Translations for IT Grundschutzhandbuch in the PONS Online German» English Dictionary: Informationstechnik, IT, Informationstechnologie, IT-Branche. This Page is automatically generated based on what Facebook users are interested in, and not affiliated with or endorsed by anyone associated with the topic. Als IT-Grundschutz bezeichnet die Bundesverwaltung eine vom Bundesamt für Sicherheit in der Informationstechnik (BSI) entwickelte Vorgehensweise zum.
|Published (Last):||28 May 2017|
|PDF File Size:||11.16 Mb|
|ePub File Size:||7.53 Mb|
|Price:||Free* [*Free Regsitration Required]|
In the process, layers are used for structuring individual measures groups.
Finally, a serial number within the layer identifies the element. From Wikipedia, the free encyclopedia. Measures are cited with a priority and a classification.
In addition, we have begun to apply this technology to further languages in order to build up grubdschutzhandbuch databases grundschutzhanbduch other language pairs. Here you can also find the Baseline Protection Guide, containing support functions for implementing IT baseline protection in procedural detail.
Ig sign in or register for free if you want to use this function. C stands for component, M for measure, and T for threat. BundesanzeigerCologne Category A measures for the entry point into the subject, B measures expand this, and category C is ultimately necessary for baseline protection certification. Besides the forms, the cross-reference tables grundsxhutzhandbuch useful supplement. In this way, a network of individual components arises in the baseline protection catalogs.
According to the BSI, the knowledge collected in these catalogs is not necessary to establish baseline protection. These present supplementary information. An itemization of individual threat sources ultimately follows.
This is followed by the layer number affected by the element. To familiarize the i with the manual itself, it contains an introduction with explanations, the approach to IT baseline protection, a series of concept and role definitions, and a glossary. Once you have copied them to the vocabulary trainer, they are available from everywhere.
TechNet Microsoft Azure Germany – IT Grundschutz Compliance Workbook
Because of the overwhelming data volume, it has not been possible to carry out a manual editorial check on all of these documents. Real language usage will help your translations to gain in accuracy and idiomaticity! A detailed description of the measures follows. No usage examples were found in the Internet. You are not signed in. During realization of measures, personnel should verify whether adaptation to the operation in question is necessary; any deviations from the initial measures should be documented for future reference.
Compile a new entry. Otherwise your message will be regarded as spam.
IT Baseline Protection Catalogs
IT- Grundschutz uses a holistic approach to this process. IT baseline protection protection encompasses standard security measures for typical IT systems, with normal protection needs.
grunddschutzhandbuch Decision Guide for Managers: In the process, classification of measures into the categories A, B, C, and Z is undertaken.
Managers are initially named to initiate and realize the measures in the respective measures description. We are using the following form field to detect spammers. Please do leave them untouched. The first layer is addressed to managementincluding personnel and outsourcing.
Are you missing a word, phrase or translation?
IT Baseline Protection Catalogs – Wikipedia
The given threat situation is depicted after a short description of the component examining the facts. Both components must be successfully implemented to guarantee the system’s security. Submit a new entry. Finally, control questions regarding correct realization are given.
The conclusion consists of a cost assessment. This page was last edited on 29 Septemberat The table contains correlations between measures and grundzchutzhandbuch threats they address.
Finally, examples of damages that can be triggered by these threat sources are given. Baseline protection does, however, demand an understanding of the measures, as well as the vigilance of management.
Views Read Edit View history. Your message has now been forwarded to the PONS editorial department. They summarize the measures and most important threats for individual components. Grundschtuzhandbuch, the realization is terminated and a manager is named.
The component catalogs, threat catalogs, and the measures catalogs follow these introductory sections. The editorially approved PONS Online Dictionary with text translation tool now includes a database with hundreds of millions of real translations from the Internet.
These threat catalogs follow the general layout in layers. The main sources we used are professionally translated company, and academic, websites. The following layers are formed: