A strategy for data protection should consider two types of data access: unlawful and lawful. While data protection is a broad topic involving a complex variety of stakeholders, processes and technologies, this article focuses on data encryption methods.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |