Today 397

Yesterday 3585

All 39712092

Saturday, 14.12.2024
Transforming Government since 2001

Datensicherheit

  • Data storage still haunts India

    It has been two decades since the field of information and communications technology started biting large chunks off the Indian economy. But the country is still deficient in storing and hosting all the information that it processes. Be it for hosting websites or enterprise information, the data centre capacity in India is far lower than that assimilated and processed.

    A data centre is, usually, a cool room housing servers that stores and transmits information on websites and internal enterprise applications. These data centres can be captive, held by enterprises, or independent data centres (IDCs). Often captives become IDCs catering to other enterprises as well. Some IDCs lease their space to host service providers, who manage websites for a third party.

  • Datensicherheit hat bei Gesundheitskarte oberste Priorität

    Bei der von 2006 an geplanten elektronischen Gesundheitskarte hat die Sicherheit der Patientendaten nach den Worten von Bundesgesundheitsministerin Ulla Schmidt (SPD) oberste Priorität. Schmidt sagte am Montag auf der Computermesse CeBIT in Hannover bei der Vorstellung des "Bauplans" für die Karte, sensible Daten sollten nur mit Zustimmung der Patienten weitergegeben werden dürfen.
  • Datensicherheit: Nationales IT-Frühwarnsystem gestartet

    Computer Emergency Response Teams (CERT) sollen in Deutschland künftig als Internet-Feuerwehr dienen. Auch Kommunen sollen Computernotfallteams aufbauen.
  • Delayed EU Data Protection proposals still playing catch up three years later

    A lot has changed in the world of information management since the yet-to-be-deployed EU data rules were initially announced

    In 2012, new EU rules were announced designed to make businesses more responsible for the management of an individual’s personal data, with stricter requirements for protection and penalties around data breaches, thereby offering individuals greater control. The rules were also designed to commit EU member states to a set of consistent, legally-enforced regulations and rigid definitions, which companies outside the EU would also have to abide by.

  • Disaster Recovery: Rettung von Festplatten bei Wasserschäden

    Zu den "Opfern" der großen Flutkatastrophe in Deutschland zählen auch viele Rechnersysteme und Festplatten. Wichtige Empfehlungen, wie die Daten gerettet werden können, gibt jetzt das Bundesamt für Sicherheit in der Informationstechnik (BSI).
  • Dümmste Sicherheitsmaßnahmen gekürt

    Privacy International stellt Gewinner des "Stupid Security"-Wettbewerbs vor | Australische Regierung gewinnt mit Hotline, über die Bürger "Verdächtiges" melden sollen | Heathrow konfiszierte "Gunpowder"-Tee
  • E-Government Security Disasters 'A Certainty'

    E-government-related computer security disasters are certain to happen at some point in the next few years, as the government moves to rapidly implement new services without ensuring adequate time is spend assessing the security implications, a leading expert has told E-Government Bulletin.
  • E-Government: Are You Safe?

    The ‘War on Terror’ may be scaring away internet users from government websites. Most citizens around the world perceive their country’s online hubs as unsafe.
  • EC report warns governments on e-trust

    An EC-funded report has found that governments across Europe need to address the issue of trust in technology systems used by public authorities and warns that high-tech ID cards are not a panacea.

    ECOTEC Research and Consulting, in association with the Tavistock Institute, carried out the research on behalf of the Commission's eGovernment unit.

  • EE: Data protection: Legal backing, people’s trust hold the key

    Constitutional support for data safety is the foundation stone for a strong e-governance ecosystem in Estonia.

    For Estonia, a European country with a population nearly 1,000 times less than India, the pursuit to establish a national digital identity programme was not any easier. When the nation rolled out its identity programme 15 years ago, similar to India’s Aadhaar project, political debates around the cost of the project and its mandatory nature had erupted. The government believed that the first step to have a strong ecosystem of digital services and e-governance was digital identity. However, that’s just one side of the coin. The push to electronic governance was backed by a data protection legislation.

  • Enlisting effective backup and recovery solutions

    Government agencies generate volumes of electronic data, and are more dependent on technology than ever before.

    As a result, agencies expect their IT departments to work behind the scenes to keep all systems up, running, and growing - no matter what happens. A key part of this responsibility requires IT departments to resume operations in spite of interruptions. This continuity of operations (COOP) function requires the identification and installation of backup and recovery solutions that are cost-efficient, but also cause a minimum of disruption. In some cases, COOP also requires that IT departments work to prevent outages in the first place.

  • EU gründet Amt für Cybersicherheit

    "Vertrauen und Sicherheit sind unverzichtbare Voraussetzungen für die Informationsgesellschaft", weiß EU-Kommissar Erkki Liikanen, "mit ENISA setzen wir unsere Arbeit fort, eine Kultur der Sicherheit zu schaffen". Große Ereignisse verlangen eben große Worte: Das EU-Amt für IT-Sicherheit ist beschlossene Sache.
  • EU to build secure network

    European Commission officials called on industry this month to help create a secure network for the entire European Union that could cost as much as 100 million euros ($120.5 million).

