Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Blickinsbuch.de - IT-Sicherheit mit System - Klaus-Rainer Müller
     Artikel werden geladen

    IT-Sicherheit mit System

    Integratives IT-Sicherheits-, Kontinuitäts- und Risikomanagement - Sicherheitspyramide - Standards und Practices - SOA und Softwareentwicklung

    IT-Sicherheit mit System
    Integratives IT-Sicherheits-, Kontinuitäts- und Risikomanagement - Sicherheitspyramide - Standards und Practices - SOA und Softwareentwicklung

    Autoren:

    Verlag:
    Vieweg+Teubner Verlag  Weitere Titel dieses Verlages anzeigen

    Auflage: 5., neu bearbeitete und ergänzte Auflage.
    Erschienen: April 2014
    Seiten: 577
    Sprache: Deutsch
    Preis: 59.99 €
    Maße: 241x167x43
    Einband: Gebundene Ausgabe
    ISBN: 9783658043339

    Inhaltsverzeichnis

    1Ausgangssituation und Zielsetzung1
    1.1Ausgangssituation2
    1.1.1Bedrohungen2
    1.1.2Schwachstellen12
    1.1.3Schadenshöhen, Schutzbedarfe15
    1.2Zielsetzung des Sicherheits-, Kontinuitäts- und Risikomanagements18
    1.3 Lösung...............................................................................................................
    1.4Zusammenfassung20
    2Kurzfassung und Überblick für Eilige22
    3Zehn Schritte zum Sicherheitsmanagement28
    4Gesetze, Verordnungen, Vorschriften, Anforderungen31
    5Standards, Normen, Practices45
    5.1BSI: Standards45
    5.1.1Überblick45
    5.1.2BSI-Standard 100-1, ISMS46
    5.1.3BSI-Standard 100-2, IT-Grundschutz-Vorgehensweise46
    5.1.4BSI-Standard 100-3, Risikoanalyse48
    5.1.5BSI-Standard 100-4, Notfallmanagement48
    5.1.6Vergleich mit der Sicherheitspyramide50
    5.2BSI-IT-Grundschutzkataloge versus Sicherheitspyramide52
    5.3ISO/IEC 19770, Software asset management (SAM)55
    5.4ISO 22301:2012, Business Continuity Management Systems56
    5.5ISO/IEC 24762:2008, ICT disaster recovery services57
    5.6ISO/IEC-27000-Familie zum ISM58
    5.6.1Überblick58
    5.6.2ISO/IEC 27001:2013, ISMS - Requirements61
    5.6.3ISO/IEC 27002:2013, ISM - Code of practice for IS controls63
    5.6.4ISO/IEC 27003:2010, ISM - Implementation Guidance66
    5.6.5ISO/IEC 27004:2009, ISM - Measurement67
    5.6.6ISO/IEC 27005:2011, IS - Risk Management68
    5.6.7 ISO/IEC 27010:2012, ISM for inter-sector and inter-organizational
    communications70
    5.6.8 ISO/IEC 27013:2012, Guidance ort the integrated implementation
    of ISO/IEC 27001 and ISO/IEC 20000-171
    5.6.9 ISO/IEC TR 27015:2012, Information security management
    guidelines for financial services72
    5.6.10ISO/IEC 27032:2012, Guidelines for cybersecurity73
    5.6.11ISO/IEC 27033, Network security74
    5.6.12ISO/IEC 27034, Application security75
    5.6.13 ISO/IEC 27035:2011, Information security incident
    management77
    5.6.14 ISO/IEC 27037:2012, Guidelines for identification, collection,
    acquisition and preservation of digital evidence78
    5.7ISO/IEC 20000, IT Service Management78
    5.8ITIL®82
    5.8.1Überblick82
    5.8.2ITIL® Information Security Management84
    5.8.3ITIL® IT Service Continuity Management85
    5.9COBIT®, Version 5.086
    5.10PCI Data Security Standard (DSS)88
    5.11Zusammenfassender Vergleich mit der Sicherheitspyramide89
    5.12Risikoanalyse mittels OCTAVE® Approach96
    5.13Reifegradmodelle97
    5.13.1Systems Security Engineering - Capability Maturity Model®98
    5.13.2Software Assurance Maturity Model99
    5.13.3Information Technology Security Assessment Framework100
    5.13.4Maturity Model nach COBIT® 5100
    5.13.5Zusammenfassung101
    5.14Federated Identity Management102
    5.15Architekturen103
    5.15.1Serviceorientierte Architektur (SOA)103
    5.15.2Open Grid Services Architecture® (OGSA®)115
    5.15.3OSGi™ Architecture116
    5.16Program mier-/Entwicklungsr ich tlinien116
    5.16.1C, C++und Java116
    5.16.2Webanwendungen117
    5.17Schutz vor Insider-Bedrohungen118
    6Definitionen120
    6.1Unternehmenssicherheitsmanagementsystem120
    6.2Informationssicherheitsmanagementsystem121
    6.3Sicherheitsmanagement123
    6.4IKT-Sicherheitsmanagement123
    6.5 Ingenieurmäßige Sicherheit - Safety, Security, Continuity
    Engineering125
    6.6Sicherheitspyramide126
    6.7Sicherheitspolitik128
    6.7.1... nach IT-Grundschutzkatalogen128
    6.7.2... nach ISO/IEC 13335-1:2004129
    6.7.3... nach ISO/IEC 27001:2013130
    6.7.4... nach ISO/IEC 27002:2013130
    6.7.5... nach ISO/IEC 27003:2010131
    6.7.6... nach ITSEC131
    6.7.7... nach Common Criteria (ISO/IEC 15408)131
    6.7.8... nach der Sicherheitspyramide01"^b müii«132
    6.7.9Vergleich133
    6.8Sicherheit im Lebenszyklus134
    6.9Ressourcen, Schutzobjekte und -Subjekte sowie -klassen135
    6.10Sicherheitskriterien (Grundwerte der IS)136
    6.11Geschäftseinflussanalyse (Business Impact Analysis)137
    6.12Geschäftskontinuität (Business Continuity)137
    6.13Sicherheit und Sicherheitsdreiklang137
    6.14Risiko und Risikodreiklang139
    6.15Risikomanagement141
    6.16IT-Sicherheits-, IT-Kontinuitäts- und IT-Risikomanagement142
    6.17Zusammenfassung143
    7Die Sicherheitspyramide - Strategie und Vorgehensmodell146
    7.1Überblick147
    7.2Sicherheitshierarchie151
    7.2.1Sicherheits-, Kontinuitäts- und Risikopolitik151
    7.2.2Sicherheitsziele / Sicherheitsanforderungen151
    7.2.3Sicherheitstransformation und Sicherheitsmerkmale152
    7.2.4Sicherheitsarchitektur153
    7.2.5Sicherheitsrichtlinien153
    7.2.6Spezifische Sicherheitskonzepte154
    7.2.7Sicherheitsmaßnahmen155
    7.3PROSim155
    7.4Lebenszyklus156
    7.4.1Geschäfts-, Support- und Begleitprozess-Lebenszyklus156
    7.4.2Ressourcen-/Systemlebenszyklus157
    7.4.3Organisationslebenszyklus157
    7.4.4Produkt- und Dienstleistungslebenszyklus158
    7.5Sicherheitsregelkreis158
    7.6Sicherheitsmanagementprozess159
    7.7Zusammenfassung159
    8Sicherheits-, Kontinuitäts- und Risikopolitik161
    8.1Zielsetzung162
    8.2Umsetzung162
    8.3Inhalte164
    8.4Checkliste166
    8.5Praxisbeispiele168
    8.5.1 Sicherheits-, kontinuitäts- und risikopolitische Leitsätze
    Versicherung168
    8.5.2Sicherheits-, Kontinuitäts- und Risikopolitik170
    8.6Zusammenfassung178
    9Sicherheitsziele / Sicherheitsanforderungen180
    9.1Schutzbedarfsklassen181
    9.2Schutzbedarfsanalyse182
    9.2.1Prozessarchitektur und Prozesscharakteristika183
    9.2.2Externe Sicherheitsanforderungen - Überblick184
    9.2.3Geschäftseinflussanalyse (Business Impact Analysis)186
    9.2.4Betriebseinflussanalyse (Operational Impact Analysis)189
    9.3Akteursanalyse190
    9.4Umgebungs~/Umfeldanalyse191
    9.5Tabelle Schadensszenarien191
    9.6Praxisbeispiele193
    9.6.1Schutzbedarf der Geschäftsprozesse193
    9.6.2IKT-Schutzbedarfsanalyse193
    9.6.3Schutzbedarfsklassen198
    9.7Zusammenfassung199
    10Sicherheitsmerkmale200
    10.1Haus zur Sicherheit - House of Safety, Security, Continuity (HoSSC)201
    10.2Safety, Security and Continuity Function Deployment (SSCFD)202
    10.2.1Transformation der Anforderungen auf Sicherheitsmerkmale203
    10.2.2Detaillierung der Sicherheitsmerkmale204
    10.2.3Abbildung der Merkmale auf den Lebenszyklus205
    10.3Schutzbedarfsklassen206
    10.4Praxisbeispiele206
    10.5Zusammenfassung208
    11Sicherheitsarchitektur210
    11.1Überblick211
    11.2Prinzipielle/generische Sicherheitsanforderungen213
    11.3Prinzipielle/generische Bedrohungen213
    11.4Strategien und Prinzipien218
    XXIII
    11.4.1 Risikostrategie (Risk Strategy), Risikolandkarte,
    Risikoklassen219
    11.4.2 Sicherheits- und Kontinuitätsstrategie (Safety, Security and
    Continuity Strategy)221
    11.4.3Prinzip der Wirtschaftlichkeit222
    11.4.4Prinzip der Abstraktion222
    11.4.5Prinzip der Klassenbildung (Principle of Classification)223
    11.4.6Poka-Yoke-Prinzip224
    11.4.7 Prinzip der Namenskonventionen (Principle of Naming
    Conventions)226
    11.4.8Prinzip der Redundanz (Principle of Redundancy)226
    11.4.9 Prinzip des „aufgeräumten" Arbeitsplatzes (Clear Desk
    Policy)230
    11.4.10Prinzip der Abwesenheitssperre230
    11.4.11Prinzip der Eigenverantwortlichkeit230
    11.4.12 Vier-Augen-Prinzip (Confirmed Double Check/Dual Control
    Principle)231
    11.4.13 Prinzip der Funktionstrermung (Segregation of Duties
    Principle)231
    11.4.14 Prinzip der Sicherheitsschalen (Safety and Security Shell
    Principle)231
    11.4.15Prinzip der Pfadanalyse (Path Analysis Principle)232
    11.4.16Prinzip der Ge- und Verbotsdifferenzierung233
    11.4.17Prinzip des generellen Verbots (Deny All Principle)233
    11.4.18Prinzip der Ausschließlichkeit234
    11.4.19Prinzip des minimalen Bedarfs (Need to Know/Use Principle)234
    11.4.20 Prinzip der minimalen Rechte (Least/Minimum Privileges
    Principle)234
    11.4.21Prinzip der minimalen Dienste (Minimum Services Principle)235
    11.4.22Prinzip der minimalen Nutzung (Minimum Usage Principle)235
    11.4.23Prinzip der Nachvollziehbarkeit und Nachweisbarkeit236
    11.4.24 Prinzip des „sachverständigen Dritten" (Principle of Third Party
    Expert)236
    11.4.25Prinzip der Sicherheitszonen und des Ciosed-Shop-Betriebs236
    11.4.26Prinzip der Sicherheitszonenanalyse239
    11.4.27Prinzip der Immanenz (Principle of Immanence)240
    11.4.28Prinzip der Konsolidierung (Principle of Consolidation)241
    11.4.29Prinzip der Standardisierung (Principle of Standardization)243
    11.4.30Prinzip der Plausibilisierung (Principle of Plausibleness)244
    11.4.31Prinzip der Konsistenz (Principle of Consistency)245
    11.4.32 Prinzip der Untergliederung (Principle of
    Compartmentalization)245
    11.4.33Prinzip der Aufteilung246
    11.4.34Prinzip der Pseudonymisierung bzw. Maskierung246
    11.4.35Prinzip der Vielfältigkeit (Principle of Diversity)246
    11.4.36Distanzprinzip (Distance Principle)247
    11.4.37Prinzip der Vererbung248
    11.4.38Prinzip der Subjekt-Objekt- / Aktiv-Passiv-Differenzierung248
    11.4.39Prinzipien versus Sicherheitskriterien249
    11.5Sicherheitselemente251
    11.5.1Prozesse im Überblick252
    11.5.2Konformitätsmanagement (Compliance Management)262
    11.5.3Datenschutzmanagement (Privacy Management)265
    11.5.4Risikomanagement (Risk Management)268
    11.5.5Leistungsmanagement (Service / Service Level Management)280
    11.5.6Finanzmanagement (Financial Management)286
    11.5.7Projektmanagement (Project Management)286
    11.5.8Qualitätsmanagement (Quality Management)287
    11.5.9Ereignismanagement (Incident Management)288
    11.5.10Problemmanagement (Problem Management)294
    11.5.11Änderungsmanagement (Change Management)295
    11.5.12Releasemanagement (Release Management)298
    11.5.13Konfigurationsmanagement (Configuration Management)299
    11.5.14Lizenzmanagement (Licence Management)300
    11.5.15Kapazitätsmanagement (Capacity Management)302
    11.5.16Wartungsmanagement (Maintenance Management)304
    11.5.17Kontinuitätsmanagement (Continuity Management)305
    11.5.18Securitymanagement (Security Management)337
    11.5.19Architekturmanagement (Architecture Management)373
    11.5.20Innovationsmanagement (Innovation Management)379
    11.5.21Vertragsmanagement (Contract Management)382
    11.5.22Dokumentenmanagement (Document Management)384
    11.5.23Personalmanagement (Human Resources Management)384
    11.5.24Ressourcen im Überblick389
    11.5.25Daten390
    11.5.26Dokumente390
    11.5.27IKT-Hardware und Software391
    11.5.28Infrastruktur429
    11.5.29Material430
    11.5.30Methoden und Verfahren430
    11.5.31Personal430
    11.5.32Organisation im Überblick431
    11.5.33Lebenszyklus im Überblick431
    11.6Interdependenznetz432
    11.7Hilfsmittel RiSiKo- Architekturmatrix434
    11.8Zusammenfassung435
    12Sicherheitsrichtlinien/~standards - Generische Sicherheitskonzepte437
    12.1Übergreifende Richtlinien438
    12.1.1Sicherheitsregeln438
    12.1.2Prozessvorlage440
    12.1.3IKT-Benutzerordnung442
    12.1.4E-Mail-Nutzung444
    12.1.5Internet-Nutzung446
    12.2Betriebs- und Begleitprozesse (Managementdisziplinen)448
    12.2.1Kapazitätsmanagement449
    12.2.2Kontinuitätsmanagement451
    12.2.3Securitymanagement469
    12.2.4Architekturmanagement480
    12.3Ressourcen482
    12.3.1Zutrittskontrollsystem482
    12.3.2Passwortbezogene Systemanforderungen482
    12.3.3Wireless LAN483
    12.4Organisation484
    12.5Zusammenfassung485
    13Spezifische Sicherheitskonzepte487
    13.1Prozesse488
    13.1.1Kontinuitätsmanagement488
    13.2Ressourcen489
    13.2.1Betriebssystem489
    13.3Zusammenfassung489
    14Sicherheitsmaßnahmen490
    14.1Ressourcen490
    14.1.1Betriebssystem: Protokoll Passworteinstellungen490
    14.2Zusammenfassung491
    15Lebenszyklus492
    15.1Sichere Beantragung (Secure Proposai Application)495
    15.2Sichere Planung (Secure Planning)496
    15.3 Sicheres Fachkonzept, sichere Anforderungsspezifikation (Secure
    Requirements Specification)496
    15.4Sicheres technisches Grobkonzept (Secure Technical Basic Design)500
    15.5Sicheres technisches Feinkonzept (Secure Technical Design)505
    15.6Sichere Entwicklung (Secure Development / Coding)508
    15.7 Sichere Integrations- und Systemtest (Secure Integration / System
    Tests)512
    15.8Sichere Freigabe (Secure Approval)513
    15.9Sichere Software-Evaluation (Secure Software Evaluation)513
    15.10Sichere Auslieferung (Secure Delivery)514
    15.11 Sicherer Abnahmetest und sichere Abnahme (Secure Acceptance Test
    and Secure Acceptance)514
    15.12Sichere Software-Verteilung (Secure Software Deployment)515
    15.13Sichere Inbetriebnahme (Secure Startup Procedure)516
    15.14Sicherer Betrieb (Secure Operation)516
    15.15Sichere Außerbetriebnahme (Secure Decommissioning)517
    15.16Hilfsmittel erweiterte Phasen-Ergebnistypen-Tabelle (ePET)518
    15.17Zusammenfassung519
    16Sicherheitsregelkreis522
    16.1Sicherheitsprüfungen523
    16.1.1Sicherheitsstudie/Risikoanalyse523
    16.1.2Penetrationstests526
    16.1.3IT Security Scans527
    16.2Sicherheitscontrolling528
    16.3Berichtswesen (Safety-Security-Continuity-Reporting)530
    16.3.1Anforderungen530
    16.3.2Inhalte532
    16.4Safety-Security-Continuity-Risk-Benchmarks541
    16.5Hilfsmittel IKT-Sicherheitsfragen542
    16.6Zusammenfassung542
    17Reifegradmodell des Sicherheits-, Kontinuitäts- und Risikomanagements544
    17.1Reifegradmodell RiSiKo-Management544
    17.1.1Stufe 0: unbekannt545
    17.1.2Stufe 1: begonnen545
    17.1.3Stufe 2: konzipiert545
    17.1.4Stufe 3: standardisiert546
    17.1.5Stufe 4: integriert546
    17.1.6Stufe 5: gesteuert546
    17.1.7Stufe 6: selbst lernend546
    17.2Checkliste Reifegrad550
    17.3Praxisbeispiel552
    17.4Zusammenfassung552
    18Sicherheitsmanagementprozess553
    18.1Deming- bzw. PDCA-Zyklus553
    18.2Planung554
    18.3Durchführung556
    18.4Prüfung556
    18.5Verbesserung556
    18.6Zusammenfassung557
    19Minimalistische Sicherheit560
    20Abbildungsverzeichnis562
    21Tabellenverzeichnis564
    22Verzeichnis der Checklisten565
    23Verzeichnis der Beispiele565
    24Markenverzeichnis567
    25Verzeichnis über Gesetze, Vorschriften, Standards, Normen, Practices569
    25.1Gesetze, Verordnungen und Richtlinien569
    25.1.1Deutschland: Gesetze und Verordnungen569
    25.1.2Österreich: Gesetze und Verordnungen570
    25.1.3Schweiz: Gesetze, Verordnungen und Rundschreiben570
    25.1.4Großbritannien: Gesetze571
    25.1.5Europa: Entscheidungen, Richtlinien, Practices571
    25.1.6USA: Gesetze, Practices und Prüfvorschriften572
    25.2Ausführungsbestimmungen, Grundsätze, Vorschriften573
    25.3Standards, Normen, Leitlinien und Rundschreiben574
    26Literatur- und Quellenverzeichnis594
    27Glossar und Abkürzungsverzeichnis599
    28Sachwortverzeichnis630
    29Über den Autor668

    Register

    3D-Face............................................424
    3D-RiSiKo-Pyramide........................19
    3D-Sicherheitspyr amide...................19
    4Vs............................................142, 219
    A
    AAA.........................................407,617
    ABAS................................................416
    Abfahrtskontrolle...................343, 369
    Abgabenordnung.............33, 306, 569
    Abgangskontrolle...................343, 369
    Abhören...........................................367
    ABIS..................................................416
    Abnahme
    - Handbuch..................................514
    - Prozess.......................................514
    Absendekontrolle...................343, 367
    Abstand............................................247
    Abwehrrechner...............................409
    Abweichungsanalyse.....................530
    AC.....................................................399
    Access Control List.........................599
    Accessmanagement........................356
    ACD..................................................290
    ACL..................................................599
    Actor Analysis
    - Functional..................................498
    - Technical....................................501
    Adware............................................628
    AEC..................................................625
    AES...................................................363
    AGG.........................................420, 569
    Agreement
    - Reciprocal..................................626
    - Service Level.............................619
    AICPA..............................................283
    AktG.................................................569
    Alarm...............................................599
    Alarmierung.............................344, 369
    Alert.................................................599
    ALG..................................................406
    Alignment......................................... 90
    - Business ICT...............................90
    - Business-Safety-Security...........90
    - Business-Safety-Security -
    Continuity-Risk........................90
    - Business-Security.......................90
    AMG.................................................569
    Änderungsmanagement................296
    Anforderungsarchitektur..............213
    Anforderungsprofil........................384
    Angriffssicherheit............134, 212, 251
    Anhängsel.......................................599
    Anomalie
    - Erkennung................................410
    - statistische................................. 410
    ANSI.................................................599
    Antrags- und
    Genehmigungsverfahren..........469
    Anwendungssicherheit
    - ISO/IEC 27034.............................75
    AO....................................................569
    API....................................................611
    Appliance.................................402, 599
    Application
    - Level Gateway..........................406
    - Response Measurement..........599
    - Security
    -- ISO/IEC 27034......................584
    - Vulnerability Description
    Language.................................114
    Architecture
    - Requirements............................213
    Architecture Pattern.......................493

    631
    Architektur
    - Anforderungen.........................213
    - Bedrohungen............................217
    - Management.............................373
    - Schadenspotenzial...................272
    - Schwachstellen.........................274
    - Sicherheitszone.........................238
    Architekturbeschreibung
    - ISO/IEC 42010, 2011................586
    Architekturmanagement
    - Richtlinie...................................480
    Archivierung
    - Konzept.....................................507
    - Strategie.....................................393
    ARM.................................................599
    ASIL.................................................117
    ASP...................................................281
    Assessment
    - IT Security.................................526
    Asset...................................................96
    - Intangible..................................123
    Asset Management - IAITAM's Best Practice Library ..................................................577
    Atomenergie
    -MISRA.......................................117
    - Programmierstandard.............117
    Attachment......................................599
    Attacke
    - Before-Zero-Day.......................415
    - Brute-Force................................600
    - Denial-of-Authentication........421
    - Replay........................................421
    - Zero-Day...................................415
    Auditing...................................375, 376
    Aufbewahrungsfrist.........................34
    Ausfall -Dauer..................................223, 453
    ~ maximal tolerierbare..........454
    -Kosten........................................314
