Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Warning: preg_replace(): Compilation failed: this version of PCRE is not compiled with PCRE_UTF8 support at offset 0 in /web/Sites/BlickinsBuch.de/functions.php on line 241 Blickinsbuch.de - IT-Sicherheit mit System - Klaus-Rainer Müller
     Artikel werden geladen

    IT-Sicherheit mit System

    Integratives IT-Sicherheits-, Kontinuitäts- und Risikomanagement - Sicherheitspyramide - Standards und Practices - SOA und Softwareentwicklung

    IT-Sicherheit mit System
    Integratives IT-Sicherheits-, Kontinuitäts- und Risikomanagement - Sicherheitspyramide - Standards und Practices - SOA und Softwareentwicklung

    Autoren:

    Verlag:
    Vieweg+Teubner Verlag  Weitere Titel dieses Verlages anzeigen

    Auflage: 5., neu bearbeitete und ergänzte Auflage.
    Erschienen: April 2014
    Seiten: 577
    Sprache: Deutsch
    Preis: 59.99 €
    Maße: 241x167x43
    Einband: Gebundene Ausgabe
    ISBN: 9783658043339

    Inhaltsverzeichnis

    1Ausgangssituation und Zielsetzung1
    1.1Ausgangssituation2
    1.1.1Bedrohungen2
    1.1.2Schwachstellen12
    1.1.3Schadenshöhen, Schutzbedarfe15
    1.2Zielsetzung des Sicherheits-, Kontinuitäts- und Risikomanagements18
    1.3 Lösung...............................................................................................................
    1.4Zusammenfassung20
    2Kurzfassung und Überblick für Eilige22
    3Zehn Schritte zum Sicherheitsmanagement28
    4Gesetze, Verordnungen, Vorschriften, Anforderungen31
    5Standards, Normen, Practices45
    5.1BSI: Standards45
    5.1.1Überblick45
    5.1.2BSI-Standard 100-1, ISMS46
    5.1.3BSI-Standard 100-2, IT-Grundschutz-Vorgehensweise46
    5.1.4BSI-Standard 100-3, Risikoanalyse48
    5.1.5BSI-Standard 100-4, Notfallmanagement48
    5.1.6Vergleich mit der Sicherheitspyramide50
    5.2BSI-IT-Grundschutzkataloge versus Sicherheitspyramide52
    5.3ISO/IEC 19770, Software asset management (SAM)55
    5.4ISO 22301:2012, Business Continuity Management Systems56
    5.5ISO/IEC 24762:2008, ICT disaster recovery services57
    5.6ISO/IEC-27000-Familie zum ISM58
    5.6.1Überblick58
    5.6.2ISO/IEC 27001:2013, ISMS - Requirements61
    5.6.3ISO/IEC 27002:2013, ISM - Code of practice for IS controls63
    5.6.4ISO/IEC 27003:2010, ISM - Implementation Guidance66
    5.6.5ISO/IEC 27004:2009, ISM - Measurement67
    5.6.6ISO/IEC 27005:2011, IS - Risk Management68
    5.6.7 ISO/IEC 27010:2012, ISM for inter-sector and inter-organizational
    communications70
    5.6.8 ISO/IEC 27013:2012, Guidance ort the integrated implementation
    of ISO/IEC 27001 and ISO/IEC 20000-171
    5.6.9 ISO/IEC TR 27015:2012, Information security management
    guidelines for financial services72
    5.6.10ISO/IEC 27032:2012, Guidelines for cybersecurity73
    5.6.11ISO/IEC 27033, Network security74
    5.6.12ISO/IEC 27034, Application security75
    5.6.13 ISO/IEC 27035:2011, Information security incident
    management77
    5.6.14 ISO/IEC 27037:2012, Guidelines for identification, collection,
    acquisition and preservation of digital evidence78
    5.7ISO/IEC 20000, IT Service Management78
    5.8ITIL®82
    5.8.1Überblick82
    5.8.2ITIL® Information Security Management84
    5.8.3ITIL® IT Service Continuity Management85
    5.9COBIT®, Version 5.086
    5.10PCI Data Security Standard (DSS)88
    5.11Zusammenfassender Vergleich mit der Sicherheitspyramide89
    5.12Risikoanalyse mittels OCTAVE® Approach96
    5.13Reifegradmodelle97
    5.13.1Systems Security Engineering - Capability Maturity Model®98
    5.13.2Software Assurance Maturity Model99
    5.13.3Information Technology Security Assessment Framework100
    5.13.4Maturity Model nach COBIT® 5100
    5.13.5Zusammenfassung101
    5.14Federated Identity Management102
    5.15Architekturen103
    5.15.1Serviceorientierte Architektur (SOA)103
    5.15.2Open Grid Services Architecture® (OGSA®)115
    5.15.3OSGi™ Architecture116
    5.16Program mier-/Entwicklungsr ich tlinien116
    5.16.1C, C++und Java116
    5.16.2Webanwendungen117
    5.17Schutz vor Insider-Bedrohungen118
    6Definitionen120
    6.1Unternehmenssicherheitsmanagementsystem120
    6.2Informationssicherheitsmanagementsystem121
    6.3Sicherheitsmanagement123
    6.4IKT-Sicherheitsmanagement123
    6.5 Ingenieurmäßige Sicherheit - Safety, Security, Continuity
    Engineering125
    6.6Sicherheitspyramide126
    6.7Sicherheitspolitik128
    6.7.1... nach IT-Grundschutzkatalogen128
    6.7.2... nach ISO/IEC 13335-1:2004129
    6.7.3... nach ISO/IEC 27001:2013130
    6.7.4... nach ISO/IEC 27002:2013130
    6.7.5... nach ISO/IEC 27003:2010131
    6.7.6... nach ITSEC131
    6.7.7... nach Common Criteria (ISO/IEC 15408)131
    6.7.8... nach der Sicherheitspyramide01"^b müii«132
    6.7.9Vergleich133
    6.8Sicherheit im Lebenszyklus134
    6.9Ressourcen, Schutzobjekte und -Subjekte sowie -klassen135
    6.10Sicherheitskriterien (Grundwerte der IS)136
    6.11Geschäftseinflussanalyse (Business Impact Analysis)137
    6.12Geschäftskontinuität (Business Continuity)137
    6.13Sicherheit und Sicherheitsdreiklang137
    6.14Risiko und Risikodreiklang139
    6.15Risikomanagement141
    6.16IT-Sicherheits-, IT-Kontinuitäts- und IT-Risikomanagement142
    6.17Zusammenfassung143
    7Die Sicherheitspyramide - Strategie und Vorgehensmodell146
    7.1Überblick147
    7.2Sicherheitshierarchie151
    7.2.1Sicherheits-, Kontinuitäts- und Risikopolitik151
    7.2.2Sicherheitsziele / Sicherheitsanforderungen151
    7.2.3Sicherheitstransformation und Sicherheitsmerkmale152
    7.2.4Sicherheitsarchitektur153
    7.2.5Sicherheitsrichtlinien153
    7.2.6Spezifische Sicherheitskonzepte154
    7.2.7Sicherheitsmaßnahmen155
    7.3PROSim155
    7.4Lebenszyklus156
    7.4.1Geschäfts-, Support- und Begleitprozess-Lebenszyklus156
    7.4.2Ressourcen-/Systemlebenszyklus157
    7.4.3Organisationslebenszyklus157
    7.4.4Produkt- und Dienstleistungslebenszyklus158
    7.5Sicherheitsregelkreis158
    7.6Sicherheitsmanagementprozess159
    7.7Zusammenfassung159
    8Sicherheits-, Kontinuitäts- und Risikopolitik161
    8.1Zielsetzung162
    8.2Umsetzung162
    8.3Inhalte164
    8.4Checkliste166
    8.5Praxisbeispiele168
    8.5.1 Sicherheits-, kontinuitäts- und risikopolitische Leitsätze
    Versicherung168
    8.5.2Sicherheits-, Kontinuitäts- und Risikopolitik170
    8.6Zusammenfassung178
    9Sicherheitsziele / Sicherheitsanforderungen180
    9.1Schutzbedarfsklassen181
    9.2Schutzbedarfsanalyse182
    9.2.1Prozessarchitektur und Prozesscharakteristika183
    9.2.2Externe Sicherheitsanforderungen - Überblick184
    9.2.3Geschäftseinflussanalyse (Business Impact Analysis)186
    9.2.4Betriebseinflussanalyse (Operational Impact Analysis)189
    9.3Akteursanalyse190
    9.4Umgebungs~/Umfeldanalyse191
    9.5Tabelle Schadensszenarien191
    9.6Praxisbeispiele193
    9.6.1Schutzbedarf der Geschäftsprozesse193
    9.6.2IKT-Schutzbedarfsanalyse193
    9.6.3Schutzbedarfsklassen198
    9.7Zusammenfassung199
    10Sicherheitsmerkmale200
    10.1Haus zur Sicherheit - House of Safety, Security, Continuity (HoSSC)201
    10.2Safety, Security and Continuity Function Deployment (SSCFD)202
    10.2.1Transformation der Anforderungen auf Sicherheitsmerkmale203
    10.2.2Detaillierung der Sicherheitsmerkmale204
    10.2.3Abbildung der Merkmale auf den Lebenszyklus205
    10.3Schutzbedarfsklassen206
    10.4Praxisbeispiele206
    10.5Zusammenfassung208
    11Sicherheitsarchitektur210
    11.1Überblick211
    11.2Prinzipielle/generische Sicherheitsanforderungen213
    11.3Prinzipielle/generische Bedrohungen213
    11.4Strategien und Prinzipien218
    XXIII
    11.4.1 Risikostrategie (Risk Strategy), Risikolandkarte,
    Risikoklassen219
    11.4.2 Sicherheits- und Kontinuitätsstrategie (Safety, Security and
    Continuity Strategy)221
    11.4.3Prinzip der Wirtschaftlichkeit222
    11.4.4Prinzip der Abstraktion222
    11.4.5Prinzip der Klassenbildung (Principle of Classification)223
    11.4.6Poka-Yoke-Prinzip224
    11.4.7 Prinzip der Namenskonventionen (Principle of Naming
    Conventions)226
    11.4.8Prinzip der Redundanz (Principle of Redundancy)226
    11.4.9 Prinzip des „aufgeräumten" Arbeitsplatzes (Clear Desk
    Policy)230
    11.4.10Prinzip der Abwesenheitssperre230
    11.4.11Prinzip der Eigenverantwortlichkeit230
    11.4.12 Vier-Augen-Prinzip (Confirmed Double Check/Dual Control
    Principle)231
    11.4.13 Prinzip der Funktionstrermung (Segregation of Duties
    Principle)231
    11.4.14 Prinzip der Sicherheitsschalen (Safety and Security Shell
    Principle)231
    11.4.15Prinzip der Pfadanalyse (Path Analysis Principle)232
    11.4.16Prinzip der Ge- und Verbotsdifferenzierung233
    11.4.17Prinzip des generellen Verbots (Deny All Principle)233
    11.4.18Prinzip der Ausschließlichkeit234
    11.4.19Prinzip des minimalen Bedarfs (Need to Know/Use Principle)234
    11.4.20 Prinzip der minimalen Rechte (Least/Minimum Privileges
    Principle)234
    11.4.21Prinzip der minimalen Dienste (Minimum Services Principle)235
    11.4.22Prinzip der minimalen Nutzung (Minimum Usage Principle)235
    11.4.23Prinzip der Nachvollziehbarkeit und Nachweisbarkeit236
    11.4.24 Prinzip des „sachverständigen Dritten" (Principle of Third Party
    Expert)236
    11.4.25Prinzip der Sicherheitszonen und des Ciosed-Shop-Betriebs236
    11.4.26Prinzip der Sicherheitszonenanalyse239
    11.4.27Prinzip der Immanenz (Principle of Immanence)240
    11.4.28Prinzip der Konsolidierung (Principle of Consolidation)241
    11.4.29Prinzip der Standardisierung (Principle of Standardization)243