    The new Secured Trans-European Services for Telematics between Administrations (s-TESTA) network will replace the TESTA network that EU governments have been gradually building since 1996. s-TESTA will be an intranet backbone for the EU central government and the governments of its members.

  • EU voll im Security-Trend

    Die Sicherheit in den Netzen ist eines der Schlüsselthemen im 6. EU-Rahmenprogramm. Bereits jetzt liegen der EU-Kommission 151 Bewerbungen zu einschlägigen Themen vor. Sie reichen von "Sichere Infrastrukturen" bis "Cybercrime", berichtete der zuständige Brüsseler EU-Sektionchef Andrea Servida bei einem Treffen des zweiten ACATS Forum in Stuttgart.
  • EU-Rat und Parlament wollen Agentur für Netz- und Informationssicherheit gründen

    EU-Rat und Parlament wollen eine Europäische Agentur für Netz- und Informationssicherheit (ENISA) gründen. Das gab die EU-Kommission gestern in Brüssel bekannt. ENISA kann bereits Anfang 2004 ihre Arbeit aufnehmen. Die Agentur wird als Kenntniszentrum fungieren und den EU-Mitgliedstaaten bei der Verbesserung der Netzwerksicherheit und der Vernetzung von Informationssystemen über Ländergrenzen hinweg beraten und helfen.
  • EU: Cloud Security: Good News, Bad News

    A report issued Friday by the European Union's European Network and Information Security Agency panel gives proponents of secure government cloud computing hope, and some pause. It's not that authors of the study, Cloud Computing: Benefits, Risks and Recommendations for Information Security, are fickle, but they note the challenges of securing data on the public cloud are complex.

    "The key conclusion of this paper is that the cloud's economies of scale and flexibility are both a friend and a foe from a security point of view. The massive concentrations of resources and data present a more attractive target to attackers, but cloud-based defenses can be more robust, scalable and cost-effective."

  • EU: Enisa launches comprehensive cloud security report

    EU security agency provides checklist for firms looking to vet providers

    The European Union's security agency today released a comprehensive report designed to teach public and private secret organisations and policy makers how to tap the benefits of cloud computing without falling foul of the security risks.

    Cloud Computing: Benefits, Risks and Recommendations for Information Security is the first of its kind from the European Network and Information Security Agency.

  • EU: ENISA-Studie hilft bei Risikoabschätzung für Cloud Computing

    35 Hauptsicherheitsrisiken hat das europäische BSI-Pendant ENISA(European Network and Information Security Agency) bei der Nutzung von Cloud Computing ausgemacht und in der Studie "Cloud Computing: Benefits, risks and recommendations for information security" veröffentlicht. Die Risiken unterteilen sich in organisatorische (etwa Verlust von Governance, Compliance oder des guten Rufes), technische (Missbrauch privilegierter Zugriffe, Datenmitschnitt, Data Leakage, verteilte Denial-of-Service-Angriffe, Verlust von Verschlüsselungs-Keys et cetera), rechtliche (Datenschutzrisiken, Lizensierung und mehr) sowie generelle Risiken, die nicht spezifisch für Cloud-Anwendungen sind (Netzwerkprobleme, Diebstahl von IT-Zubehör, Naturkatastrophen).

  • Europäische Kommission will Agentur für Netzwerksicherheit

    Agentur zur Erhöhung der Netz- und Informationssicherheit vorgeschlagen

    Die Europäische Kommission hat die Gründung einer europäischen Agentur für Netz- und Informationssicherheit vorgeschlagen. Die Agentur soll als Fachzentrum dienen, bei dem sowohl die Mitgliedstaaten als auch die EU-Organe Rat in Fragen der Netzsicherheit einholen können.

  • Experts at GCC e-Participation & e-Governance Forum emphasize data privacy and protection

    Decision makers and e-government leaders emphasized the importance of ensuring data privacy and citizen anonymity and identity protection through enforcing regulations on the use of data, yesterday during the opening of the 2nd Annual "GCC e-Participation and e-Governance Forum. Organized by Abu Dhabi University Knowledge Group (ADUKG) the three-day forum brings together more than 150 government representatives, and e-government experts who discussed the global trends of government e-services and e-participation strategies, and the challenges that face e-transformation in the GCC region.

    The opening ceremony was attended by Salem Khamis Al Shair Founder and Chairman of Al Shair Group, Abdul Karim Al Raessi Director of Strategy and Planning in Abu Dhabi Systems and Information Centre, and H.E. Dr. Eng. Ali Mohamed Al Khouri, Director General of Emirates Identity Authority.

Go to top