    - Stromversorgung
    - SAIDI........................................4
    - Zeitraum
    - maximal tolerierbarer.........454
    Ausfallkosten....................................16
    Ausfallursachen................................16
    Auslagerung....................................332
    - Banken........................................282
    - Strategie.....................................335
    Auslöser...........................................599
    Außerbetriebnahme........................517
    Authentication on Device......421, 422
    Authentifizierung...........................599
    - Mehrfaktor.................................422
    - Zweifaktor.................................422
    Authentifizierungssystem
    - biometrisch................................416
    Authentisierung..............................599
    - Zweifaktor.................................350
    Authentisierung durch
    -Besitz..........................................350
    - Besitz und Merkmal.........350, 351
    - Merkmal.....................................350
    - Merkmal und Wissen.......350, 351
    - Verhalten....................................350
    - Wissen........................................350
    - Wissen und Besitz.............350, 351
    Authority..........................................106
    Automobilindustrie -MISRA........................................116
    -Safety..........................................116
    Autorisierung..................................599
    Availability......................................625
    - Environment Classification.....625
    AVDL........................................114, 590
    Awareness........................................387
    AWI...................................................609
    B
    Backup..............................................404
    Bahn
    -MISRA........................................117
    - Programmierstandard..............117
    Balanced Pyramid Scorecard®.......535
    Balanced Scorecard.........................534
    Band..................................................394
    - Bibliothek...................................403
    - Roboter.......................................395
    BankG...............................................570
    BankV...............................................570
    632
    Basel II..................................18,37,573
    Basel III........................................18, 37
    Bastion Host....................................409
    - entmilitarisierte Zone..............409
    -kaskadiert..................................409
    - Secure Server Network............409
    BCM..................................137, 305, 311
    - Datenbank.................................465
    - Framework................................317
    - holistic........................................309
    - ISO 22301...................................581
    -ISO 22313...................................581
    - OENORM S 2400 - S 2403.......592
    -ONR 49002-3.............................593
    - pyramid.....................................312
    - Pyramide...................................312
    - Rahmen werk.............................317
    BCP...................................................600
    BDSG..........................................36, 569
    Bedrohung...........................3, 213, 600
    - Architektur........................217, 274
    - Landkarte..................................215
    - Potenzialanalyse.......................274
    - potenzielle.................................217
    - prinzipiell..................................213
    -Profil...........................................216
    Before-Zero-Day-Attacke.............. 415
    Begleitprozess.................................253
    - Änderungsmanagement..........296
    - Architekturmanagement.........373
    - Compliance Management.......262
    - Datenschutzmanagement.......265
    - Ereignismanagement...............288
    - Finanzmanagement.................286
    - Innovationsmanagement........379
    - Kapazitätsmanagement...........302
    - Konfigurationsmanagement... 299
    - Konformitätsmanagement......262
    - Kontinuitätsmanagement 307, 308
    - Leistungsmanagement............280
    - Lizenzmanagement..................300
    - Performancemanagement.......302
    - Personalmanagement..............384
    - Problemmanagement...............294
    - Projektmanagement.................287
    - Qualitätsmanagement.............287
    - Releasemanagement................298
    - Risikomanagement..................269
    - Securitymanagement...............338
    - Service Level Management.....280
    - Überblick...................................259
    - Wartungsmanagement............304
    Begrenzungsrouter.........................409
    Beinahekrise....................................321
    Beinahenotfall.................................321
    BEL.....................................................90
    Benchmark - Safety-Security-Continuity-Risk ..................................................541
    BEntA.................................................90
    Benutzerdokumentation
    - ISO/IEC/IEEE 26511ff..............583
    Benutzer freundlichkeit..................384
    Benutzerkonto ................................471
    - gesperrtes..................................472
    - verwaist..............................357, 538
    Benutzerservice.......................257, 288
    Berechtigungskubus......................345
    Berechtigungs würfel......................345
    Berichtswesen
    - Anforderungen.........................530
    - IKT-Sicherheit...........................532
    - IT-Sicherheit..............................530
    - Safety, Security, Continuity.... 530
    Betrieb..............................................516
    - regulär.......................................318
    -Rückkehr...................................308
    Betriebseinflussanalyse..........189, 600
    Betriebsführungshandbuch..........507
    Betriebssicherheit............134, 212, 251
    Beweissicherung.............................369
    BGB..............................................31, 569
    BGV
    - C9...............................................177
    BIA.....................................137,186, 313
    bimodal
    - Biometrische Verfahren........... 423
    biométrie hacking...........................421
    Biometrie System............................416
    633
    Biometrie.........................................351
    - Fusion........................................423
    - ISO/IEC 19792, 2009.................580
    - Level..........................................423
    - Marktprognose.........................425
    Biometrische Verfahren
    - Akzeptanz.................................422
    - bimodal.....................................423
    - multialgorithmisch..................423
    - Multiinstance............................422
    - multimodal........................422, 423
    - Multirepresentation.................422
    - Multisample..............................422
    - multisensorisch........................423
    - multispektral............................423
    Biometrisches System....................416
    - Capture......................................419
    -Decide........................................419
    - Enrolment.................................419
    - Extract........................................419
    -Match.........................................419
    - Registrierung............................419
    - Template....................................419
    Blacklist............................................414
    - Model.........................................619
    Bluetooth
    -IT Security.................................590
    BMA..........................................326, 600
    BMIS...................................................86
    Böswillige Software.......................600
    Botnet...............................................600
    BPS...................................................535
    Brand
    - Datensicherung........................576
    - Meldeanlage......................326, 600
    Brute-Force-Attacke.......................600
    Brutto-Risiko...................................139
    BS A.....................................................90
    BSC...................................................534
    - prozessbasiert...........................535
    - pyramidenbasiert.....................535
    BSI................................................95, 601
    - Bausteinkatalog..........................52
    - IT-Sicherheitsprozess.................46
    - Sicherheitskonzeption...............47
    - Standard 100-1.....................45, 575
    - Standard 100-2.....................45, 575
    - Standard 100-3...............45, 48, 575
    - Standard 100-4...............45,48, 575
    BSSCRA..............................................90
    Buchführung
    - Mangel..........................................35
    - ordnungsmäßige.........................33
    Buffer Overflow..............372, 509, 510
    Bunch of Disks (BOD)
    - JBOD...........................................401
    - MBOD........................................401
    - SBOD..........................................401
    BuPROPSeLiA...................................90
    Business Continuity
    -ISO22301, 2012.........................581
    -ISO22313, 2012.........................581
    -ISO/IEC27031, 2011..................584
    - Joint Forum........................307, 575
    - Management 43,137, 305, 311, 468
    — ganzheitlich..........................309
    -- holistic...................................309
    - OENORM S 2400 - S 2403.......592
    -ONR 49002-3..............................593
    -Plan.............................................325
    - Planning - FFIEC.............................307, 572
    Business Enterprise Alignment.......90
    Business Enterprise Linkage............90
    Business Impact Analysis.....137,186, 313,618
    BuSSeCoRA........................................90
    BWG..................................................570
    BYOD................................................427
    C
    CAdES..............................................113
    CAP...........................................114, 590
    Capability...........................................98
    Capability Maturity Model - Systems Security Engineering...98
    CBCO................................................431
    CBO...................................................554
    CC......................................................575
    CCO..................................431, 554, 602
    634
    CCTV
    -DIN EN50132...........................576
    CD.....................................................609
    CD-ROM..........................................394
    CEM..................................................575
    CEO....................................................31
    CERT®..............................................602
    Certified in Risk and Information
    Systems Control™......................601
    Certified in the Governance of
    Enterprise IT®..............................601
    Certified Information Security
    Auditor®.......................................601
    Certified Information Security
    Manager®.....................................601
    CFO....................................................31
    CFR.....................................................43
    -21 CFR Part 11...........................572
    -21 CFR Part 211.........................572
    -21 CFR Part 58...........................572
    -21 CFR Part 820.........................572
    CGEIT®.............................................601
    cGLP
    -OECD.........................................592
    CGMP...............................................572
    Challenge.........................................616
    Challenge Handshake
    Authentication Protocol.............601
    Challenge-Response-Verfahren... 353, 601
    Change -History.......................................296
    - Management.............................296
    - Request......................................295
    CHAP.......................................601, 617
    Check-out-check-in-Prozedur.......297
    ChemG.......................................41, 569
    Chief Business Continuity Officer 431
    Chief Compliance Officer......431, 602
    Chief ICT Continuity Officer........431
    Chief ICT Security Officer.............431
    Chief ICT Service Continuity Officer .......................................................431
    Chief Risk Officer...................431, 602
    Chiffrât.............................................362
    Chiffrierung....................................362
    Chinese Wall.....................................39
    Chipkarte.........................................602
    Choreografie...................................104
    CI......................................................299
    CIA...................................................602
    CIA2..................................................602
    CICO................................................431
    CIFS..................................................401
    CIM..................................................403
    Circle of Trust.................................102
    Circuit Level Gateway...................406
    CISA®...............................................601
    CISCO..............................................431
    CISM®...............................................601
    CISO..........................................431, 554
    Clear Desk Policy...........................230
    Closed-Shop-Betrieb......................237
    Cloud Computing..........................376
    - Definition..................................590
    - NIST SP 800-144.......................590
    - NIST SP 800-145.......................590
    Cloud Services................................383
    Cluster
    -aktiv-aktiv.................................328
    - aktiv-passiv...............................328
    - Knoten.......................................328
    - Node..........................................328
    - Quorum.....................................329
    - split............................................329
    - Voting Algorithm.....................329
    Cluster-System................................328
    CMDB.......................................293, 500
    CMM®..............................................575
    CMMI®.............................................575
    COBIT®............................................575
    COBIT® 5...........................................86
    - Domänen.....................................88
    - Prozessdomänen........................87
    - Prozessmodell............................87
    - Reifegradmodell.........................97
    - Zielkaskade.................................87
    Code Injection.................................372
    Code of Federal Regulations...........43
    Code-Signierung............................113
    635
    Coding Standards...........................506
    COLD...............................................602
    Command Injection........................509
    Commodity.....................................357
    Common Alerting Protocol...........114
    Common Criteria...........................575
    Compliance..............262, 309, 574, 602
    - Beauftragter..............................431
    - Funktion......................................39
    - IKT......................................263, 610
    - IT.........................................263, 610
    - Management.............................262
    Computer Emergency Response Team......................................292, 602
    Computer Security Incident Response Team....292, 431, 516, 602
    Computerforensik..........................371
    ? Computervirenscanner..................415
    Computervirus...............................603
    Configuration Item..................299, 500
    Configuration Management.........577
    -Database....................................500
    Content Security System........413, 603
    Continuity................................212, 251
    - Engineering...............................126
    - Incident Response....................291
    - Management.............................307
    — Business................................137
    - Manager....................................498
    -Plan............................................317
    -Report........................................532
    Control.............................................612
    - Objective....................................613
    Controls
    - Compliance...............................264
    - Continuity.................................337
    - Maturity....................................550
    - Policy.........................................166
    COPPA.............................................572
    Copyleft...........................................301
    Corporate Governance
    - Versicherer................................571
    COSO...............................................572
    CP.....................................................317
    CR.....................................................295
    Cracker.............................................603
    CRISC™............................................601
    Criticality..........................................613
    CRO...................................431, 554, 602
    Cross Site Scripting.........407, 509, 603
    Cryptography..................................362
    CSIRT........................292, 431, 516, 602
    CSO...................................................554
    CSPP-OS...........................................575
    CSS....................................................603
    CTI.....................................................293
    Cybersecurity
    - ISO/IEC 27032, 2012....................73
    D
    DAC..................................................604
    Daktyloskopie..................................419
    DAS...................................................400
    Data
    - Leakage......................................379
    - Prevention....................378, 425
    -- Protection......................378, 425
    - Loss
    - Prevention....................378, 425
    - Protection......................378, 425
    Data Center
    - Best Practices.............................574
    -TIA 942.......................................574
    Data in Motion.................................379
    Data in Rest......................................379
    Data Striping....................................398
    Database
    - Firewall......................................408
    - Security Gateway......................408
    Datenabfluss....................................379
    Datendieb.........................................615
    Datendiebstahl................................378
    Datenlöschung
    -NIST SP 800-88..........................589
    Datenschutz
    - Beauftragter...............................431
    -ISO 22307,2008 .........................581
    -ISO/IEC29100, 2011..................585
    -ISO/IEC29101, 2013..................585
    - ISO/IEC 29190, CD....................585
    636
    - Management.............................265
    -- Rahmen werk.......................358
    - Verletzung
    — Kosten.....................................12
    Datensicherung...............................330
    - Archive......................................334
    - Aufbewahrung.........................460
    - Auslagerungs verfahren............335
    - Aussonderungsfrist..................460
    - Beispielskonzepte.......................95
    - Container...................................576
    - differenziell...............................331
    - Dokumentationsvorlage..........488
    - Generationen.............................333
    - Generationenprinzip................ 459
    - inkrementell..............................332
    - komplett....................................331
    - Konzept...............................34, 507
    - Medien.......................................460
    - Methoden..........................331, 332
    - Namenskonventionen.............459
    -Plan............................................460
    - Prozess.......................................252
    - Räume........................................576
    - Ressourcen................................252
    -Richtlinie ...................................459
    - Schränke....................................576
    - selektiv.......................................332
    - Sicherungszeitpunkt................333