    11.4.30Prinzip der Plausibilisierung (Principle of Plausibleness)244
    11.4.31Prinzip der Konsistenz (Principle of Consistency)245
    11.4.32 Prinzip der Untergliederung (Principle of
    Compartmentalization)245
    11.4.33Prinzip der Aufteilung246
    11.4.34Prinzip der Pseudonymisierung bzw. Maskierung246
    11.4.35Prinzip der Vielfältigkeit (Principle of Diversity)246
    11.4.36Distanzprinzip (Distance Principle)247
    11.4.37Prinzip der Vererbung248
    11.4.38Prinzip der Subjekt-Objekt- / Aktiv-Passiv-Differenzierung248
    11.4.39Prinzipien versus Sicherheitskriterien249
    11.5Sicherheitselemente251
    11.5.1Prozesse im Überblick252
    11.5.2Konformitätsmanagement (Compliance Management)262
    11.5.3Datenschutzmanagement (Privacy Management)265
    11.5.4Risikomanagement (Risk Management)268
    11.5.5Leistungsmanagement (Service / Service Level Management)280
    11.5.6Finanzmanagement (Financial Management)286
    11.5.7Projektmanagement (Project Management)286
    11.5.8Qualitätsmanagement (Quality Management)287
    11.5.9Ereignismanagement (Incident Management)288
    11.5.10Problemmanagement (Problem Management)294
    11.5.11Änderungsmanagement (Change Management)295
    11.5.12Releasemanagement (Release Management)298
    11.5.13Konfigurationsmanagement (Configuration Management)299
    11.5.14Lizenzmanagement (Licence Management)300
    11.5.15Kapazitätsmanagement (Capacity Management)302
    11.5.16Wartungsmanagement (Maintenance Management)304
    11.5.17Kontinuitätsmanagement (Continuity Management)305
    11.5.18Securitymanagement (Security Management)337
    11.5.19Architekturmanagement (Architecture Management)373
    11.5.20Innovationsmanagement (Innovation Management)379
    11.5.21Vertragsmanagement (Contract Management)382
    11.5.22Dokumentenmanagement (Document Management)384
    11.5.23Personalmanagement (Human Resources Management)384
    11.5.24Ressourcen im Überblick389
    11.5.25Daten390
    11.5.26Dokumente390
    11.5.27IKT-Hardware und Software391
    11.5.28Infrastruktur429
    11.5.29Material430
    11.5.30Methoden und Verfahren430
    11.5.31Personal430
    11.5.32Organisation im Überblick431
    11.5.33Lebenszyklus im Überblick431
    11.6Interdependenznetz432
    11.7Hilfsmittel RiSiKo- Architekturmatrix434
    11.8Zusammenfassung435
    12Sicherheitsrichtlinien/~standards - Generische Sicherheitskonzepte437
    12.1Übergreifende Richtlinien438
    12.1.1Sicherheitsregeln438
    12.1.2Prozessvorlage440
    12.1.3IKT-Benutzerordnung442
    12.1.4E-Mail-Nutzung444
    12.1.5Internet-Nutzung446
    12.2Betriebs- und Begleitprozesse (Managementdisziplinen)448
    12.2.1Kapazitätsmanagement449
    12.2.2Kontinuitätsmanagement451
    12.2.3Securitymanagement469
    12.2.4Architekturmanagement480
    12.3Ressourcen482
    12.3.1Zutrittskontrollsystem482
    12.3.2Passwortbezogene Systemanforderungen482
    12.3.3Wireless LAN483
    12.4Organisation484
    12.5Zusammenfassung485
    13Spezifische Sicherheitskonzepte487
    13.1Prozesse488
    13.1.1Kontinuitätsmanagement488
    13.2Ressourcen489
    13.2.1Betriebssystem489
    13.3Zusammenfassung489
    14Sicherheitsmaßnahmen490
    14.1Ressourcen490
