Translations for IT Grundschutzhandbuch in the PONS Online German» English Dictionary: Informationstechnik, IT, Informationstechnologie, IT-Branche. This Page is automatically generated based on what Facebook users are interested in, and not affiliated with or endorsed by anyone associated with the topic. Als IT-Grundschutz bezeichnet die Bundesverwaltung eine vom Bundesamt für Sicherheit in der Informationstechnik (BSI) entwickelte Vorgehensweise zum.
|Published (Last):||27 June 2006|
|PDF File Size:||1.12 Mb|
|ePub File Size:||17.2 Mb|
|Price:||Free* [*Free Regsitration Required]|
IT baseline protection protection encompasses standard security measures for typical IT systems, with normal protection needs. If the measures’ realization is grundschutzhandbucu possible, reasons for this are entered in the adjacent field for later traceability.
According to the BSI, the knowledge collected in these catalogs is not necessary to establish baseline protection. You are not signed in. My search history My favourites. If the measure cited for a given threat is not applicable for the individual IT system, it is not superfluous.
Please sign in or register for free if you want to use this function. The collection encompasses over pages, including the introduction and catalogs.
Please do leave them untouched. BundesanzeigerCologne Both components must be successfully implemented to guarantee the system’s security. No usage examples were found in the Internet.
To familiarize the user with the manual itself, it contains an introduction with explanations, the approach to IT baseline protection, a series of concept and role definitions, and a glossary. IT Baseline Protection Handbook. The fifth within that of the applications administrator and the IT user, concerning software like database management systemse-mail and web servers. The second is addressed to in-house technicians, regarding structural aspects in the infrastructure layer.
Federal Office for Information Security (BSI)
The component catalog is the central grundshutzhandbuch, and contains the following five layers: In the process, layers are used for structuring individual measures groups. We are using the following form field to detect spammers. Compile a new entry.
grundachutzhandbuch Are you missing a word, phrase or translation? The respective measures or threats, which are introduced in the component, can also be relevant for other components. Federal Office for Security in Information Technology, version.
From Wikipedia, the free encyclopedia. Collect the vocabulary that you want to remember while using the dictionary. Each individual component follows the same layout. In addition, the Dictionary is now supplemented with millions of if translation examples from external sources.
IT Baseline Protection Catalogs – Wikipedia
Federal Office for Security in Information Technology. In this way, a security level can be achieved, viewed as adequate in most cases, and, consequently, replace the more expensive risk assessment. The measures catalogs summarize the actions necessary to achieve baseline protection; measures appropriate for several system components are described centrally. Instead, it presents the information that decision makers need to assess the topic of information security and possible courses of action, to ask their experts the right grunschutzhandbuch and to set objectives.
Degrees of realization, “considerable”, “yes”, “partial”, and “no”, are distinguished. Through proper application of well-proven technical, organisational, personnel, and infrastructural safeguards, a security level is reached that is suitable and adequate to protect business-related information having normal protection requirements.
The topic of this article may not meet Wikipedia’s general notability guideline. To keep each component as compact as possible, global aspects are collected in one component, while more specific information is collected into a second.
This is followed by the layer number affected by the element. Measures, as grhndschutzhandbuch as threats, are cited with mnemonics. IT- Grundschutz uses a holistic approach to this process.