    - Strategie.....................................393
    - Verantwortlichkeit...................252
    - Verfahren...................................460
    - zeitgleich....................................333
    - zeitnah.......................................333
    - zeitversetzt................................333
    Datenträger
    - Archiv........................................327
    -Kataster......................................460
    - Vernichtung......................367, 576
    — chemisch...............................367
    -- mechanisch..........................367
    — thermisch..............................367
    Datenverlust
    - maximal tolerierbarer..............454
    - Recovery Point Objective........454
    Datenvernichtung..........................367
    DDoS................................................626
    Dechiffrierung................................ 363
    Decision Level.................................423
    Deduplizierung.......................304, 404
    De-Gausser......................................367
    demilitarisierte Zone......................409
    Demilitarized Zone........................409
    Denial of Service.............................604
    Deny-All-Prinzip............................233
    DES...................................................363
    Design Pattern.........................493, 500
    Development and Acquisition
    - FFIEC.........................................572
    DHCP........................................484, 604
    Dienstleistungssicherheit
    - lebenszyklusimmanent...........158
    Digital evidence
    - ISO/IEC 27037,2012...................78
    Digital Rights Management..........603
    Digital Signature Services.............113
    digitale Signatur.............................113
    Digitales Rechtemanagement.......603
    Digitales Wasserzeichen................604
    DIN 16557-4....................................575
    DIN 16560-15 ..................................575
    DIN 25424........................................576
    DIN 40041........................................576
    DIN EN 12251.................................575
    DIN EN 50126.................................576
    DIN EN 50128.................................576
    DIN EN 50129.................................576
    DIN EN 50130 Beiblatt 1................576
    DIN EN 50131.................................576
    DIN EN 50132.................................576
    DIN EN 50133.................................576
    DIN EN 60812.................................576
    DIN EN 62040-3..............................576
    DIN EN 80001-1..............................576
    DIN EN ISO 9001.....................185, 575
    DIN ISO 10007................................575
    DIN ISO 9735-9...............................575
    Direct Attached Storage................400
    DIS....................................................609
    637
    Disaster Recovery.............................43
    -Plan............................................325
    Discretionary Access Control.......604
    Disk
    - Solid State..................................394
    Diskette............................................394
    Distanzanforderung.......................247
    Distanzprinzip................................247
    DLL Injection..................................372
    DLM.................................................604
    DLP...........................................378, 425
    - Systeme......................................425
    DLT..................................................397
    DMTF®.............................................403
    DMZ.................................................409
    DNS..................................................604
    Dokumentation
    - ISO/IEC/IEEE 26511ff..............583
    Dokumente
    - Lebenszyklusmanagement.....604
    - Management.............................384
    Domain..............................................98
    Domain Name Services.................604
    DoS...................................................604
    DPPA...............................................572
    DRM.................................................603
    Drucker
    - forensische Codes....................372
    Druckjob
    - Ausgabe.....................................381
    DS.....................................................399
    DSG.............................................36, 570
    DSG 2000....................................36, 570
    DSS............................................113, 590
    - Abstract Code-Signing Profile 590
    - Advanced Electronic Signature Profiles.....................................590
    - German Signature Law Profile591
    - J2ME Code Signing Profile.....591
    - XML Timestamping Profile.... 591
    DSS Electronic PostMark Profile.. 590
    DTDS.........................................247, 399
    DTDS+.......................................247, 399
    DVD.................................................394
    Dynamic Host Configuration
    Protocol.........................................604
    ebXML..............................578, 604, 624
    EDI....................................................605
    EDIFACT..................................575, 605
    EDXL-DE..........................................114
    EDXL-HAVE....................................115
    EDXL-RM.........................................115
    EEPROM..........................................394
    EER....................................................419
    EFF....................................................372
    EFTA...................................................42
    EHS.....................................................42
    EHSSCRMS......................................120
    EICAR...............................................604
    Eigenmittel
    - FINMA.......................................571
    Einbruchmeldeanlage.............342, 605
    Eindringling.....................................372
    Einmal-Passwort.............................352
    Ein-Schlüssel-Verfahr en.................363
    Eintritts Wahrscheinlichkeit............605
    Electronic Data Interchange..........605
    EM A..........................................342, 605
    -DIN EN 50131............................576
    Emergency Data Exchange Language ...............................................114, 591
    EN 1047............................................576
    Endpoint Security...................379, 425
    Engineering
    - Safety, Security, Continuity and
    Risk............................................126
    Enrolment.........................................419
    Entfernung.......................................247
    entmilitarisierte Zone.....................409
    Entscheidungen
    - Europa........................................571
    Entschlüsselung..............................363
    Entwicklungsstandard...................508
    Entwurfsregel..................................500
    Environment Analysis....................498
    ePass.................................................419
    ePerso................................................419
    638
    Equal Error Rate.............................419
    Ereignis
    - sicherheitsrelevant...................370
    Ereignismanagement.....................288
    Erhaltungssatz................................245
    Escrow-Agentur......................383, 514
    Etagenverteiler................................327
    eTAN................................................622
    eTAN plus........................................622
    Ethernet............................................401
    -Gigabit.......................................401
    Europa
    - Entscheidungen........................571
    - Richtlinien.................................571
    European Free Trade Association.. 42
    EuroSOX.............................................32
    Exploit..............................................605
    Fabrics..............................................401
    Failover............................................328
    FAIT 1.................................................34
    FAIT 2.................................................34
    FAIT 3.................................................34
    FAIT 4.................................................34
    Falsch negativ.................................605
    Falsch positiv..................................605
    Falschakzeptanzrate.......................418
    Falschrückweisungsrate................418
    False Acceptance Rate.... 351, 365, 418
    False negative..................................605
    False positive...................................605
    False Rejection Rate........351, 365, 418
    FAR...................................351, 365, 418
    FC......................................................606
    FC-AL...............................................401
    FCD...................................................609
    FCIP..................................................403
    FCM..................................................311
    FDA....................................................43
    FDIC
    - Managing Multiple Service
    Providers..................................572
    - Selecting a Service Provider.... 572
    FDIS..................................................609
    Feature Level...................................423
    Federal Data Protection Act............36
    Fehlerbaumanalyse........................576
    fehlertolerante Rechnersysteme... 329
    FERPA..............................................572
    Festkörpersensor............................420
    Festplatte.........................................394
    FFIEC
    - Business Continuity Planning307, 572
    - Development and Acquisition 572
    - Information Security................572
    - IT Risk Management................572
    - Operations.................................572
    - Outsourcing..............................572
    - Supervision of Technology
    Service Providers....................573
    Fibre Channel..................................606
    - Arbitrated Loop........................401
    FIDIS................................................358
    Financial Services
    -ISO 22307,2008.........................581
    Financial Transaction Services.....606
    Finanzbereich
    -MISRA.......................................117
    - Programmier standard.............117
    Finanzmanagement........................286
    Fingerabdruck.................................419
    - digital.........................................373
    - Sensor.................................380, 420
    -- drucksensitiv.......................420
    -- Festkörper............................420
    -- hochfrequent.......................420
    -- optisch..................................420
    -- thermisch.............................420
    -- Ultraschall nutzend............420
    Fingerabdrucknehmen..................606
    - aktiv...........................................606
    - passiv.........................................606
    Fingerprint
    - Scanner......................................420
    Fingerprinting.................................606
    FINMA
    - Eigenmittel................................571
    639
    FinTS.................................576, 606, 608
    - HBCI..........................................606
    -PIN/TAN...................................606
    Firewall............................................404
    -Appliance..................................409
    - Application Level Gateway.... 406
    - Bastion Host..............................409
    - Begrenzungsrouter..................409
    - Circuit Level Gateway.............406
    -Database....................................408
    -Dual-Home...............................409
    -Multi-Home..............................409
    -Paketfilter..................................405
    - Web Application......................406
    -XML...........................................407
    FIRST................................................606
    FISMA..............................................573
    Flächensensor.................................420
    Flash Drive......................................394
    Flash-EEPROM...............................394
    FMEA
    -DIN EN 60812...........................576
    FoIA..................................................571
    Food and Drug Administration.....43
    Forensic Watermarking.................372
    forensische Codes...........................372
    forensische Computeranalyse......371
    forensische Informatik...................371
    forensische Psychologie.................386
    forensische Wasserzeichen............372
    forensischer Informatiker..............372
    forensischer Sachverständiger...... 371
    FOSS.................................................301
    Foto, digitaler Fingerabdruck.......373
    Freie Software.................................301
    FRR....................................351, 365,418
    Funk-LAN.......................................606
    Funktionstrennung........................231
    G
    GAMP®.......................................41, 576
    GAMP® 5...........................................43
    - BCM.............................................43
    - Security Management................43
    GCE..................................................376
    GDPdU.............................................573
    Gebäude...........................................326
    GeBüV...............................................571
    Gefahrenmeldeanlage....................607
    Geldfälscher.....................................372
    Geld Wäscherei.................................571
    Generische Sicherheitskonzepte ...153
    GERM.................................41, 576, 617
    Geschäftsbücher Verordnung.........571
    Geschäftsdiskontinuität.................307
    Geschäftseinflussanalyse.......137,186
    Geschäftsfortführungsplan............454
    Geschäftskontinuität...............137, 453
    - Planung......................................453
    Geschäftskritikalität........................182
    Geschäftsunterbrechung................307
    - Notfallplan...................................37
    Gesetze
    - Deutschland...............................569
    - Großbritannien..........................571
    - Österreich...................................570
    - Schweiz......................................570
    - USA.............................................572
    Gesundheitswesen
    - EDXL-HAVE.............................115
    - ISO 18307, TR, 2001 ..................579
    - ISO 18308, 2011 .........................579
    -ISO20514, TR, 2005..................580
    -ISO21091, 2013.........................580
    -ISO21298, TS, 2008...................580
    - ISO 22221, TR, 2006..................580
    -ISO22600, TS.............................581
    - ISO 27789, 2013 .........................585
    - ISO 27799, 2008.........................585
    -TIA 1179.....................................574
    - XSPA...........................................III
    GLBA................................................573
    GLP.....................................................41
    - IT-Anforderungen......................42
    GMA.................................................607
    GmbHG............................................569
    GMP........................................41, 42, 43
    -PIC/S.............................................42
    Goß....................................................573
    GoBD ................................................573
    640
    GoBS.................................................573
    GoDV...............................................573
    GoS...................................................573
    Governance -IKT..............................................610
    - Information Security........124,177
    -ISO/IEC 38500...........................586
    -IT.................................................610
    - Principles...................................574
    GPG....................................................43
    Grenzszenarien........................172, 454
    Grid..................................................607
    - Computing................................376
    -- Environment........................376
    - OGFSM................................115, 376
    Grob- und Feintechnikzone..........237
    Großbritannien
    - Gesetze.......................................571
    Grundsätze - GDPdU........................33, 306, 573
    -GoB...............................33, 306, 573
    - GoBD..........................................573
    - GoBS.............................33, 306, 573
    -GoDV...................................33, 573
    - ordnungsmäßige Buchführung ...................................................573
    - sicherer Hafen...........................571
    Grundwerte der IS..........................137
    GSK
    -IT.................................................586
    GwG.........................................569, 571
    GwV-FINMA..................................571
    GxP...................................................256
    -PIC/S............................................43
    H
    Hacker..............................................608
    Haftung - Geschäftsführer..................31,161
    - Geschäftsleiter..........................161
    - Vorstand......................................31
    Handbuch
    - Abnahme...................................514
    - Generierung..............................514
    - Katastrophenvorsorge.............461
    - Krisenvorsorge.........................461
    - Notfallvorsorge........................461
    Handelsgesetzbuch...................33, 306
    Harvester.........................................608
    Hash-functions
    - ISO/IEC 10118...........................577
    Hash wert.........................................113
    Haus zur Sicherheit........................201
    Hazard and Operability Analysis 525
    HAZOP............................................525
    HBCI..........................................576, 608
    hBCM...............................................309
    Health Informatics
    - ISO 17090...................................579
    -ISO 18307, TR, 2001..................579
    -ISO 18308, 2011.........................579
    -ISO20514, TR, 2005..................580
    -ISO21091, 2013.........................580
    - ISO 21298, TS, 2008..................580
    -ISO22221, TR, 2006..................580
    -ISO22600, TS............................581
    HGB..................................................569
    HI......................................................432
    HIDS.................................................411
    Hinweispflicht...........................23, 313
    HIVI..................................................432
    Hoax.................................................605
    Home Banking Computer Interface ......................................................608
    honeyd............................................. 412
    Honeynet.........................................412
    Honeypot.........................................412
    - Sticky.........................................413
    Honeytoken.....................................413
    honeytrap........................................412
    Honey wall.......................................412
    Honignetz........................................412
    Honigtöpfchen................................412
    HoSSC..............................................201
    Host..................................................411
    Hot Fixes..........................................297
    hot pluggable..................................328
    Hot Space.........................................398
    Hot Spare.........................................398
    Hot Swap.........................................398
    641
    hot swappable.................................329
    House of Safety, Security arid
    Continuity...................................201
    HVAC................................................44
    IAM..................................................356
    ICS
    - Security......................................589
    - Stuxnet...........................................8
    ICT Security Officer.......................431
    ICTSCM...........................................142
    ICTSKRMS......................................554
    ICTSMS............................................554
    IDEA®...............................................363
    Identifikationssystem
    - biometrisch...............................416