    14.1.1Betriebssystem: Protokoll Passworteinstellungen490
    14.2Zusammenfassung491
    15Lebenszyklus492
    15.1Sichere Beantragung (Secure Proposai Application)495
    15.2Sichere Planung (Secure Planning)496
    15.3 Sicheres Fachkonzept, sichere Anforderungsspezifikation (Secure
    Requirements Specification)496
    15.4Sicheres technisches Grobkonzept (Secure Technical Basic Design)500
    15.5Sicheres technisches Feinkonzept (Secure Technical Design)505
    15.6Sichere Entwicklung (Secure Development / Coding)508
    15.7 Sichere Integrations- und Systemtest (Secure Integration / System
    Tests)512
    15.8Sichere Freigabe (Secure Approval)513
    15.9Sichere Software-Evaluation (Secure Software Evaluation)513
    15.10Sichere Auslieferung (Secure Delivery)514
    15.11 Sicherer Abnahmetest und sichere Abnahme (Secure Acceptance Test
    and Secure Acceptance)514
    15.12Sichere Software-Verteilung (Secure Software Deployment)515
    15.13Sichere Inbetriebnahme (Secure Startup Procedure)516
    15.14Sicherer Betrieb (Secure Operation)516
    15.15Sichere Außerbetriebnahme (Secure Decommissioning)517
    15.16Hilfsmittel erweiterte Phasen-Ergebnistypen-Tabelle (ePET)518
    15.17Zusammenfassung519
    16Sicherheitsregelkreis522
    16.1Sicherheitsprüfungen523
    16.1.1Sicherheitsstudie/Risikoanalyse523
    16.1.2Penetrationstests526
    16.1.3IT Security Scans527
    16.2Sicherheitscontrolling528
    16.3Berichtswesen (Safety-Security-Continuity-Reporting)530
    16.3.1Anforderungen530
    16.3.2Inhalte532
    16.4Safety-Security-Continuity-Risk-Benchmarks541
    16.5Hilfsmittel IKT-Sicherheitsfragen542
    16.6Zusammenfassung542
    17Reifegradmodell des Sicherheits-, Kontinuitäts- und Risikomanagements544
    17.1Reifegradmodell RiSiKo-Management544
    17.1.1Stufe 0: unbekannt545
    17.1.2Stufe 1: begonnen545
    17.1.3Stufe 2: konzipiert545
    17.1.4Stufe 3: standardisiert546
    17.1.5Stufe 4: integriert546
    17.1.6Stufe 5: gesteuert546
    17.1.7Stufe 6: selbst lernend546
    17.2Checkliste Reifegrad550
    17.3Praxisbeispiel552
    17.4Zusammenfassung552
    18Sicherheitsmanagementprozess553
    18.1Deming- bzw. PDCA-Zyklus553
    18.2Planung554
    18.3Durchführung556
    18.4Prüfung556
    18.5Verbesserung556
    18.6Zusammenfassung557
    19Minimalistische Sicherheit560
    20Abbildungsverzeichnis562
    21Tabellenverzeichnis564
    22Verzeichnis der Checklisten565
    23Verzeichnis der Beispiele565
    24Markenverzeichnis567
    25Verzeichnis über Gesetze, Vorschriften, Standards, Normen, Practices569
    25.1Gesetze, Verordnungen und Richtlinien569
    25.1.1Deutschland: Gesetze und Verordnungen569
    25.1.2Österreich: Gesetze und Verordnungen570
    25.1.3Schweiz: Gesetze, Verordnungen und Rundschreiben570
    25.1.4Großbritannien: Gesetze571
    25.1.5Europa: Entscheidungen, Richtlinien, Practices571
    25.1.6USA: Gesetze, Practices und Prüfvorschriften572
    25.2Ausführungsbestimmungen, Grundsätze, Vorschriften573
    25.3Standards, Normen, Leitlinien und Rundschreiben574
    26Literatur- und Quellenverzeichnis594
    27Glossar und Abkürzungsverzeichnis599
    28Sachwortverzeichnis630
    29Über den Autor668