Translations for IT Grundschutzhandbuch in the PONS Online German» English Dictionary: Informationstechnik, IT, Informationstechnologie, IT-Branche. This Page is automatically generated based on what Facebook users are interested in, and not affiliated with or endorsed by anyone associated with the topic. Als IT-Grundschutz bezeichnet die Bundesverwaltung eine vom Bundesamt für Sicherheit in der Informationstechnik (BSI) entwickelte Vorgehensweise zum.
|Published (Last):||11 January 2009|
|PDF File Size:||4.10 Mb|
|ePub File Size:||17.38 Mb|
|Price:||Free* [*Free Regsitration Required]|
So, now you can see how a concept is translated in specific contexts. After a complete depiction, individual measures are once again collected into a list, which is arranged according to the measures catalog’s structure, rather than that of the life cycle. The conclusion consists of a cost assessment.
You can suggest improvements to this PONS entry here: Each measure is named and its degree of realization determined. The entry has been added to your favourites. The measures catalogs summarize the actions necessary to achieve baseline protection; measures appropriate for several system components are described centrally. In addition, we have included websites of international organizations such as the European Union.
The component catalogs, threat catalogs, and the measures catalogs follow these introductory sections. You will find in the IT- Grundschutz Catalogues the modules, threats and safeguards.
Federal Office for Information Security (BSI)
Each individual component follows the same layout. The second is addressed to in-house technicians, regarding structural aspects in the infrastructure layer. The component number is composed of the layer number in which the component is located and a unique number within the layer. Collect the vocabulary that you want to remember while using the dictionary.
Because of the overwhelming data volume, it has not been possible to carry out a manual editorial check on all of these documents. Please sign in or register for free if you want to grundschutzhandbuchh this function. From Wikipedia, the free encyclopedia.
Category Z measures any additional measures that have proven themselves in practice. This is followed by the layer number affected by the element. Languages Deutsch Italiano Edit links. In this way, a security level can be achieved, viewed as adequate in most cases, and, consequently, replace the more expensive risk assessment.
The following layers are formed: My search history My favourites. Measures are cited with a priority and a classification.
Decision Guide for Managers: According to the BSI, the knowledge collected in these catalogs is not necessary to establish baseline protection. In many areas, IT- Grundschutz even provides advice for IT systems and applications requiring a high level of protection. To familiarize the gurndschutzhandbuch with the manual itself, it contains an introduction with explanations, the approach to IT baseline protection, gfundschutzhandbuch series of concept and role definitions, and a glossary.
An error has occured.
System administrators cover the third layer, looking at the characteristics of IT systems, including clientsservers and private branch exchanges or fax machines. Once you brundschutzhandbuch copied them to the vocabulary trainer, they are available from everywhere.
Category A measures for the entry point into the subject, B measures expand this, and category C is ultimately necessary for baseline protection certification. It is not necessary to work through them to establish baseline protection. The collection encompasses over pages, including the introduction and catalogs.
TechNet Microsoft Azure Germany – IT Grundschutz Compliance Workbook
grundschutzhandbucg The threat catalogs, in connection with the component catalogs, offer more detail about potential threats to IT systems. Retrieved from grundschutzhanebuch https: The fourth layer falls within the network administrators task area. Through proper application of well-proven technical, organisational, personnel, and infrastructural safeguards, a security level is reached that is suitable and adequate to protect business-related information having normal protection requirements.
We are using the following form field to detect spammers. In addition, we have begun to apply this technology to further languages in order to build up usage-example databases for grundschutzhansbuch language pairs. Real language usage will help your translations to gain in accuracy and idiomaticity! Your message has now been forwarded to the PONS editorial department. Federal Office for Security in Information Technology. The topic of this article may not meet Wikipedia’s general notability guideline.