    Identifizierung
    -Mehrfaktor................................422
    - Zweifaktor.................................422
    Identitätsmanagement............356, 381
    - föderiert..............................102, 356
    - Liberty Alliance.................102, 356
    Identitäts-Provider.........................102
    Identity
    - Life Cycle..................................356
    - Maintaining..............................356
    - Management.............................356
    ~ Federated.............................102
    -- ISO/IEC 24760......................582
    - Provider.....................................110
    - Provisioning..............................356
    - Terminating..............................356
    IdM...................................................356
    IDPS
    -ISO/IEC27039, DIS..................585
    - NIST SP 800-94 Rev 1, DRAFT 590
    IDS.............................................410, 411
    IDW.....................34,177, 263, 285, 609
    - PH 9.330.3.................................573
    - PS 330.........................................573
    -PS 525.........................................573
    - PS 880.........................................573
    -PS951..................................285, 573
    - PS 980.........................................573
    - RS FAIT 1...................................574
    -RS FAIT 2...................................574
    -RS FAIT 3...................................574
    -RS FAIT 4...................................574
    IEC.....................................................609
    IEC 62040-3......................................576
    IEEE 1012..........................................577
    IETF...................................................609
    iFCP...................................................403
    IKS.........................................32, 33, 276
    IKT....................................................608
    - Betrieb........................................516
    - Lebenszyklus.............................492
    - Schutzbedarfsanalyse...............189
    - Sicherheitsmanagement...........123
    - Sicherheitspolitik......................130
    - Systemsicherheit
    -- lebenszyklusimmanent........157
    IKTSKRMS.......................................554
    ILM....................................................608
    IMAC................................................281
    IMAP.................................................609
    IMAPs...............................................609
    Impact Analysis
    - Business......................................186
    - Operational................................189
    Impact Architecture
    - Business......................................272
    - Resource.....................................272
    In-Band-Virtualisierung.................402
    Incident - Detection, Security/Continuity291
    - Management -- ISO/IEC 27035, 2011 ......77, 584
    - Response....................................291
    indizierte TAN................................622
    Information Security
    - FFIEC..........................................572
    - Governance........................124,177
    - Incident Management..............516
    - Management
    - ISO/IEC 27010, 2012..............70
    -- ISO/IEC 27013, 2012..............71
    - ISO/IEC 27015, TR, 2012.......72
    642
    Informations- und
    Kommunikationssysteme
    -Vorgaben...................................327
    Informationslebenszyklus
    -Management..............................608
    Informationssicherheit
    - Managementsystem.................121
    Informationssicherheitspolitik
    - nach ISO/IEC 27001..................130
    - nach ISO/IEC 27002..................130
    -nach ISO/IEC 27003..................131
    Informationstechnologie
    - Anforderungen...........................40
    InfoSiG.............................................570
    InfoSiV.............................................570
    Infrastruktur....................................429
    -Gebäude.....................................326
    - Räumlichkeiten.........................327
    ingenieurmäßige Sicherheit..........125
    Injection
    -Code...........................................372
    - DLL............................................372
    Innovationsmanagement...............379
    Instanz..............................................136
    Intangible Asset..............................123
    Integrität..........................................625
    - persönliche................................386
    Integritätstest..................................386
    Interdependenz
    - Baum..........................................465
    - horizontal..................................432
    - Netz..............25, 316, 432, 433, 465
    -Plan............................................465
    -vertikal.......................................432
    International Engineering
    Consortium..................................609
    International Organization for
    Standardization...........................609
    Interne Revision
    - Versicherer................................ 571
    Internes Kontrollsystem.... 32, 33, 572, 573
    - Versicherer................................571
    Internet
    - iFCP............................................403
    - iSCSI...........................................403
    Internet Engineering Task Force.. 609
    Internet Message Access Protocol 609
    Internet Printing Protocol.............365
    Inter-Network communication
    - ISO/IEC 18028-3........................579
    Intruder............................................372
    Intrusion
    - Detection...................................411
    - Detection System......................410
    — hostbasiert............................411
    -- netzbasiert............................410
    - Prevention.................................411
    - Protection..................................411
    - Response...................................411
    - Signature...................................410
    Investmentgesellschaften
    - InvMaRisk...................................38
    - Notfallkonzept...........................39
    InvMaRisk..................................38, 574
    IP-Adresse....................................... 604
    IP-Masquerading............................610
    IPOCM.............................................177
    IPP....................................................365
    IPS.....................................................411
    IPsec.................................................610
    IP-Spoofing......................................610
    IP-Stack............................................606
    IRS....................................................411
    ISACA®..............................................86
    ISAE 3402.........................................284
    iSCSI.................................................403
    ISi-BPS..............................................522
    ISiPyr................................................610
    ISIRT.................................................516
    ISKRMS............................................554
    ISM
    branchenspezifisch....................... 59
    ISMS....................................45,121, 554
    -ISO/IEC 27001.............................61
    - ISO/IEC 27002.............................63
    ISMS-T.............................................583
    ISO.............................................431, 609
    ISO 10007, 2003...............................577
    ISO 15000, TS..................................578
    643
    ISO 15489.........................................617
    ISO 15489-1......................................579
    ISO 15489-2, TR...............................579
    ISO 16085, 2006...............................579
    ISO 17090.........................................579
    ISO 18307, TR, 2001........................579
    ISO 18308, 2011...............................579
    ISO 19092, 2008...............................580
    ISO 19770 ........................................... 55
    ISO 20514, TR, 2005........................580
    ISO 21091, 2013...............................580
    ISO 21298, TS..................................580
    ISO 22221, TR, 2006........................580
    ISO 22300, 2012...............................581
    ISO 22301, 2012...............................581
    ISO 22307, 2008...............................581
    ISO 22311, 2012...............................581
    ISO 22312, TR, 2011........................581
    ISO 22313, 2012...............................581
    ISO 22320, 2011...............................581
    ISO 22322, DIS................................581
    ISO 22324, DIS................................581
    ISO 22398, 2013...............................581
    ISO 22399, PAS...............................307
    ISO 22399, PAS, 2007.....................581
    ISO 22600, TS..................................581
    ISO 26262, 2011...............................582
    ISO 27789, 2013 ............................... 585
    ISO 27799, 2008...............................585
    ISO/IEC 10118.................................577
    ISO/IEC 12207, 2008.......................577
    ISO/IEC 13335................................. 185
    ISO/IEC 13569, 2005.......................577
    ISO/IEC 13888.................................577
    ISO/IEC 14516, 2002.......................577
    ISO/IEC 14763 ................................. 578
    ISO/IEC 14764, 2006 ....................... 578
    ISO/IEC 14888.................................578
    ISO/IEC 15026.................................578
    ISO/IEC 15408.................................578
    ISO/IEC 15443.................................578
    ISO/IEC 15446, TR, 2009................578
    ISO/IEC 15504.................................579
    ISO/IEC 15945, 2002.......................579
    ISO/IEC 15946.................................579
    ISO/IEC 18028..................................579
    ISO/IEC 18043, 2006........................579
    ISO/IEC 18045, 2008........................579
    ISO/IEC 19770..................................580
    ISO/IEC 19770-2...............................580
    ISO/IEC 19770-3, CD.......................580
    ISO/IEC 19770-5...............................580
    ISO/IEC 19770-7, AWI....................580
    ISO/IEC 19791, 2010........................580
    ISO/IEC 19792, 2009 ........................580
    ISO/IEC 20000 .................... 78,185, 580
    ISO/IEC 21000-5, 2004.....................580
    ISO/IEC 21827,2008........................580
    ISO/IEC 2382-8,1998.......................577
    ISO/IEC 24731-1, TR, 2007..............581
    ISO/IEC 24731-2, TR, 2010..............581
    ISO/IEC 24745, 2011........................581
    ISO/IEC 24748..................................581
    ISO/IEC 24759, 2008 ........................581
    ISO/IEC 24760-1, 2011.....................582
    ISO/IEC 24760-2, CD.......................582
    ISO/IEC 24760-3, WD......................582
    ISO/IEC 24761, 2009 ........................582
    ISO/IEC 24762, 2008........................582
    ISO/IEC 24763, TR, 2011.................582
    ISO/IEC 24764, 2010 ........................582
    ISO/IEC 24774, 2010 ........................582
    ISO/IEC 24775, 2011........................403
    ISO/IEC 25000,2005........................582
    ISO/IEC 25001, 2007........................582
    ISO/IEC 25020, 2007........................582
    ISO/IEC 25030, 2007........................582
    ISO/IEC 25040, 2011........................582
    ISO/IEC 25060,2010........................582
    ISO/IEC 26514,2008........................583
    ISO/IEC 26531, 2009........................583
    ISO/IEC 27000, 2012........................583
    ISO/IEC 27000-Familie.....................58
    ISO/IEC 27001, 2013..................61, 583
    ISO/IEC 27002, 2013..................63, 583
    ISO/IEC 27003, 2010..................66, 583
    ISO/IEC 27004, 2009..................67, 583
    ISO/IEC 27005, 2011..................68, 583
    ISO/IEC 27006, 2011........................583
    ISO/IEC 27007, 2011........................583
    644
    ISO/IEC 27008, TR, 2011 ................583
    ISO/IEC 27009, WD........................583
    ISO/IEC 27010, 2012 ....................... 583
    ISO/IEC 27011, 2008 ....................... 583
    ISO/IEC 27013,2012 ....................... 583
    ISO/IEC 27014, 2013 ....................... 583
    ISO/IEC 27015, 2012.......................584
    ISO/IEC 27016, PRF TR..................584
    ISO/IEC 27017, CD.........................584
    ISO/IEC 27018, DIS.........................584
    ISO/IEC 27031, 2011 .......................584
    ISO/IEC 27032,2012 ....................... 584
    ISO/IEC 27033 ........................... 74, 584
    ISO/IEC 27035, 2011 .......................584
    ISO/IEC 27036-1, FDIS...................584
    ISO/IEC 27036-2, DIS......................584
    ISO/IEC 27036-3, 2013....................584
    ISO/IEC 27036-4, WD.....................584
    ISO/IEC 27037,2012 ....................... 585
    ISO/IEC 27038, FDIS.......................585
    ISO/IEC 27039, DIS.........................585
    ISO/IEC 27040, CD.........................585
    ISO/IEC 27041, CD.........................585
    ISO/IEC 27042, CD.........................585
    ISO/IEC 27043, CD.........................585
    ISO/IEC 27044, WD........................585
    ISO/IEC 27050, WD........................585
    ISO/IEC 29100, 2011 .......................585
    ISO/IEC 29125, TR, 2010................585
    ISO/IEC 29190, CD.........................585
    ISO/IEC 29361,2008.......................585
    ISO/IEC 29362,2008.......................585
    ISO/IEC 29363,2008.......................585
    ISO/IEC 30127, WD TR..................585
    ISO/IEC TR 20004,2012 ................. 580
    ISO/IEC TR 24748-2, 2011..............581
    ISO/IEC TR 24748-3, 2011..............581
    ISO/IEC TR 27019, 2013.................584
    ISO/IEC/IEEE 26511, 2011..............583
    ISO/IEC/IEEE 26512, 2011..............583
    ISO/IEC/IEEE 26515, 2011..............583
    ISP.....................................................617
    ISPE....................................................43
    IT Compliance.................................610
    IT Governance................................610
    - Institute®............................124,177
    IT Network Security
    - ISO/IEC 18028...........................579
    - ISO/IEC 27033...........................584
    IT Risk Management
    - FFIEC.........................................572
    -ISO/IEC 27005,2011.................583
    IT Security
    - Assessment Framework..........100
    -Bluetooth...................................590
    - Cloud Computing....................590
    - Configuration Management... 590
    - Continuous Monitoring..........590
    - Engineering Principles............589
    - Evaluation
    -- ISO/IEC 18045......................579
    - Firewall Guidelines and Policy ..................................................589
    - Glossary.....................................589
    -ICS..............................................589
    - IDPS...........................................590
    - ISO/IEC 18043...........................579
    - Media Sanitization...................589
    - Mobile Devices.........................590
    - Mobile Devices, DRAFT..........590
    - Performance Measurement.....589
    - Product Selection Guide.........589
    - Risk Management....................589
    - Security Incident Handlung... 589
    - Security Testing........................590
    - Self-Assessment........................526
    - Server Security.........................590
    - Training Requirements............589
    - Visualization............................590
    - Web Services.............................590
    - WLAN Guidelines...................590
    IT Securitymanagement
    - A-Quintupel................................66
    - ISO 27789, 2013.........................585
    - ISO 27799, 2008.........................585
    - ISO/IEC 13888...........................577
    - ISO/IEC 14888...........................578
    - ISO/IEC 15443 ........................... 578
    - ISO/IEC 15446, TR, 2009..........578
    645
    - ISO/IEC 15946...........................579
    - ISO/IEC 27000, 2012.................583
    - ISO/IEC 27000-Familie..............58
    - ISO/IEC 27001, 2013............61, 583
    - ISO/IEC 27002, 2013............63, 583
    - ISO/IEC 27003, 2010............66, 583
    - ISO/IEC 27004, 2009............67, 583
    - ISO/IEC 27006,2011.................583
    - ISO/IEC 27007, 2011.................583
    - ISO/IEC 27008, TR, 2011..........583
    - ISO/IEC 27011, 2008.................583
    - ISO/IEC 27013, 2012.................583
    - ISO/IEC 27033-1, 2009..............584
    - IT-GSK.......................................586
    IT Service Continuity Management ......................................................321
    IT Service Lifecycle...................83, 261
    IT Service Management
    - COBIT®......................................575
    - ISO/IEC 20000-1, 2011..............580
    - ISO/IEC 20000-10, TR, 2013.....580
    - ISO/IEC 20000-11, PDTR.........580
    - ISO/IEC 20000-2, 2012..............580
    - ISO/IEC 20000-3, 2012..............580
    - ISO/IEC 20000-4, TR, 2010......580
    - ISO/IEC 20000-5, TR, 2010......580
    - ISO/IEC 20000-7, CD................580
    - ISO/IEC 90006, TR, 2013..........586
    - ITIL®...........................................586
    ITAF...................................................86
    iTAN................................................622
    IT-Betrieb.........................................516
    IT-Grundschutzhandbuch..............45
    IT-Grundschutzkataloge ..45,178, 586
    IT-GSHB............................................45
    IT-GSK........................................45, 586
    ITIL®..........................178,185, 261, 586
    - Service Design............................83
    - Service Improvement................83
    - Service Lifecycle..................83, 261
    - Service Operation.......................83
    - Service Strategy..........................83
    - Service Transition......................83
    - Version 3..............................83, 261
    ITKSiPyr..........................................610
    IT-Lebenszyklus..............................492
    ITSCM.......................................142, 311
    - Datenbank..................................465
    - Pyramid......................................312
    - Pyramide....................................312
    ITSEC................................................586
    IT-Services........................................261
    IT-Sicherheits-BPS...........................522
    IT-Sicherheitsprozess........................46
    ITU-T.................................................610
    J AAS..................................................611
    Java™ Authentication and
    Authorization Service.................611
    Java™ Cryptographic Extension....611
    Java™ Secure Socket Extension......611
    JBOD.................................................401
    JCE.....................................................611
    Joint Forum - Business Continuity..........307, 575
    - Outsourcing...............................575
    JSSE...................................................611
    K
    Kabelführungszone........................237
    KAGB................................................569
    kanonisch.........................................112
    Kapazitätsmanagement..................302
    Kapitalanlagegesellschaften
    - Notfallkonzept............................39
    Katastrophe......................................452
    - Vorsorgeplanung......................468
    Katastrophenvorsorge....................461
    - Handbuch..................................461
    KAVerOV.........................................570
    KDC..................................................355
    Kennzahl..................................280, 463
    Kerberos™................................355, 612
    Kernprozess.............................252, 254
    Key Distribution Center.................355
    Key Logger...............................368, 612
    Key Performance Indicator............535
    Klassen-Maßnahmen-Matrix.........207
    646
    KMM................................................207
    KMU...................................................IX
    - Sicherheitsmanagement............30
    Knoten..............................................328
