Betekenis van:
data encryption

data encryption
Zelfstandig naamwoord
    • (computer science) the encryption of data for security purposes

    Hyperoniemen


    Voorbeeldzinnen

    1. Encryption and secure transfer of data
    2. Security facilities usage: Data encryption for confidentiality
    3. Network encryption The Central SIS II does not allow data with high or very high protection requirements to be transferred outside the LAN without encryption.
    4. prevent the unauthorised reading and copying of personal data during their transmission from the VIS, in particular by means of appropriate encryption techniques (transport control);
    5. "Symmetric algorithm" (5) means a cryptographic algorithm using an identical key for both encryption and decryption. N.B.:a common use of "symmetric algorithms" is confidentiality of data.
    6. Encryption and/or decryption for protection of libraries, design attributes, or associated data for the design of semiconductor devices or integrated circuits;
    7. Appropriate measures shall be taken to ensure confidentiality and integrity for data being sent to other Member States, including their encryption.
    8. "Symmetric algorithm" (5) means a cryptographic algorithm using an identical key for both encryption and decryption. N.B.: A common use of "symmetric algorithms" is confidentiality of data.
    9. The Central SIS II does not allow data with high or very high protection requirements to be transferred outside the LAN without encryption.
    10. Appropriate measures shall be taken to ensure the confidentiality and integrity of dactyloscopic data being sent to other Member States, including their encryption.
    11. "Symmetric algorithm" (5) means a cryptographic algorithm using an identical key for both encryption and decryption. N.B.A common use of "symmetric algorithms" is confidentiality of data.
    12. prevent the unauthorised reading, copying, modification or deletion of personal data during transfers of personal data or during transportation of data media in particular by means of appropriate encryption techniques (transport control);
    13. prevent the unauthorised reading, copying, modification or deletion of personal data during transfers of personal data or during transportation of data media, in particular by means of appropriate encryption techniques (transport control);
    14. It should be ensured that the network provider will not have an access to the SIS II operational data as well as to the related Sirene exchange by any means. To maintain a high level of security, the Communication Infrastructure must allow to manage the certificates/keys. Remote administration and remote monitoring of the encryption boxes must be possible. Encryption algorithms at least must comply with the following requirements: Symmetric encryption algorithms:
    15. It should be ensured that the network provider will not have access to the SIS II operational data as well as to the related Sirene exchange by any means. To maintain a high level of security, the Communication Infrastructure must allow the possibility to manage the certificates/keys. Remote administration and remote monitoring of the encryption boxes must be possible. Encryption algorithms at least must comply with the following requirements: symmetric encryption algorithms: