IT GRUNDSCHUTZHANDBUCH PDF
Translations for IT Grundschutzhandbuch in the PONS Online German» English Dictionary: Informationstechnik, IT, Informationstechnologie, IT-Branche. This Page is automatically generated based on what Facebook users are interested in, and not affiliated with or endorsed by anyone associated with the topic. Als IT-Grundschutz bezeichnet die Bundesverwaltung eine vom Bundesamt für Sicherheit in der Informationstechnik (BSI) entwickelte Vorgehensweise zum.
|Published (Last):||13 August 2010|
|PDF File Size:||8.23 Mb|
|ePub File Size:||14.34 Mb|
|Price:||Free* [*Free Regsitration Required]|
In the process, classification of measures into the categories A, B, C, and Z is undertaken.
Through proper application of well-proven technical, yrundschutzhandbuch, personnel, and infrastructural safeguards, a security level is grundschhtzhandbuch that is suitable and adequate to protect business-related information having normal protection requirements.
The component catalog is the central element, and contains the following five layers: How do I find the new sentence examples? The component catalogs, threat catalogs, and the measures catalogs follow these introductory sections. The necessary measures are presented in a text with short illustrations. The threat catalogs, in connection with the component catalogs, offer more detail about potential threats to IT systems.
In the example of an Apache web server, the general B 5. Otherwise your message will be regarded as spam. The main sources we used are professionally translated company, and academic, websites.
BSI – IT-Grundschutz Catalogues
IT Baseline Protection Handbook. No usage examples were found in the Internet. Finally, a serial number within the layer identifies the element. The text follows the facts of the iy cycle in question and includes planning and design, acquisition if necessaryrealization, operation, selection if necessaryand preventive measures.
The fourth layer falls within the network administrators task area.
However, the cross-reference tables only cite the most important threats. You will find in the IT- Grundschutz Catalogues the modules, threats and safeguards.
The respective measures or threats, which are introduced in the component, can also be relevant for other components. Besides the forms, the cross-reference tables another useful supplement.
BSI – IT-Grundschutz
Reactivation will enable you to use the vocabulary trainer and any other programs. An error has occured. Languages Deutsch Italiano Edit links. Individual threat gdundschutzhandbuch are described briefly. You can suggest improvements to this PONS entry here: Collect the vocabulary that you want to remember while using the dictionary.
Baseline protection can only be ensured if all measures are realized. Please note that the vocabulary items in this list are only available in this browser. A table summarizes the measures to be applied for individual components in this regard.
Each catalog element is identified by an individual mnemonic laid out according to the following scheme the catalog groups are named first. An itemization of individual threat sources ultimately follows. It is not necessary to work through them to establish baseline protection.
It serves as the basis for the IT baseline protection certification of an enterprise. The measures catalogs summarize the actions necessary to achieve baseline protection; measures appropriate for several system components are described centrally.
Microsoft Azure Germany – IT Grundschutz Compliance Workbook
After a complete grundschutzhanrbuch, individual measures are once again collected into a list, which is arranged according to the measures catalog’s structure, rather than that of the life cycle. BundesanzeigerCologne Managers are initially named to initiate and realize the measures in the respective measures description.
These present supplementary information.
Category Z measures any additional measures that have proven themselves in practice. To keep each component as compact as possible, global aspects are collected in one component, while more specific information is collected into a second.