Article
Version 1
This version is not peer-reviewed
Mapping of the Security Requirements of GDPR and NIS
Version 1
: Received: 15 June 2020 / Approved: 15 June 2020 / Online: 15 June 2020 (10:58:30 CEST)
How to cite: Saqib, N.; Germanos, V.; Zeng, W.; Maglaras, L. Mapping of the Security Requirements of GDPR and NIS. Preprints 2020, 2020060193 Saqib, N.; Germanos, V.; Zeng, W.; Maglaras, L. Mapping of the Security Requirements of GDPR and NIS. Preprints 2020, 2020060193
Abstract
Privacy and information insurance have consistently been a priority for the European Union lawmaker. This paper presents whether the NIS prevails in its underlying endeavors to remain the congruity among residents and companies. It distinguishes current difficulties that specific business structures may experience while conforming to the Regulation. The exploration traces certain reasons which could impede the opportune reception of the new lawful ideas inside the system of the organizations. The exploration incorporates what is unique about the NIS; how it overlaps with existing frameworks; and how security requirements in the GDPR influence the NIS Directive. This paper furnishes different point of views of experts with the aim of setting up an entire examination
Keywords
NISD; GDPR; cybersecurity
Subject
Computer Science and Mathematics, Security Systems
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment