Translations for IT Grundschutzhandbuch in the PONS Online German» English Dictionary: Informationstechnik, IT, Informationstechnologie, IT-Branche. This Page is automatically generated based on what Facebook users are interested in, and not affiliated with or endorsed by anyone associated with the topic. Als IT-Grundschutz bezeichnet die Bundesverwaltung eine vom Bundesamt für Sicherheit in der Informationstechnik (BSI) entwickelte Vorgehensweise zum.
|Published (Last):||16 October 2013|
|PDF File Size:||12.22 Mb|
|ePub File Size:||7.63 Mb|
|Price:||Free* [*Free Regsitration Required]|
Grunndschutzhandbuch has been deactivated in your browser. A table summarizes the measures to be applied for individual components in this regard. Decision Guide for Managers: An itemization of individual threat sources ultimately follows. In this way, a security level can be achieved, viewed as adequate in most cases, and, consequently, replace the more expensive risk assessment.
BundesanzeigerCologne If the measure cited for a given threat is not applicable for the individual IT system, it is not superfluous. Federal Office for Security in Information Technology.
IT Grundschutzhandbuch : German » English | PONS
The first layer is addressed to managementincluding personnel and outsourcing. You are not signed in. The fourth layer falls within the network administrators task area. Languages Deutsch Italiano Edit links.
In cases in which security needs are greater, such protection can be used as a basis for further action. The conclusion consists of a cost assessment.
Partitioning into layers clearly isolates personnel groups impacted by a given layer from the layer in question.
In this way, a network of individual components arises in the baseline protection catalogs. Measures, as well as threats, are cited with grundsvhutzhandbuch. The necessary measures are presented in a text with short illustrations. Each individual component follows the same layout.
An error has occured. Category Z measures any additional measures that have proven themselves in practice. Compile a new entry.
IT Baseline Protection Catalogs
Finally, the realization is terminated and a manager is named. To familiarize the user with the manual itself, grundschytzhandbuch contains an introduction with explanations, the approach to IT baseline protection, a series of concept and role definitions, and a glossary. If notability cannot be established, the article is likely to be mergedredirectedor deleted.
They summarize the measures and most important threats for individual components. Please sign in or register for free if you want to use this function.
The detection and assessment of weak points in IT systems often occurs by way of a risk assessmentwherein a threat potential is assessed, and the costs of damage to the system or group of similar systems are investigated individually.
Submit a new entry. We are sorry for the inconvenience.
Besides the forms, the cross-reference tables another useful supplement. Because of the overwhelming data volume, it has not been possible to carry out a manual editorial check on all of these documents. IT baseline protection protection encompasses standard security measures for typical IT systems, with normal protection needs.
This page was last edited on 29 Septemberat The table contains correlations between measures and the threats they address.