Translations for IT Grundschutzhandbuch in the PONS Online German» English Dictionary: Informationstechnik, IT, Informationstechnologie, IT-Branche. This Page is automatically generated based on what Facebook users are interested in, and not affiliated with or endorsed by anyone associated with the topic. Als IT-Grundschutz bezeichnet die Bundesverwaltung eine vom Bundesamt für Sicherheit in der Informationstechnik (BSI) entwickelte Vorgehensweise zum.
|Published (Last):||13 August 2006|
|PDF File Size:||17.23 Mb|
|ePub File Size:||9.53 Mb|
|Price:||Free* [*Free Regsitration Required]|
IT Baseline Protection Catalogs – Wikipedia
The following layers are formed: How do I find the new sentence examples? We are working on continually optimizing the quality of our usage examples by improving their relevance as well as the translations.
Submit a new entry. After a complete depiction, individual measures are once again collected into a list, which is arranged according to the measures catalog’s structure, rather than that of the life cycle.
The fourth layer falls within the network administrators task area. The text follows the facts of the life cycle in question and includes planning and design, acquisition if necessaryrealization, operation, selection if necessaryand preventive measures. An itemization of individual threat sources ultimately follows. In addition, we have begun to apply this technology to further languages in order to build up usage-example databases for other language pairs.
They summarize the measures and most important threats for individual components. During realization of measures, personnel should verify whether adaptation to the operation in question is necessary; any deviations from the initial measures should be documented for future reference.
If notability cannot be established, the article is likely to be mergedredirectedor deleted. You will find in the IT- Grundschutz Catalogues the modules, threats and safeguards. Federal Office for Security in Information Technology, version. To keep each component as compact as possible, global aspects are collected in one component, while more specific information is collected into a second.
Reactivation will enable you to use the vocabulary trainer and any other programs. Finally, a serial number within the layer identifies the element.
See how foreign-language expressions are used in real life. Besides the forms, the cross-reference tables another useful supplement. Each individual component follows the same layout. Partitioning into layers clearly isolates personnel groups impacted by a given layer from the layer in question. If the measure cited for a given threat is not applicable for the individual IT system, it is not superfluous. The component number is composed of the layer number in which the component is located and a unique number within the layer.
Federal Office for Security in Information Technology. Please note that the vocabulary items in this list are only available in this browser. Real language usage will help your translations to gain in accuracy and idiomaticity!
Federal Office for Information Security (BSI)
In this way, a network of individual components arises in the baseline protection catalogs. We are sorry for the inconvenience.
The conclusion consists of a cost assessment. Because of the overwhelming data volume, it has not been possible to carry out a manual editorial check on all of these documents. Both components must be successfully implemented to guarantee the system’s security.
Decision Guide for Managers: Measures, as well as threats, are cited with mnemonics. Your message has now been forwarded to the PONS editorial department. According to the BSI, the knowledge collected in these catalogs is not necessary to establish baseline protection.
The threat catalogs, in connection with the component catalogs, offer more detail about potential threats to IT systems.
The table contains correlations between measures and the threats they address. IT baseline protection protection encompasses standard security measures for typical IT systems, with normal protection needs.
Through proper application grundschutzyandbuch well-proven technical, organisational, personnel, and infrastructural safeguards, a security level is reached that is suitable and adequate to protect business-related information having normal protection requirements. If the measures’ grundschytzhandbuch is not possible, reasons for this are entered in the adjacent field for later traceability.
Here you can also find the Baseline Protection Guide, containing support functions for implementing IT baseline protection in itt detail. Articles with topics of unclear notability from Grunrschutzhandbuch All articles with topics of unclear notability. Retrieved from ” https: Finally, the realization is terminated and a manager is named. In many areas, IT- Grundschutz even provides advice for IT systems and applications requiring a high level of protection.
No usage examples were found in the Internet. C stands for component, M for measure, and T for threat. The main sources we used are professionally translated company, and academic, websites. We are able to identify trustworthy translations with the aid of automated processes.