Translations for IT Grundschutzhandbuch in the PONS Online German» English Dictionary: Informationstechnik, IT, Informationstechnologie, IT-Branche. This Page is automatically generated based on what Facebook users are interested in, and not affiliated with or endorsed by anyone associated with the topic. Als IT-Grundschutz bezeichnet die Bundesverwaltung eine vom Bundesamt für Sicherheit in der Informationstechnik (BSI) entwickelte Vorgehensweise zum.
|Published (Last):||13 September 2010|
|PDF File Size:||12.90 Mb|
|ePub File Size:||3.94 Mb|
|Price:||Free* [*Free Regsitration Required]|
A table summarizes the measures to grundschutxhandbuch applied for individual components in this regard. The component catalogs, threat catalogs, and the measures catalogs follow these introductory sections.
The first layer is addressed to managementincluding personnel and outsourcing. This publication does not intend to make managers into security experts. You are not signed in. This new feature displays references to sentence pairs from translated texts, which we have found for you on the Internet, directly within many of our PONS dictionary entries.
Degrees of realization, “considerable”, “yes”, “partial”, and “no”, are distinguished. IT Baseline Protection Handbook. In this way, a network of individual components arises in the baseline protection catalogs.
Microsoft Azure Germany – IT Grundschutz Compliance Workbook
See how foreign-language expressions are used in real life. The threat catalogs, in connection with the component catalogs, offer more detail about potential threats to IT systems.
We are working on continually optimizing the quality of our usage examples by improving their relevance as well as the translations. So, now you can see how a concept is translated in specific contexts.
Besides the forms, the cross-reference tables another useful supplement. Here you can also find the Baseline Protection I, containing support functions for implementing IT baseline protection in procedural detail. The given threat situation is depicted after a short description of the component examining the facts.
BSI – IT-Grundschutz Catalogues
Please note that the vocabulary items in this list are only available in this browser. Languages Deutsch Italiano Edit links. The following layers are formed: In addition, the Dictionary is now supplemented with millions of real-life translation examples from external sources.
From Wikipedia, the free encyclopedia. System administrators cover the third layer, looking at the characteristics of IT systems, including clientsservers and private branch exchanges or fax machines. My search history My favourites.
The PONS Dictionary delivers the reliability of a dictionary which has been grundshcutzhandbuch reviewed and expanded over the course of decades.
Measures, as well as threats, are cited with mnemonics. Finally, examples of damages that can be triggered by these threat sources are given. The aim of IT- Grundschutz is to achieve an appropriate ot level for all types of information of an organisation.
Both components must be successfully implemented to guarantee the system’s security. How do I grkndschutzhandbuch the new sentence examples?
The editorially approved PONS Online Dictionary with text translation tool now includes a database with hundreds of millions of real translations from the Internet. Category Z measures any additional measures that have proven themselves in practice.
The search engine displays hits in the dictionary entries plus translation examples, which contain the exact or a similar word or phrase. The detection and assessment of weak points in IT systems often occurs by way of a risk assessmentwherein a ot potential is assessed, and the costs of damage to the system or group of similar systems are investigated individually.
In the process, classification of measures into the categories A, B, C, and Z is undertaken. Instead, it presents the information that decision makers need to assess the topic of information security and possible courses of action, to ask their experts the right questions and to set objectives.
The main sources we used are professionally translated company, and academic, websites.
The component grudnschutzhandbuch is composed of the layer number in which the component is located and a unique number within the layer. The component catalog is the central element, and contains the following five layers: IT- Grundschutz The aim of IT- Grundschutz is to achieve an appropriate security level for all types of information of an organisation.
This page was last edited on 29 Septemberat Otherwise your message will be regarded as spam. In the process, layers are used for structuring individual measures groups. In this way, a security level can be achieved, viewed as adequate in most cases, and, consequently, replace the more expensive risk assessment. The measures catalogs summarize the actions necessary to achieve baseline protection; measures appropriate for several system components are described centrally.