    Knowledgeware..............................155
    Kommunales Netz..........................612
    Konfigurationscluster....................300
    Konfigurationsdatenbank.....300, 500
    Konfigurationselement..........299, 500
    Konfigurationsmanagement.........299
    -DIN ISO 10007..........................575
    Konfigurationsmanager.................500
    Konformität.....................................262
    Konformitätsmanagement............262
    Konsolidierung
    - Data ware...................................241
    - Hardware..................................241
    - Interface.....................................241
    - Knowledgeware.......................242
    - Middleware...............................241
    - Organisation.............................243
    - Or g ware.....................................242
    - Processware..............................241
    -Produkt......................................243
    - Prod ware...................................242
    -Prozess.......................................242
    - Schnittstellen.............................242
    - Service........................................243
    - Servware....................................242
    - Software.....................................241
    - Technologie...............................242
    - Wissen........................................242
    Kontinuität - Architektur -- unternehmensspezifisch.... 211
    - dienstleistungsimmanent........241
    - lebenszyklusimmanent............240
    - Management.............307, 308, 321
    - ISO 22301, 2012....................581
    - ISO 22313, 2012....................581
    - ISO 22399, PAS, 2007..........581
    - Prozess..................................320
    -- Pyramide..............................311
    - organisationsimmanent...........240
    - pervasiv.....................................241
    - Politik..........................151,162, 312
    - produktimmanent....................241
    - prozessimmanent.....................240
    - Pyramide...................................311
    - Regelkreis..................................320
    - ressourcenimmanent...............240
    - Strategie..............................218, 221
    - ubiquitär....................................241
    KonTraG...................................269, 570
    Kontrollaktivität.............................612
    Kontrolle
    - Abgang......................................267
    - Absende.....................................267
    - Auftrag......................................268
    -Eingabe......................................268
    - Empfänger.................................268
    - Lese............................................267
    -Quellen......................................268
    - Transport...................................267
    - Übertragung.............................267
    - Verfügbarkeit............................268
    - Wiederaufbereitung.................267
    - Zugang......................................267
    - Zugriff.......................................267
    - Zutritt........................................267
    - Zweck........................................268
    Kontrollelement..............................612
    Kontrollen
    - Konformitätsmanagement......264
    - Kontinuitätsmanagement.......337
    - Politik.........................................166
    - Reifegrad...................................550
    Kontrollziel......................................613
    Konversation...................................104
    Korrekturmaßnahmen...................530
    Kosten
    - Sicherheitsverletzungen............17
    Kosten-Nutzen-Aspekte................169
    KPI.............................................535, 538
    Krise.................................................451
    - Vorsorgeplanung.....................468
    Krisenmanager...............................463
    Krisenstab.................................431, 463
    Krisenvorsorge...............................461
    - Handbuch.................................461
    647
    Kritikalität.......................................613
    Kritikalitätsklasse...........................187
    KRITIS..............................................613
    Kryptografie....................................362
    - ISO/IEC 15946...........................579
    Krypto-Tool.....................................365
    KWG................................................570
    Lagebericht
    - Informationssicherheit..............14
    LAN..................................................613
    - virtuell.......................................238
    Landkarte
    - Bedrohung................................215
    Lastenheft........................................499
    LDAP...............................................613
    Least Privileges...............................234
    Lebenderkennung...................351, 421
    Lebenszyklus...........................150, 492
    - Prozesse
    - ISO/IEC 90003, 2004............586
    - ISO/IEC 90005, TR, 2008.....586
    lebenszyklusimmanent
    - Dienstleistungssicherheit........158
    - IKT-Systemsicherheit...............157
    - Produktsicherheit.....................158
    - Sicherheit...................................157
    Leerraumdetektion.........................625
    Leistungsmanagement..................280
    Leistungsvereinbarung.................. 280
    Leitlinie............................................133
    - Informationssicherheit............128
    Leitsatz.............................................168
    Level
    - Decision.....................................423
    - Feature.......................................423
    - Score...........................................423
    - Sensor........................................423
    Liberty Alliance..............................102
    Lightweight Directory Access
    Protocol........................................613
    Live-Analyse...................................372
    Lizenzmanagement........................300
    - Freie Software...........................301
    Local Area Network.......................613
    Logging............................369, 375, 376
    Logout
    - simultan.....................................110
    Lokales Netz....................................613
    Löschtools........................................366
    Löschverfahren
    -BSI...............................................366
    -DoD 5220.22-M..........................366
    -DoD 5220.22-M ECE.................366
    - Gutmann....................................366
    Löschvorgang..................................366
    Luftfahrt
    -MISRA........................................117
    - Programmierstandard..............117
    M
    MAC.................................................613
    MaComp.....................................39, 574
    MaluK...............................................574
    Makroviren......................................414
    Malware...................................415, 600
    MAN.................................................612
    Managed Objects.............................255
    Managed Services...........................383
    Management by
    - Objectives...................................387
    - walking around.........................387
    Managementdisziplin.....................253
    - Änderungen..............................296
    - Architektur................................373
    - Change.......................................296
    - Compliance................................262
    - Datenschutz...............................265
    - Ereignisse...................................288
    - Finanzen.....................................286
    - Innovation..................................379
    - Kapazität....................................302
    - Konfiguration............................299
    - Konformität...............................262
    - Kontinuität.........................307, 308
    - Leistungen.................................280
    - Lizenzen.....................................300
    - Performance..............................302
    - Personal......................................384
    648
    - Probleme....................................294
    - Projekte......................................287
    - Qualität......................................287
    - Release.......................................298
    - Risiko.........................................269
    -Security......................................338
    - Service Level.............................280
    -Überblick...................................259
    - Wartung.....................................304
    Managementsysteme.......................19
    Mandatory Access Control............613
    man-in-the-middle-Attacken........622
    MAO.........................................280, 454
    MaRisk.......................................37, 269
    - BA, Banken................................574
    - Investmentgesellschaften..........38
    -Notfallkonzept..........................306
    - Notfallplanungen.....................306
    - Notfalltests................................306
    - VA, Versicherungen...........40, 574
    - Notfallplanung......................40
    Maßnahmen-Klassen-Matrix........207
    Match on Device.....................421, 422
    Matching
    - One-To-Many............................416
    -One-To-One..............................417
    Maturity Model...............................544
    - COBIT®......................................101
    - ICT Safety, Security, Continuity
    and Risk...................................544
    - Safety, Security and Continuity
    Management............................544
    - Software Assurance...................99
    - Systems Security Engineering.. 98
    Maximal tolerierbare Ausfalldauer .......................................................454
    Maximalabstand.............................248
    Maximale Wiederanlaufzeit..........454
    Maximum Acceptable Outage.....280,
    454
    Maximum Tolerable Downtime... 454
    Maximum Tolerable Period of
    Disruption....................................454
    MBCO...............................................455
    MBOD..............................................401
    MDM................................................426
    Medium Access Control..................613
    Mehrfaktor authentifizierung........422
    Mehrfaktoridentifizierung............422
    Merkmal
    - physiologisch............................417
    Message Authentication Code......613
    Metropolitan Area Network.........612
    Mindestanforderungen
    - Compliance-Funktion................39
    - Risikomanagement....................38
    - Versicherungen..........................40
    Mindestgeschäftsbetrieb...13,188, 455
    Mindestszenarien............165,172, 455
    Minimalabstand..............................248
    Minimum Business Continuity
    Objective......................................455
    Minimum Privileges......................234
    Minimum Services Principle.........235
    mirroring
    - host based.................................454
    - storage based............................454
    Mirroring..................................398, 401
    MISRA.............................................116
    - AC GMG...................................589
    -C..........................................116, 510
    -C++..............................117,510, 589
    - C3...............................................589
    -SA...............................................117
    - Safety Analysis Guidelines.....117
    Mission Criticality..........................182
    MKM................................................207
    Mobile Device Management.........426
    Mobile Devices Security
    - NIST SP 800-124, Rev. 1...........590
    - NIST SP 800-164, DRAFT........590
    MOF.................................................403
    Momentaufnahme..........................525
    MTA..........................................280, 454
    mTAN..............................................622
    MTBF................................................455
    MTBSI..............................................455
    MTD.................................................454
    MTPD........................................280, 454
    MTTA...............................................455
    649
    MTTR...............................................455
    multialgorithmisch.........................423
    Multiinstance..................................422
    multimodal......................................422
    - Biometrische Verfahren...........423
    Multi-Provider-Management.......285
    Multirepresentation.......................422
    Multisample....................................422
    multisensorisch...............................423
    multispektral...................................423
    Mustererkennung...........................410
    N
    N+x-Redundanz.............................228
    Nacharbeit................................308, 454
    Nachvollziehbarkeit.......................236
    Namenskonvention........................300
    narrensicherer Mechanismus.......224
    NAS...........................................401, 404
    NAT..................................................614
    NEA...................................227, 326, 614
    Near Miss........................................321
    Need-to-know-Prinzip....................39
    nepenthes........................................412
    Nessus..............................................528
    Netto-Risiko....................................140
    Network Address Translation......614
    Network Attached Storage...........401
    network centric...............................401
    Netzersatzanlage.............227, 326, 614
    Netzidentität
    - föderierte...................................102
    Netzsegment............................237, 238
    Netzwerksicherheit
    - ISO/IEC 27033 ............................. 74
    NEWS 2011
    - DIN EN 80001-1 .......................576
    - GAMP® 5 GPG
    — GxP Process Control Systems ................................................44
    - IDW PS 980...............................573
    -ISO 14265, TS............................577
    - ISO 18308...................................579
    - ISO 22312, TR............................581
    - ISO 22320...................................581
    -ISO 26262-1...9..........................582
    - ISO/IEC 15026-2........................578
    - ISO/IEC 15026-3........................578
    - ISO/IEC 15504-10, TS................579
    - ISO/IEC 15504-9, TS..................579
    - ISO/IEC 20000-1........................580
    - ISO/IEC 24745............................ 581
    - ISO/IEC 24760-1........................582
    - ISO/IEC 24763............................582
    - ISO/IEC 24775............................582
    - ISO/IEC 25040............................582
    - ISO/IEC 27005......................68, 583
    - ISO/IEC 27006............................583
    - ISO/IEC 27008, TR....................583
    - ISO/IEC 27031............................584
    - ISO/IEC 27034-1........................584
    - ISO/IEC 27035............................584
    - ISO/IEC 29100............................585
    - ISO/IEC TR 24748-2 ..................581
    - ISO/IEC TR 24748-3 ..................581
    - ISO/IEC/IEEE 26511..................583
    - ISO/IEC/IEEE 26512..................583
    - ISO/IEC/IEEE 26515 .................. 583
    - ISO/IEC/IEEE 42010..................586
    - NISTIR 7298..............................589
    - NIST SP 800-125........................590
    - NIST SP 800-128........................590
    - NIST SP 800-137........................590
    -NIST SP 800-144........................590
    -NIST SP 800-145........................590
    -NIST SP 800-39..........................589
    -NIST SP 800-82..........................589
    - Rechenzentrum, Best Practices574
    - Risk Management Principles...574
    NEWS 2011- ISO/IEC 27007...........583
    NEWS 2012
    -15443-1........................................578
    -15443-2........................................578
    - Bankenaufsicht
    — Grundsätze.............................37
    -CEM............................................575
    - CIM.............................................403
    - COBIT® 5......................................86
    - Common Criteria......................131
    -DIN 66399-1...............................576
    650
    - DIN 66399-2..............................576
    - FFIEC, TSP................................573
    - GAMP® 5 GPG
    — GxP Compliance...................43
    — Test von GxP-Systemen.......44
    - IDW
    -RS FAIT 4...............................574
    -IEEE 1012...................................577
    -IEEE 802.11-2012.......................606
    -ISO 20004...................................580
    -ISO 22300...................................581
    -ISO 22301...................................581
    -ISO 22311...................................581
    -ISO 22313...................................581
    - ISO 26262-10..............................582
    - ISO/IEC 15026-4........................578
    - ISO/IEC 15504-5........................579
    - ISO/IEC 15504-8, TS.................579
    -ISO/IEC 19770-1........................580
    - ISO/IEC 20000-2........................580
    - ISO/IEC 20000-3........................580
    -ISO/IEC 27000...........................583
    -ISO/IEC 27010...........................583
    -ISO/IEC 27015 ........................... 584
    -ISO/IEC 27032 ........................... 584
    - ISO/IEC 27033-2........................584
    -ISO/IEC 27037...........................585
    •MaRisk.........................................37
    - MaRisk BA, Banken.................574
    ? MISRA C3..................................589
    ? NISTIR 7298 Rev 2, DRAFT... 589
    -NIST SP 800-121 Rev 1.............590
    • NIST SP 800-153........................590
    • NIST SP 800-164, DRAFT........590
    • NIST SP 800-30 Rev 1...............589
    • NIST SP 800-61 Rev 2...............589
    ? NIST SP 800-88, DRAFT..........589
    • NIST SP 800-94 Rev 1, DRAFT 590
    ? Sicherheitsstudie <kes>..............14
    •WSS
    -- Kerberos...............................591
    — REL........................................591
    — SAML....................................591
    ~ SOAP Message Security.....591
    — SwA.......................................591
    -- Username.............................591
    - X.509.....................................591
    - WS-SecurityPolicy.............108, 592
    - WS-Trust............................108, 592
    NEWS 2013
    - COSO, Internai Control...........572
    - DIN 66399-3..............................576
    - FISMA........................................573
    - GoBD.........................................573
    - IDW PS 951...............................285
    - ISO 17090-1...............................579
    -ISO 21091...................................580
    - ISO 22398...................................581
    - ISO 27789...................................585
    - ISO/IEC 15504-6........................579
    - ISO/IEC 19770-5........................ 580
    - ISO/IEC 20000-10......................580
    - ISO/IEC 24761...........................582
    -ISO/IEC27001......................61, 583
    - ISO/IEC 27002......................63, 583
    - ISO/IEC 27014 ........................... 583
    - ISO/IEC 27033-5........................ 584
    - ISO/IEC 27036-3........................ 584
    -ISO/IEC 29101...........................585
    - ISO/IEC 90006, TR....................586
    - ISO/IEC TR 20000-10.................81
    - ISO/IEC TR 27019.....................584
    - ISO/TR 31004............................586
    -KAGB.........................................569
    - KAVerOV..................................570
    - NIST SP 800-124 Rev 1.............590
    - NIST SP 800-161, DRAFT........590
    - NIST SP 800-53 Rev 4..............589
    - OASIS®
    — XACML................................592
    - PIC/S GMP..................................42
    - PIC/S PE 009-10........................572
    - TIA 942 ...................................... 574
    - XACML.....................................110
    NFS...................................................401
    NGN.................................................610
    NIDS.................................................410
    NIST.................................................614
    - Bluetooth Security....................590
    651
    - Cloud Computing
    - Definition.............................590
