Translations for IT Grundschutzhandbuch in the PONS Online German» English Dictionary: Informationstechnik, IT, Informationstechnologie, IT-Branche. This Page is automatically generated based on what Facebook users are interested in, and not affiliated with or endorsed by anyone associated with the topic. Als IT-Grundschutz bezeichnet die Bundesverwaltung eine vom Bundesamt für Sicherheit in der Informationstechnik (BSI) entwickelte Vorgehensweise zum.

Author: Gam Moogur
Country: Latvia
Language: English (Spanish)
Genre: Relationship
Published (Last): 12 November 2009
Pages: 205
PDF File Size: 19.14 Mb
ePub File Size: 16.28 Mb
ISBN: 730-8-42169-317-3
Downloads: 55989
Price: Free* [*Free Regsitration Required]
Uploader: Arashizragore

However, the cross-reference tables only cite the most important threats. Instead, it presents the information that decision makers need to assess the topic of information security and possible courses of grundschutzhnadbuch, to ask their experts the right questions and to set objectives.

According to the BSI, the knowledge collected in these catalogs is not necessary to establish baseline protection. In addition, the Dictionary is now supplemented with millions of real-life translation examples from external sources. The component catalog is the central element, and contains the following five layers: After a complete depiction, individual measures are once again collected into a list, which is arranged according to the measures catalog’s structure, rather than that of the life cycle.

How do I find the new sentence examples? The measures catalogs summarize the actions necessary to grunddchutzhandbuch baseline protection; measures grhndschutzhandbuch for several system components are described centrally. This page was last edited on 29 Septemberat By using this site, you agree to the Terms of Use and Privacy Policy.

TechNet Microsoft Azure Germany – IT Grundschutz Compliance Workbook

Finally, control questions regarding correct realization are given. Because of the overwhelming data volume, it has not been possible to carry out a manual editorial check on all of these documents. Finally, the realization is terminated and a manager is named.


We are using the following form field to detect spammers. The fifth within that of the applications administrator and the IT user, grundcshutzhandbuch software like database management systemse-mail and web servers.

If the measure cited for a given threat is not applicable for the individual IT system, it is not superfluous. The detection and assessment of weak points in IT systems often occurs by way of a risk assessmentwherein a threat potential is assessed, and the costs of damage to the system or group of similar systems are investigated individually.

The editorially approved PONS Online Dictionary with text translation tool now includes a database with hundreds of millions of real translations from the Internet. The search engine displays hits in the dictionary entries plus translation gundschutzhandbuch, which contain the exact or a similar word or phrase. A table summarizes the measures to be applied for individual components in this regard. These threat grkndschutzhandbuch follow the general layout in layers.

IT Baseline Protection Catalogs

Degrees of realization, “considerable”, “yes”, “partial”, and “no”, are distinguished. If you want to copy vocabulary items to the vocabulary trainer, click on “Import” in the vocabulary list. A detailed description of the measures follows. Here you can grundschuutzhandbuch find the Baseline Protection Guide, containing support functions for implementing IT baseline protection in procedural detail.

The threat catalogs, in connection with the component catalogs, offer more detail about potential threats grundschurzhandbuch IT systems. If notability cannot be established, the article is likely to be mergedredirectedor deleted. The given threat situation is depicted after a short description of the component examining the facts.

Are you missing a word, phrase or translation? In this way, a security level can be achieved, viewed as adequate in most cases, and, consequently, replace the more expensive risk assessment. Finally, a serial number within the layer identifies the element.


Compile a new entry. The fourth layer falls within the network administrators task area. C stands for component, M for measure, and T for threat. During realization of measures, personnel should verify whether adaptation to the operation in question is necessary; any deviations from the initial measures should be documented for future reference. It is not necessary to work through them to establish baseline protection.

You will find in the IT- Grundschutz Catalogues the modules, threats and safeguards. They summarize the measures and most important threats for individual components.

Real language usage will help your translations to gain in accuracy and idiomaticity! Baseline protection can only be ensured if all measures are realized. In many areas, IT- Grundschutz even provides advice for IT systems and applications requiring a high level of protection. Through proper application of well-proven technical, organisational, personnel, and infrastructural safeguards, a security level is reached that is suitable and adequate to protect business-related information having normal protection requirements.

Federal Office for Security in Information Technology, version. The forms provided serve to remedy protection needs for certain IT system components. Please note that iy vocabulary items in this list are only available in this browser. It serves as the basis for the IT baseline protection certification of an enterprise.

We are working on continually optimizing the quality of our usage examples by improving their relevance as well as the translations. Baseline protection does, however, demand an understanding of the measures, as well as the vigilance of management.