Security Finder Glossar

 

  • IaaS
  • IAEA
  • IAM-Services
  • ICAAP
  • Identification
  • Identified Internet Mail
  • Identifier
  • Identität
  • Identity
  • Identity Administration
  • Identity Federation
  • Identity Management
  • Identity Management System
  • Identity Provider
  • Identity Repository
  • Identity Theft
  • Identity-Based Security Policy
  • IDS
  • IFRS
  • IHH
  • IIS
  • IKS
  • IKT
  • Image
  • Incident
  • Incident Command System (ICS)
  • Incident-Handling
  • Information Rights Management
  • Information Security
  • Informationssicherheitsbeauftragter (ISB)
  • Informationssicherheitsmanagement (ISM)
  • Informationstechnik
  • Informationstechnisches System
  • Informationsverbund
  • Infrared Data Association
  • Initialization Vector – (IV)
  • Integrität
  • Integrity
  • Internet der Dinge
  • Internet Exchange Point
  • Internet-Verfügbarkeits-System (IVS)
  • Intrusion
  • Intrusion Detection System
  • Intrusion Prevention System
  • Investitionsrechnung
  • Investment Grade
  • InvMaRisk
  • IPS
  • Irrtumsrisiko
  • ISI
  • ISMS
  • ISO
  • ISO 24760
  • ISO 31000
  • ISO/IEC 27018:2014
  • IT-Grundschutz-Check
  • IT-Sicherheit
  • IWWN
  • ISO/IEC 27018:2014

    ISO/IEC 27018:2014 establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in accordance with the privacy principles in ISO/IEC 29100 for the public cloud computing environment. In particular, ISO/IEC 27018:2014 specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for the protection of PII which might be applicable within the context of the information security risk environment(s) of a provider of public cloud services. ISO/IEC 27018:2014 is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which provide information processing services as PII processors via cloud computing under contract to other organizations. The guidelines in ISO/IEC 27018:2014 might also be relevant to organizations acting as PII controllers; however, PII controllers can be subject to additional PII protection legislation, regulations and obligations, not applying to PII processors. ISO/IEC 27018:2014 is not intended to cover such additional obligations.

    ANBIETER/PARTNER
    Experten- und Marktplattformen
    Cloud Computing

    Technologie-Basis zur Digitalisierung

    mehr
    Sicherheit und Datenschutz

    Vertrauen zur Digitalisierung

    mehr
    Anwendungen

    wichtige Schritte zur Digitalisierung

    mehr
    Digitale Transformation

    Partner zur Digitalisierung

    mehr
    Energie

    Grundlage zur Digitalisierung

    mehr
    Experten- und Marktplattformen
    • company
      Cloud Computing –

      Technologie-Basis zur Digitalisierung

      mehr
    • company
      Sicherheit und Datenschutz –

      Vertrauen zur Digitalisierung

      mehr
    • company
      Anwendungen –

      wichtige Schritte zur Digitalisierung

      mehr
    • company
      Digitale Transformation

      Partner zur Digitalisierung

      mehr
    • company
      Energie

      Grundlage zur Digitalisierung

      mehr
    Values Blogs