    -- Security................................590
    - Firewall Guidelines and Policy ..................................................589
    - ICS Security..............................589
    -IDPS...........................................590
    - Information Security
    - Handbook............................590
    - Terms....................................589
    - IS Risk Management................589
    - IT Security Engineering
    Principles.................................589
    - Media Sanitization...................589
    - Mobile Devices Security..........590
    - Risk Management....................589
    - Secure Web Services................590
    - Security
    -- Continuous Monitoring.....590
    - Control Assessment............589
    -- Controls................................589
    -- in Mobile Devices, DRAFT 590
    -- Incident Handling..............589
    - Performance Measurement 589
    -- Server....................................590
    - Testing..................................590
    - Training Requirements......589
    - Virtualization Technologies ..............................................590
    - WLAN..................................590
    - Security-Focused Configuration
    Management...........................590
    - Selecting IT Security Products 589
    - Smart Grid Cyber Security.....589
    - Supply Chain Risk Management
    Practices, DRAFT....................590
    NNIDS.............................................411
    Node.................................................328
    Notbetrieb........................306, 308, 455
    - Nacharbeit.................................308
    - Postvention...............................308
    -Rückkehr...................................308
    - Übergang............................308, 318
    Notfall..............................................451
    - Konzept
    - BaFin.......................................39
    ~ Investmentgesellschaften.....39
    ~ Kapitalanlagegesellschaften. 39
    - Planung........................................40
    -- Tool........................................466
    - Test................................................38
    - Vorsorge.....................................461
    - Handbuch.............................461
    - Vorsorgeplanung......................468
    Notfall-, Krisen- und
    Katastrophenvorsorge
    -Plan.............................................325
    Notfallplan.........................................37
    - Geschäftsunterbrechung............37
    Notfallvorsorge
    - Investitionen ..............................17
    NP.....................................................609
    O
    02M..................................................416
    020...................................................417
    OASIS®.....................................104, 614
    - AVDL.................................114, 590
    -CAP.....................................114, 590
    - Common Alerting Protocol.....590
    - Cross-Enterprise Security and
    Privacy Authorization............592
    - DSS......................................113, 590
    -- Abstract Code-Signing Profile ...............................................590
    -- AdES......................................590
    - EPM.......................................590
    -- German Signature Law Profile ...............................................591
    -- J2ME Code Signing Profile.591
    - XML Timestamping Profile591
    - EDXL-DE ...........................114, 591
    - EDXL-HAVE.....................115, 591
    - EDXL-RM...........................115, 591
    - RBAC..........................................618
    - SAML.........................................591
    - Security Assertion Markup
    Language..................................591
    - Service Oriented Architecture.591
    652
    - Service Provisioning Markup
    Language.................................591
    -SOA............................................591
    - SPML..........................................591
    -UDDI..........................................591
    - Web Services Security.............. 591
    -WSS
    -- Kerberos...............................591
    - REL........................................591
    -- S AML....................................591
    -- SOAP Message Security.....591
    - SwA.......................................591
    -- Username.............................591
    - X.509.....................................591
    - WS-SecureConversation..........591
    - WS-Trust....................................592
    - XACML..............................110, 592
    - XCBF..........................................592
    - XSPA
    -- Profile of S AML...................592
    - Profile of WS-Trust.............592
    -- Profile of XACML...............592
    OATH...............................................614
    Objektorientierung.........................224
    Objektschutz....................................342
    -äußerer.......................................342
    - innerer........................................342
    Occupational Health, Safety,
    Security, Continuity and Risk
    Management................................123
    OCTAVE®..................................96, 526
    OCTAVE® Allegro............................97
    OCTAVE®-S......................................96
    OENORM S 2400....................307, 592
    OENORM S 2401............................592
    OENORM S 2402............................592
    OENORM S 2403............................592
    OGFSM.......................................115, 376
    OGSA®.............................115, 376, 592
    - Basic Security Profile...............592
    - SAML.........................................592
    - Secure Addressing Profile, P-REC
    ...................................................592
    - Secure Communications Profile,
    P-REC.......................................592
    -WS-TRUST................................593
    - XACML.....................................593
    OIA............................................189, 600
    OLA...........................................280, 382
    OLTP................................................394
    One Time Password.......................352
    ONR 49002, 2010............................593
    Open Door Policy...........................387
    Open Grid ForumSM................115, 376
    OpenPGP.........................................614
    OpenVAS.........................................528
    Operational Impact Analysis.189, 600
    Operational Level Agreement.....280,
    382
    Operationelles Risiko -Banken.......................................571
    - Schweiz......................................571
    Operations
    - FFIEC.........................................572
    Opferlamm......................................409
    optischer Sensor.............................420
    Ordnungsmäßigkeit.......................134
    Organisation...................................155
    Organization for the Advancement
    oft Structured Information
    Standards.....................................614
    OSI Referenzmodell.......................614
    Osterreich
    - Gesetze......................................570
    - Verordnungen..........................570
    OTP..................................................352
    Out-of-Band-Virtualisierung........402
    Outsourcing....................................517
    - Banken.......................................571
    -FFIEC.........................................572
    - information security
    - ISO/IEC 27036......................584
    - Joint Forum...............................575
    OWASP............................................117
    Paketfilter........................................405
    - mit Zustandstabelle.................406
    PAP...................................................617
    Paperware.......................................299
    653
    Parameter Tampering....................407
    Party
    - Asserting...................................109
    - Relying......................................109
    PAS...................................................616
    Password
    - Cracking....................................352
    - Guessing....................................352
    - Social Hacking..........................352
    Passwort
    - Eigenschaften............................476
    - ermitteln....................................352
    - erraten........................................352
    - Gebote........................................ 475
    - probieren...................................352
    - Prüfung.....................................477
    -Regeln........................................475
    - Rücksetzung..............................424
    -Vielfalt.......................................354
    - zeitabhängig.............................353
    Patchmanagement..........................297
    PatG..................................................570
    Pattern
    - Architecture..............................493
    -Design........................................493
    pBSC.................................................535
    PCI DSS.......................................88, 593
    PCM.................................................311
    PDA.............................................12, 365
    PDCA-Zyklus................................. 554
    - ISO 19770.....................................56
    - ISO/IEC 20000-1 ......................... 79
    - ITIL®.............................................84
    - Kontinuitätsmanagement.......320
    - Qualitätsmanagement.............276
    - Risikomanagement..................276
    PDP...................................................110
    Penetrationstest...............................526
    - Black-Box-.................................526
    -Grey-Box-..................................526
    - ISO/IEC 30127, WD TR............585
    - White-Box-................................527
    PEP...................................................110
    Performancemanagement.............302
    Period of Disruption...............315, 454
    Personal............................................155
    - Beschaffung...............................385
    - Betreuung..................................387
    - Einarbeitung..............................386
    - Management..............................384
    -Planung......................................385
    - Prozess...............................384, 385
    - Recruiting..................................385
    - Trennung...................................389
    - Weiterentwicklung...................387
    Personal Identification Number....350
    Perspektive
    - finanziell....................................535
    - Kunden.......................................535
    - Lernen und Entwicklung.........541
    - Prozesse......................................538
    pervasiv
    - RiSiKo-Management................241
    pervasive
    - Continuity..................................241
    -Safety..........................................241
    - Security......................................241
    Pfadanalyse......................................232
    PfandBG...........................................570
    PGP...................................................614
    PH 9.330.1...........................................34
    PH 9.330.2...........................................34
    Pharming..........................................615
    Phasen-Ergebnis typen-Tabelle......518
    Phishing............................................615
    photoTAN........................................622
    PIC.......................................................42
    PIC/S...................................................42
    -PE 009-10....................................572
    -PI 011-3.......................................572
    PIN............................................350, 615
    PIP.....................................................110
    Pit......................................................394
    pixel per inch...................................424
    PKI.....................................................616
    PKIX..................................................616
    Plan-Ist-Vergleich............................530
    Planungshorizont......................13,165
    Plattenspiegelung...........................398
    Plausibilitätsprüfung......................225
    654
    PMBOK®............................................87
    Poka-Yoke........................................224
    Policy
    - Decision Point...........................110
    - Enforcement Point....................110
    - Information Point.....................110
    Politik...............................................133
    POP...................................................615
    POP3.................................................615
    POP3s...............................................615
    Portscanning...................................410
    Post Office Protocol........................615
    Postmarking....................................114
    Post-Mortem-Analyse....................371
    Postvention......................................308
    Power Supply
    - Uninterruptable........................624
    ppi.....................................................424
    PPP...................................................616
    -CHAP.........................................616
    Practices
    -USA............................................572
    Präventivmaßnahme......................324
    PRF...................................................609
    Primärspeicher........................393, 397
    PRIME..............................................358
    Prinzip
    - Abstraktion...............................222
    - Abwesenheitssperre.................230
    - Aktiv-Passiv-Differenzierung. 248
    - aufgeräumter Arbeitsplatz......230
    - Ausschließlichkeit.................... 234
    - Clear Screen Policy...................230
    - deny all......................................233
    - Funktionstrennung..................231
    - generelles Verbot......................233
    - grundsätzliches Verbot............233
    - Klassenbildung.........................223
    - Konsistenz.................................245
    - Konsolidierung.........................241
    - minimale Dienste.....................235
    - minimale Nutzung...................235
    - minimale Rechte.......................234
    - minimaler Bedarf......................234
    - Namenskonvention..................226
    - Need-to-Know..........................234
    - Need-to-Use..............................234
    - Plausibilisierung......................244
    - Poka-Yoke................................. 224
    - Redundanz................................226
    - Sicherheitsschalen....................232
    - Standardisierung......................244
    - Subjekt-Objekt-Differenzierung ..................................................248
    - Vererbung.................................248
    - Vier-Augen-..............................231
    - Wirtschaftlichkeit.....................222
    Privacy
    -ISO 22307,2008.........................581
    - ISO/IEC 29100, 2011.................585
    - ISO/IEC 29101.2013.................585
    -ISO/IEC 29190, CD...................585
    Privacy Act........................................36
    Privacy Protection Act
    -Children (COPPA).....................36
    Privileges.........................................234
    Problemmanagement.....................294
    Processware....................................299
    PROCom..........................................311
    ProdHaftG.......................................570
    Produkt
    - Evaluation.................................466
    Produktsicherheit
    - lebenszyklusimmanent...........158
    Programmierfehler
    -Folgen........................................508
    Programmierrichtlinie -C..........................................116,117
    -C++.............................................117
    -Java.............................................117
    - sicherheitskritische Systeme... 510
    - Webanwendung.......................117
    Programmierstandards..................506
    Programmierung
    - sichere Webanwendung..........117
    Programm viren..............................414
    Projektmanagement.......................287
    PROKom..........................................311
    Promiscuous Mode........................411
    PROMSim........................................150
    655
    PROProm.........................................616
    PROQuam.......................................616
    PRORim............................270, 276, 616
    PROSem...........................................616
    PROSim....................150,155, 211, 616
    PROSom...........................................616
    PROTem...........................................616
    Protocol Stack.................................613
    Protokollauswertung..............344, 370
    Protokollierung........................344, 369
    Protokoll-Stack
    -TCP/IP........................................623
    Protokollstapel................................613
    ProTOPSi..................................150, 616
    Provider
    - Managing, FDIC.......................572
    - Selecting, FDIC.........................572
    Provider-Management...........280, 285
    -Multi-.........................................285
    Proxy................................................406
    - Reverse......................................406
    Prozess......................................155, 432
    - Architektur.........................183, 254
    - IKT-Betriebs-.............................255
    -Kern-..........................................254
    - Landschaft.................................183
    - Support-....................................254
    - Unterstützungs-.......................254
    prozessimmanent
    - Sicherheit...................................157
    PRP-Maßnahmen...........................308
    Prüfvorschriften
    - USA............................................572
    PS 330.................................................34
    PS 850.................................................34
    PS 880.................................................34
    Psychologie
    - forensisch..................................386
    Public Available Specification......616
    Public Key Infrastructure..............616
    Public-Key-Verfahren.....................364
    Pufferüberlauf.................................510
    Pyramide
    - Arbeitsschutz..............................19
    - Arbeitssicherheit........................19
    -Architektur...........................19, 373
    -BCM......................................19, 312
    -IKT................................................19
    - IKT-Governance..........................19
    -ISM................................................19
    -IT...................................................19
    - ITK................................................19
    - ITSCM........................................312
    - IT-Sicherheit.................................19
    -Kontinuität...........................19, 312
    - Management................................19
    -Modell.....................................19, 22
    - Projekt...........................................19
    -Qualität.........................................19
    -Risiko............................................19
    -RiSiKo...................................19,172
    - Service...........................................19
    - Sicherheit......................................19
    - Sourcing................................19, 283
    - Sozialschutz.................................19
    -Test................................................19
    - Umweltschutz.............................19
    - Unternehmen...............................19
    - Unternehmenssicherheit.............19
    Pyramidenmodell®......................19, 22
    - Arbeitsschutzpyramide ..............19
    - Arbeitssicherheitspyramide.......19
    - Architekturmanagement.........373
    - BCM-Pyramide............................19
    - ISM-Pyramide..............................19
    - Kontinuitätspyramide.................19
    - Managementsystem.................373
    - Projektpyramide..........................19
    - Qualitätspyramide......................19
    - Risikopyramide...........................19
    - RiSiKo-Pyramide.........................19
    - Servicepyramide..........................19
    - Sicherheitspyramide...................19
    - Sourcingpyramide.......................19
    - Testpyramide...............................19
