IT GRUNDSCHUTZHANDBUCH PDF

Translations for IT Grundschutzhandbuch in the PONS Online German» English Dictionary: Informationstechnik, IT, Informationstechnologie, IT-Branche. This Page is automatically generated based on what Facebook users are interested in, and not affiliated with or endorsed by anyone associated with the topic. Als IT-Grundschutz bezeichnet die Bundesverwaltung eine vom Bundesamt für Sicherheit in der Informationstechnik (BSI) entwickelte Vorgehensweise zum.

Author: Mekree Babar
Country: Mozambique
Language: English (Spanish)
Genre: Health and Food
Published (Last): 23 November 2016
Pages: 378
PDF File Size: 19.19 Mb
ePub File Size: 4.84 Mb
ISBN: 565-2-22127-947-3
Downloads: 1109
Price: Free* [*Free Regsitration Required]
Uploader: Kazirr

Please sign in or register for free if you want to use this function. In grundsfhutzhandbuch, we have begun to apply this technology to further languages in order to build up usage-example databases for other language pairs.

Category A measures for the entry point into the subject, B measures expand this, and category C is ultimately necessary for baseline protection certification. However, the cross-reference tables only cite the most important threats.

If notability cannot be established, the article is likely to be mergedredirectedor deleted. Your message has now been forwarded to the PONS editorial department.

The detection and assessment of weak points in IT systems often occurs by way of a risk assessmentwherein a threat potential is assessed, and the costs of damage to the system or group of similar systems are investigated individually. Federal Office for Security in Information Technology, version. System administrators cover the third layer, looking at the characteristics of IT systems, including clientsservers and private branch exchanges or fax machines.

These present supplementary information. Managers are initially named to initiate and realize the measures in the respective measures description. To familiarize the user with the manual itself, it contains an introduction with grudnschutzhandbuch, the approach to IT baseline protection, a series of concept and role definitions, and a glossary.

  BALLY SPYHUNTER PDF

An error has occured. Submit a new entry.

Otherwise your message will be regarded as spam. You can suggest improvements to this PONS entry here: Each catalog element is identified by an individual mnemonic laid out according to the following scheme the catalog groups are named first.

In the process, layers are used for structuring individual measures vrundschutzhandbuch. Compile a new entry. How can I copy translations to the vocabulary trainer?

Measures, as well as threats, are cited with mnemonics. Decision Guide for Managers: Instead, it presents the information that decision makers need to assess the topic of information security and possible courses of action, to ask their experts the right questions and to set objectives.

Views Read Edit View history. The first layer grundschutzhandbucch addressed to managementincluding personnel and outsourcing. This publication does not intend to make managers into security experts. The following layers are formed: In many areas, IT- Grundschutz even provides advice for IT systems and applications requiring a high level of protection.

The entry has been added to your favourites. The collection encompasses over pages, including the introduction and catalogs. It serves as the basis for the IT baseline protection certification of an enterprise. Individual threat sources are described briefly.

IT Baseline Protection Catalogs

The conclusion consists of a cost assessment. Finally, a serial number within the layer identifies the element. They summarize the measures and most important threats for individual components. A detailed description of the measures follows. IT baseline protection protection encompasses standard security measures for typical IT systems, with normal protection needs. The aim of IT- Grundschutz is to achieve an appropriate security level for all types of information of an organisation.

  EPISTLE DIOGNETUS PDF

Finally, examples of damages that can be triggered by these threat sources are given. Measures are cited with a priority and a classification. To keep each component as grundscjutzhandbuch as possible, global aspects are collected in one component, while more specific information is collected into a second. This is followed by the layer number affected by the element. Besides the forms, the cross-reference tables another useful supplement.

Reactivation will enable you to use the vocabulary trainer gurndschutzhandbuch any other programs. The necessary measures are presented in a text with short illustrations. In addition, grundschutzhsndbuch have included websites grundschutzhandbuh international organizations such as the European Union.

BSI – IT-Grundschutz

The forms provided serve to remedy protection needs grundschutznandbuch certain IT system components. A table summarizes the measures to be applied for individual components in this regard. Each measure is named and its degree of realization determined. We are using the following form field to detect spammers. According to the BSI, the knowledge collected in these catalogs is not necessary to establish baseline protection.

BundesanzeigerCologne