    - Umweltschutzpyramide.............19
    - Unternehmenspyramide.............19
    - USM-Pyramide............................19
    656
    Q
    QR-TAN...........................................622
    Qualifikationsarchitektur..............430
    Qualifikationsprofil........................ 430
    Qualitätsmanagement....................287
    Quorum...........................................329
    R
    RADIUS...........................................617
    RAID................................................397
    -ED AP.........................................399
    - fehlerresistent...........................399
    - fehlertolerant.............................399
    - katastrophentolerant................399
    - Level...........................................398
    - Neue Kriterien..........................399
    RAM.........................................394, 617
    Räumlichkeiten...............................327
    RBAC................................................618
    RC5®.................................................363
    Rechenzentrum...............................327
    - Best Practices.............................574
    -ISO/IEC 24764...........................582
    -TIA 942.......................................574
    - Verfügbarkeit............................459
    Rechteverwaltung..........................341
    Records Management....................617
    Recovery..........................318, 456, 463
    - Disaster........................................43
    -Plan............................................325
    - Point Objective..........188, 281, 454
    - Time Objective..........................454
    Redundancy....................................226
    Redundant Array of
    - Independent Disks...................397
    - Inexpensive Disks....................397
    Redundanz......................................226
    - aktive..........................................229
    - Geschwindigkeit...............228, 229
    -heiße...........................................229
    -kalte............................................229
    - Latenz........................................228
    -N+x.............................................228
    - passive .......................................229
    - Qualität......................................229
    - Quantität...................................227
    - semiaktiv...................................229
    - strukturell.................................227
    - vollständig................................227
    - warme........................................229
    Redundanzgrad..............................227
    Regeneration...................................308
    Registrierung..................................419
    Registry............................................104
    Reifegrad
    - RiSiKo-Management................550
    Reifegradmodell.............................544
    - COBIT®......................................101
    - Kontrollen.................................550
    - nach Dr.-Ing. Müller................544
    - Software Assurance...................99
    - Systems Security Engineering.. 98
    Relay................................................367
    Releasemanagement......................298
    Reliability........................................629
    remote
    - lock.............................................426
    - wipe...........................................426
    Remote Access
    - ISO/IEC 18028-4........................579
    Remote Code Injection...................372
    Replay..............................................483
    Replay-Attacke...............................107
    Report
    - Safety-Security-Continuity.....532
    Reporting - Safety, Security, Continuity.... 530
    Repository.......................................104
    Requirements Architecture...........213
    Resilience.........................................617
    Ressource.........................................155
    Restauration....................................456
    Restore.............................................404
    Return on Safety, Security and
    Continuity Investment...............618
    Return on Security Investment.....618
    Reverse Proxy.................................406
    Revision...........................................157
    657
    Richtlinie..........................................133
    - Architekturmanagement.........480
    - Benutzerkennung.....................474
    - Berichtswesen
    Kontinuitätsmanagement......468
    - Computerviren-Schutz............477
    - Datensicherung........................459
    - E-Mail-Nutzung.......................444
    - Internet-Nutzung.....................446
    - Kapazitätsmanagement...........449
    - Leseschutz.................................479
    - mobile Geräte...........................426
    - Passwort....................................475
    - Protokollierung........................479
    - Räumlichkeiten........................456
    - WLAN................................473, 483
    - Zugriffsschutz..........................477
    - Zutrittskontrollsystem............482
    Richtlinien
    - Europa.......................................571
    - Schweiz......................................570
    Risiko
    - Adressenausfall........................280
    - Aggregation..............................276
    - Analyse...................69, 96, 276, 618
    - Annahme.....................................69
    - Architektur................................274
    -- Brutto....................................274
    - Behandlung.................................69
    - Bewertung...................................69
    - brutto.........................................139
    - Controlling................................276
    - Definition..................................139
    - Diversifikation..........................275
    - Dreiklang...................................140
    - Evaluierung................................69
    - finanziell....................................279
    - Forschung.................................279
    - Früherkennung..................268, 277
    - Frühwarnung.....................268, 277
    - Grenzwert..................................172
    - Identifikation............................274
    - Identifizierung............................69
    - Inventar.....................................274
    - Inventur..............................141, 274
    - Justierung...................................276
    - Kategorie............................272, 273
    - Kommunikation........................277
    - lebenszyklusimmanent.......278
    - Kriterien.......................................69
    - Lagerung....................................279
    - Landkarte....................................172
    - Liquidität...................................280
    - Management......142, 268, 269, 577
    - Audit.....................................276
    - InvMaRisk..............................38
    - ISO/IEC 27005, 2011 ......68, 583
    - MaRisk VA, Versicherungen^
    - MaRisk, Banken.....................37
    - NIST 800-30 Rev 1...............589
    - Prozess..................................276
    -- Sensibilisierung....................277
    -- Versicherer...........................571
    -- Versicherungen......................40
    -- V-Quadrupel........................142
    - Managementpyramide.............270
    -Matrix.........................................278
    - Monitoring.................................276
    -netto............................................140
    - Non-Compliance.......................280
    - Personal......................................279
    -Politik.................151,162, 269, 270
    -Portfolio..............................172, 435
    - Produkt......................................279
    - Produktion.................................279
    - Projekt........................................279
    - Prozess.......................................279
    - Pyramide....................................270
    -Recht...........................................280
    - Reporting...................................276
    - Strategie.....................218, 219, 271
    - Streuung.....................................275
    -Tragfähigkeit.....................268, 271
    - Transport...................................279
    -. Management
    -- Handbuch.............................277
    RiSiKo...............................................142
    - Analyse.......................................523
    - Anforderungen.........................551
    - Architektur................................551
    658
    - Controls.....................................550
    - Klasse.................................164,187
    - Klassen.......................................554
    - Management.................................2
    ~ pervasiv................................241
    -- Reifegrad..............................550
    - Status....................................522
    - ubiquitär...............................241
    - Managementprozess................554
    - Managementsystem.................554
    - Niveau...............................169, 525
    - Politik.................161,162,170, 554
    - Pyramide...................................172
    - Reporting...................................516
    Risikomanagement
    -IEC 31010...................................586
    -ISO31004, TR, 2013..................586
    -ISO/IEC 31000, 2009.................586
    - ONR 49002................................593
    - V-Quadrupel.............................219
    Risk...................................................139
    - Acceptance..................................69
    - Analysis.......................................69
    - Architecture..............................274
    - Assessment..................................69
    - Asset Liability Mismatch.........279
    - Engineering...............................126
    - Evaluation...................................69
    - Identification...............................69
    - Inventory...................................274
    - Management............................. 268
    - ISO 16085, 2006....................579
    -- Principles..............................574
    -- Quality....................................43
    -Map.............................................172
    - Risk Assessment Guide...........589
    -Strategy......................................219
    - Treatment....................................69
    Risk IT................................................86
    Role Based Access Control............618
    Rolle
    - Datenbankadministrator.........472
    - Netzadministrator....................472
    - technischer Benutzer................472
    RoSI..................................................618
    RoSSCI.............................................618
    RPO...................................188, 281, 454
    RSA...................................................364
    RTO..................................................454
    S
    Sacrificial Host................................409
    Safety.........................................212, 251
    - Automobilindustrie.................116
    - Criteria.......................................136
    - Engineering............................... 126
    - Integrity Level..........................116
    -Report........................................532
    Safety Critical System....................116
    Safety, Security and Continuity
    - Function Deployment..............202
    - Management Maturity Model 544
    Safety, Security, Continuity and Risk Management Maturity Model.. 544
    Safety-Security-Continuity-Risk
    - Audit..........................................158
    - Benchmark................................541
    - Reporting..................................516
    SAIDI...................................................4
    SAINT..............................................528
    SAML........................109,116, 591, 592
    - Authority...................................109
    SAN..................................................401
    -Fibre-Channel...........................401
    Sanktion...........................................443
    Sarbanes-Oxley Act..........................31
    SAS...................................................619
    SAS 70..............................................283
    SATAN............................................528
    SBOD................................................401
    SCADA
    - Stuxnet...........................................8
    Scanner............................................528
    - Fingerprint................................420
    Schadenspotenzial
    - Architektur................................272
    - Klasse.........................................272
    Schadensszenarien
    - Tabelle........................................191
    Schadsoftware.................................600
    659
    Schalenmodell.................................232
    Scheduling.......................................255
    Schlüssel
    - öffentlicher................................364
    - privater......................................364
    Schredder........................................367
    Schutzbedarfsanalyse.....137,186, 618
    - IKT............................................. 189
    - IKT, Beispiel..............................193
    - Prozesse, Beispiel.....................193
    Schutzbedarfsklassen..............182,198
    Schutzeinrichtung..........................135
    Schutzgeld.......................................600
    Schutzobjekt....................................135
    - Klasse.........................................135
    Schutzsubjekt..................................135
    - Klasse.........................................135
    Schwachstelle..................................618
    Schwachstellen
    - Architektur................................274
    - Potenzialanalyse.......................274
    schwarze Liste................................619
    Schweiz
    - Gesetze......................................570
    - Outsourcing.............................. 571
    - Richtlinien.................................570
    - Verordnungen..........................570
    Score Level......................................423
    SCSI..................................................620
    SecPAL.............................................376
    Secure Coding Standard................509
    Secure Socket Layer.......................618
    Security.....................................212, 251
    - Appliance..................................416
    - Assessment
    -- ISO/IEC 19791, 2010............580
    - Control Assessment.................589
    -Controls.....................................589
    - Criteria.......................................136
    - Engineering..........................98,126
    - Framework
    - W3C®....................................Ill
    - Gateway....................................404
    - Database...............................408
    - Incident Response.................... 291
    - Management........................43, 338
    - Manager.....................................498
    - Model.........................................619
    - Profile
    -- Basic.......................................592
    - Report.........................................532
    - Scanner
    - Nessus...................................528
    - OpenVAS..............................528
    - SAINT...................................528
    - SATAN..................................528
    - Storage........................................585
    -Token..........................................106
    Security Incident.............................516
    Segregation of Duties.....................231
    Sekundärspeicher....................393, 395
    Self Service...............................357,424
    Sensibilisierung.......................387, 618
    Sensor
    - Festkörper..................................420
    - Fingerabdruck...........................420
    - drucksensitiv........................420
    - hochfrequent........................420
    -- optisch...................................420
    -- thermisch..............................420
    -- Ultraschall nutzend.............420
    - Flächen-......................................420
    -Level...........................................423
    -optisch........................................420
    -Streifen-......................................420
    Serial Attached SCSI.......................619
    Server Security
    -NIST SP 800-123........................590
    Serverraum......................................327
    Service
    - Catalogue...................................280
    - Delivery........................................82
    - Design...........................................83
    -Desk....................................257,288
    - Geber..........................................326
    - Improvement...............................83
    - Level
    - Agreement............280, 326, 619
    - Management........................280
    -- Requirement.........................280
    660
    — Vereinbarung.......................619
    - Lifecycle...............................83, 261
    - Operation .................................... 83
    - Parameter..................................280
    -Provider.............................102,116
    -- Managing, FDIC..................572
    -- Selecting, FDIC....................572
    -Request......................................288
    - Requestor................................... 116
    - Strategy........................................83
    - Support........................................82
    - Ticket..........................................355
    - Transition....................................83
    Service Oriented Architecture.....103,
    242, 375
    SGB...................................................570
    SGB IV..............................................570
    SGB VII.............................................570
    SGB X...............................................570
    SGML...............................................614
    sicherer Hafen.................................571
    Sicherheit
    - dienstleistungsimmanent........241
    - ingenieurmäßig........................125
    - Kontrollelemente......................589
    - lebenszyklusimmanent... 156,157, 240, 325
    - leistungsimmanent...................325
    - organisationsimmanent...........240
    - pervasiv.....................................241
    - produktimmanent............241, 325
    - prozessimmanent.....157, 240, 325
    - ressourcenimmanent.......240, 325
    - ubiquitär....................................241
    Sicherheits-, Kontinuitäts- und
    Risikomanagementprozess.......553
    Sicherheitsanalyse..........................523
    Sicherheitsanforderungen.............151
    - prinzipielle................................213
    - Transformation.........................202
    Sicherheitsarchitektur....................153
    - unternehmensspezifisch..........211
    Sicherheitsauditor...........................158
    Sicherheitsbewusstsein..................387
    Sicherheitscontrolling....................528
    Sicherheitsdreiklang......................138
    Sicherheitselement.........................251
    Sicherheitselemente
    - Kategorien.................................211
    Sicherheits-Gateway......................404
    Sicherheitshandbuch
    - Österreich..................................619
    Sicherheitsklasse......................187, 359
    Sicherheitskonzept.........................619
    - generisch...................................153
    - spezifisch............................154, 487
    Sicherheitskriterien.................136,186
    - Grundwerte der IS...................137
    - primär........................................213
    - sekundär.................................... 213
    Sicherheitsleitlinie..........................128
    Sicherheitsmanagement................123
    - Prozess.......................................553
    Sicherheitsmanagementpyramide 147
    Sicherheitsmaßnahme.....155, 490, 619
    Sicherheitsmerkmal
    - Abbildung.................................205
    Sicherheitsmodell...........................619
    - negativ.......................................414
    Sicherheitsniveau............153, 525, 619
    Sicherheitsphilosophie...................619
    Sicherheitspolitik.............128,151,162
    - IKT, Unternehmens weit..........130
    - IKT-System...............................130
    - Leitsatz...............................164,168
    - nach Common Criteria (s. a.
    ISO/IEC 15408)........................ 131
    -nach ISO/IEC 13335 .................129
    -nach ISO/IEC 27001 .................130
    -nach ISO/IEC 27002.................130
    -nach ISO/IEC 27003................. 131
    - nach ITSEC................................131
    - nach ITSEC, firmenspezifisch. 131
    - nach ITSEC, systembezogen... 131
    - nach ITSEC, technisch.............131
    - nach Sicherheitspyramide......132
    - Unternehmens weit...................130
    Sicherheitsprinzipien.....................218
    Sicherheitsprozess..........................553
    661
    Sicherheitspyramide..........V, 126,147
    - dreidimensional...........................V
    Sicherheitsregelkreis...............158, 528
    Sicherheitsrichtlinien.....................153
    Sicherheitsschalen..........................232
    Sicherheitsschalenmodell..............339
    Sicherheitsschirm...........................339
    Sicherheitsstandards......................153
    Sicherheitsstrategie.........218, 221, 619
    Sicherheitsstudie............................523
    - <kes>............................................14
    Sicherheitsstufe...............................224
    Sicherheitsziele................151,188, 620
    Sicherheitszone................237, 245, 359
    - Anwendung..............................238
    - architekturell............................238
    - Closed Shop..............................237
    - Grob- und Feintechnik............237
    - Kabelführung...........................237
    - logisch........................................237
    - Netz............................................238
    - räumlich....................................237
    - Speicherbereich........................238
    - zeitlich................................237, 239
    - Zutritt........................................237
    SIEM
    - ISO/IEC 27044, WD..................585
    SigG...........................................113, 570
    Signatur
    - digital.........................................113
    SigV...........................................113, 570
    SIL.....................................................116
    Silhouettenerkennung....................625
    Simple Mail Transfer Protocol......620
    Single Logout..................................110
    Single Point of - Contact...............................257, 288
    - Failure.........................227, 308, 620
    - Security Administration..........628
    - Security Control and Administration................349, 628
    Single Sign-on..................354, 381, 620
    -Föderiert.............................102, 356
    - Kerberos™.................................355
    - Passwort-Synchronisation......354
    - Ticket-basiert.............................355
    Single-Author-Konzept..................297
    SiRiKo...............................................142
    Skalierbarkeit...................................228
    Skill Profile.......................................430
    Skript Kiddie....................................620
    SKRMS..............................................554
    SLA............................................280, 619
    SLM...................................................280
    SLR....................................................280
    Small Computer System Interface 620
    Smart Card.......................................602
    Smart Grid Cyber Security.............589
    Smartphone................................12, 365
    SMI-S.................................................402
    SMS...................................................554
    SMTP................................................620
    Snapshot...........................................525
    - Copy...........................................401
    Sniffer.......................................368, 620
    - Interface.....................................411
    SOA...........................103, 242, 375, 591
    SOAP........................................105, 593
    -Body............................................106
    - Envelope....................................106
    -Header........................................106
    - Intermediary..............................106
    -Knoten........................................106
    - Message Security......................106
    - Nutzlast......................................106
    - Umschlag...................................106
    - Zwischenstation........................106
    SOC 1................................................284
    SOC 2........................................284, 593
    SOC 3................................................284
    SOC-2-Report...................................185
    Social Engineering..........................620
    Social Hacking.................................352
    Software
    - Life Cycle Processes
    -- ISO/IEC 14764, 2006 ............578
    -- ISO/IEC 15288, 2008............578
    - Test Documentation.................577
    - Unit Test.....................................574
    - Validation..................................577
    662
    -Verification................................577
    Software Assurance Maturity Model .........................................................99
    Software Engineering
    - Architecture Description
    - ISO/IEC 42010, 2011............586
    -ISO/IEC 24774, 2010 ................. 582
    - Life Cycle Management
    -- ISO/IEC 24748 ...................... 581
    - Life Cycle Processes
    -- ISO/IEC 90003, 2004............ 586
    - Risk Management
    -- ISO 16085, 2006....................579
    - SQuaRE
    - ISO/IEC 25000, 2005............582
    -- ISO/IEC 25001, 2007............582
    - ISO/IEC 25020, 2007............582
    -- ISO/IEC 25030, 2007............582
    -- ISO/IEC 25040, 2011............582
    - ISO/IEC 25060, 2010............582
    - Web Site
    -- ISO/IEC 23026......................581
    Softwarefehler
    -Folgen........................................508
    Software-Programme
    - digitale Signierung...................113
    Solid State Disk...............................394
    SolvV................................................570
    SOP.......................................41, 42,390
    Sourcing
    - Anforderungen.........................283
    - Pyramide...................................283
    - Ziele............................................283
    SOX.............................................31, 573
    - Section 302...................................31
    -Section 409.................................288
    Spam -Mail....................................413, 628
    - over Internet Telephony..........627
    Speicher....................................393, 397
    -Bereich.......................................237
    - Deduplizierung........................304
    - Hierarchie..................................393
    - Management.............................304
    - Medien.......................................395
    - Lebensdauer........................396
    - Netz............................................401
    - nichtflüchtig.............................. 394
    - Pool............................................402
    - Sicherheit...................................404
    - Best Practices.......................404
    - Topologie..................................399
    - Virtualisierung.........................401
    - Wear Levelling..................366, 394
    Spezifische Sicherheitskonzepte .. 154
    SPICE...............................................593
    Spionagesoftware...........................621
    SpIT..................................................627
    split...................................................329
    SPML................................................591
    SPoC.................................................288
    SPoF..................................................620
    SPSA.................................................628
    SPSCA.......................................349, 628
    Spy ware...........................................621
    SQL...................................................621
    SQL Injection............................509, 621
    SQuaRE............................................582
    SRM..................................................399
    SSA...................................................573
    SSAE 16............................................284
    SSAE No. 16....................................593
    SSCE.................................................126
    SSCRE..............................................126
    SSCRMMM......................................544
    SSD...................................................394
    SSE-CMM®.................................98, 580
    SSL....................................................618
    Statement on Auditing Standards 283
    Stealth Mode...................................411
    Steganografie..................................366
    Stimmerkennung............................424
    Storage
    - Area Network...........................401
    - Direct Attached........................400
    - Management
    -- ANSI INCITS 388-2011.......403
    - ISO/IEC 24775, 2011.....403, 582
    - SMI-S....................................402
    663
    - Network Attached...................401
    -Pool............................................402
    - Resource Management............399
    - Security...............................404, 585
    -- Best Practices.......................404
    - Virtualization............................401
    -Wear Levelling..................366, 394
    Störung............................................451
    Streifensensor..................................420
    Stromversorgung
    - unterbrechungsfrei..................624
    Structured Query Language.........621
    Subjekt-Recht-Objekt-Modell.......362
    Supplier relationship
    - information security
    - ISO/IEC 27036......................584
    Supply Chain Risk Management
    - NIST SP 800-161, DRAFT........590
    Supportprozess........................252, 254
    sweep...............................................420
    System
    - biometrisch...............................416
    - Life Cycle Processes
    -- ISO/IEC 15288, 2008............578
    - Test Documentation................577
    - Validation..................................577
    - Verification...............................577
    Systems and Software Engineering
    -ISO/IEC26514, 2008.................583
    -ISO/IEC26531, 2009.................583
    - ISO/IEC/IEEE 26511, 2011.......583
    - ISO/IEC/IEEE 26512, 2011....... 583
    - ISO/IEC/IEEE 26515, 2011.......583
    Systems Engineering
    - Architecture Description
    - ISO/IEC 42010, 2011............586
    - Life Cycle Management
    -- ISO/IEC 24748...................... 581
    - Life Cycle Processes
    - ISO/IEC 90005, TR, 2008..... 586
    - Risk Management
    - ISO 16085, 2006...................579
    Systems Security Engineering -
    Capability Maturity Model.........98
    System-Sicherheitspolitik..............131
    TAN..................................................621
    -eTAN..........................................622
    -eTAN plus..................................622
    - indiziert......................................622
    -iTAN...........................................622
    - mobil...........................................622
    - mTAN.........................................622
    -photoTAN..................................622
    - QR-TAN.....................................622
    Tape Library....................................395
    Tarnkappenmodus..........................411
    Tarpit................................................413
    Taschenauthentifikator..................352
    Täuschungsanfälligkeit..................420
    TCP/IP
    - Protokoll-Stack...........................623
    Technikraum....................................327
    Technology Service Providers
    -FFIEC..........................................573
    Teerfalle............................................413
    Teergrube.........................................413
    Telefonbanking................................424
    Telekommunikation
    -TIA 606.......................................574
    Template...................................418,419
    Tertiärspeicher.........................393, 395
    Test....................................................455
    - Abdeckung................................506
    - Äquivalenzklasse......................507
    -Art...............................................506
    - Ergebnis.....................................506
    -Fall..............................................506
    -Feld.............................................506
    - IT Security..................................590
    - Management..............................287
    -Plan.............................................506
    - Protokoll.....................................515
    - Sequenz......................................506
    - Software.....................................574
    - Strategie.....................................506
    - Szenario......................................506
    -Tiefe............................................506
    - Umfang..............................322, 506
    - Umgebung.................................506
    664
    - Vorgehen................................... 506
    - Ziel.............................................506
    Test Documentation
    -IEEE 829.....................................577
    TGT...................................................355
    Threat...............................................600
    - Architecture..............................274
    - Assessment................................274
    TICE....................................................70
    Ticket Granting Ticket...................355
    Timestamp
    - Verifizierung.............................113
    TKG..................................................570
    TKÜV...............................................570
    TLS....................................................623
    TMG...........................................36, 570
    TOGAF®.............................................87
    Token................................................352
    Token Profile...................................106
    - Kerberos....................................107
    - REL.....................................107, 591
    - SAML.................................107,591
    -SwA....................................106, 591
    - Username..........................107, 591
    -X.509...................................107,591
    touch.................................................420
    TR......................................................609
    Transaktionsnummer.....................621
    Transformation...............................152
    Transformationsvorgang............... 203
    Transport Layer Security...............623
    Transportsicherung................344, 369
    Treuhänder......................................383
    Triple DES.......................................363
    Trojan Horse....................................623
    Trojanisches Pferd..........................623
    Trust-Center.....................................364
    TS......................................................609
    TTS....................................................290
    Two-Phase-Commit.......................334
    U
    Übertragungsschutz.......................368
    Übertragungssicherung.........343, 367
    ubiquitär
    - RiSiKo-Management................241
    ubiquitous
    -Continuity.................................241
    - Safety.........................................241
    - Security......................................241
    UBL..................................................624
    Übung.......................................323, 455
    -Art.......................................208, 464
    - Dokumentation........................208
    - Intervall..............................208, 464
    - Objekt........................................464
    - Prozess.......................................464
    - Umfang......................................322
    - unangekündigt.........................322
    - vorbereitet.................................322
    - Ziel.............................................464
    UC.............................................280, 382
    UDDI.........................................104, 591
    UHD..........................................257, 288
    UMAG.............................................570
    Underpinning Contract..........280, 382
    Unified Threat Management........416
    Uninterruptable Power Supply.... 624
    Universal Business Language.......624
    Universal Description, Discovery and Integration............................104, 591
    Unterbrechungsfreie Stromversorgung.................326, 624
    Unterlagen - geschäftskritisch................607, 617
    Unternehmenspyramide...............185
    Unterstützungsprozess..................254
    Unverfälschtheit.............................625
    UPS...................................................624
    UrhG................................................570
    URL..................................................604
    USA
    - Gesetze......................................572
    - Practices.....................................572
    - Prüfvorschriften.......................572
    USB
    -Festplatte...................................380
    -- AES-verschlüsselt...............380
    - Biometrie..............................380
    665
    - Memory Stick............365, 380, 394
    - Token.........................................352
    User Help Desk........................257, 288
    USMS...............................................120
    USV...........................................326, 624
    - Line-Interactive........................624
    - Offline........................................624
    - Online........................................624
    - VFD............................................624
    - VFI.......................................457, 624
    -VI................................................624
    UTM.................................................416
    UW Kassen....................................177
    V
    VAG
    - Deutschland..............................570
    - Österreich..................................570
    - Schweiz......................................571
    Val IT..................................................86
    Validation
    - IEEE 1012...................................577
    Validierung.....................................625
    VDSG...............................................571
    Verbindlichkeit...............................625
    Verbotsprinzip................................233
    Vereinbarung
    - auf Gegenseitigkeit..................455
    Vereinzelungsanlage......................625
    Verfügbarkeit..................................625
    Verfügbarkeitsklassen............223, 625
    Vérification
    - IEEE 1012...................................577
    Verifikation.....................................626
    Verkabelung....................................326
    - ISO/IEC 14763...........................578
    - TIA 942, 2013............................574
    Vernichtung
    - Daten..........................................367
    - Datenträger...............................367
    Verordnungen
    - Österreich..................................570
    - Schweiz......................................570
    Verschlüsselung......................362, 381
    - AES.............................................363
    - asymmetrisch.............................364
    -DES.............................................363
    - Druckdaten................................365
    -IDEA®.........................................363
    - RC5®............................................363
    -RSA.............................................364
    - symmetrisch..............................363
    - Triple DES..................................363
    Versicherer
    - Corporate Governance.............571
    - Interne Revision........................571
    - Internes Kontrollsystem...........571
    - Risikomanagement...................571
    Versicherungsunternehmen
    - MaRisk VA..................................40
    - Notfallplanung............................40
    Versorgung......................................326
    - Topologie...................................429
    Vertrag
    - auf Gegenseitigkeit...................626
    Vertrauenszirkel..............................102
    Vertraulichkeit.................................626
    Vertraulichkeitsbereich....................39
    Vertraulichkeitsstufe......................224
    Verwundbarkeit..............................626
    VFD...................................................624
    VFI.............................................457, 624
    VI.......................................................624
    VI (vertikale Interdependenz).......432
    Vier-Augen-Prinzip........................231
    Virenkennung..................................415
    Virenscanner....................................415
    Virensignatur...................................415
    Virtual LAN.............................238, 626
    Virtual Tape Library.......................403
    Virtuelle Bandbibliothek................403
    Virtuelles LAN........................238, 626
    Virtuelles Privates Netz.................626
    Virus
    - Computer...................................603
    Vishing.............................................627
    Vital Records............................607, 617
    VIVA.................................................627
    666
    VLAN.......................................238, 626
    Voice over Internet Protocol.........627
    Voice over IP...................................380
    VoIP..........................................380, 627
    VoIP Security Alliance...................627
    VOIPSA............................................627
    Vorgehensmodell.............................20
    Voting Algorithm...........................329
    VPN..................................................626
    V-Quadrupel...........................142, 219
    VSITR...............................................593
    VTL...................................................403
    Vulnerability
    - Architecture..............................274
    - Assessment................................274
    W
    W3C®........................................104,112
    - Security Framework.................Ill
    -SOAP..........................................593
    - WSDL.........................................593
    -X-KISS........................................112
    - XKMS.................................Ill, 593
    - X-KRSS.......................................112
    WAF.................................................406
    WAN................................................628
    WarDriver........................................368
    WARP.................................................70
    Wartung
    - präventiv...................................305
    Wartungsmanagement..................304
    Wassermeldeanlage...............327, 627
    WBEM..............................................403
    WD....................................................609
    Weakness.........................................618
    Wear Levelling................................394
    Web Application Firewall............. 406
    Web Services (WS) - SecureConversation.........108, 591
    - Security (WSS)..........................106
    - SecurityPolicy...................108, 592
    -Trust...........................108, 592, 593
    Web Site
    - Software Engineering
    - ISO/IEC 23026......................581
    Webcrawler.....................................628
    WebShield.......................................406
    weiße Liste......................................619
    Weitverkehrsnetz...........................628
    Werbe-E-Mail..................................628
    Werbesoftware................................628
    Whitelist..........................................414
    - Model.........................................619
    Wide Area Network.......................628
    Wiederanlauf...........................318, 456
    - maximale Dauer.......................454
    - maximale Zeit...........................454
    - maximaler Zeitraum................ 454
    - Plan.......................................38, 306
    - RTO............................................454
    Wiederaufbereitung................343, 366
    Wiederherstellung...................308, 456
    - Dauer.........................................456
    Wi-Fi®...............................................606
    WiMAX............................................367
    WLAN..............................................606
    WMA.........................................327, 627
    Workaround....................................288
    Workflow.........................................469
    WORM.............................................394
    WpHG..............................................570
    Write XOR Execute........................238
    WSDL........................................105, 593
    WSS..................................................106
    Würmer...........................................414
    X
    X.1051...............................................583
    XACML.............................110, 592, 593
    XAdES..............................................113
    XCBF................................................ 592
    X-KISS..............................................112
    XKMS........................................111, 593
    X-KRSS.............................................112
    XML...........................................614, 628
    - Canonical..................................Ill
    - Digital Signature......................112
    - Enc.......................................Ill, 112
    - Encryption Element.................112
    667
    - Encryption Syntax and
    Processing................................Ill
    - Exclusive Canonicalization.....Ill
    -Firewall......................................407
    - Gateway....................................407
    - Key Management System.......Ill
    -Sig........................................111,112
    - Signature Syntax and Processing
    ..................................................Ill
    XSPA................................................592
    XSS.............................................509, 603
    Zero-Day-Attacke....................415, 628
    Zielvereinbarungsprozess.............529
    ZKA...........................................606, 608
    -DIN EN50133...........................576
    ZKS............................................342, 359
    -DIN EN50133...........................576
    Zufahrtsschutz.................................358
    Zugangsschutz........................342, 361
    - Basisregel...................................470
    Zugriffskontrollliste........................628
    Zugriffsschutz.........................342, 361
    Zugriffszeit.......................................395
    Zutrittskontrollanlage....................482
    Zutrittskontrollsystem............342, 359
    -Richtlinie....................................482
    Zutrittsschutz..........................342, 359
    Zutrittszone.....................................237
    Zuverlässigkeit................................629
    Zuwachssicherung..........................332
    Zwangs-Logout...............................471
    Zweifaktor
    - Authentifizierung.....................422
    - Authentisierung........................350
    - Identifizierung..........................422