Skip to content
IT Sicherheitsnormen und Standards- Ein Projekt der FH-St.Pölten
Home
FH St.Pölten
Kategorien
Herausgeber
Schlagwörter
Datenschutz
Suchen Sie Etwas?
  • AIM – Amsterdam Information Management
  • ANSI/TIA-942 – Datenzentren
  • ArchiMate – Modelling Language
  • AS A7700 – Sichere Webapplikationen
  • ASL – Application Management
  • BABOK – Business Analyse
  • Balanced Scorecard – Strategische Planung
  • Betriebssicheres Rechenzentrum – Datenzentren
  • BiSL – Business Information Management
  • BS 10012 – Data protection
  • BS 8220-3 – Sicherheit von Gebäuden
  • BSI 100-3 – Risikomanagement
  • BSI 200-1 – ISMS
  • BSI 200-2 – Sicherheitsmanagementsystem
  • BSI 200-3 – Risikomanagement
  • BSI 200-4 – Notfallmanagement
  • BSI SSL/TLS – Übertragung von Daten
  • BSI-Standards
  • CIP-002-3 – Cyber Security
  • CIP-003-3 – Cyber Security management controls
  • CIP-004-3a – Cyber security training
  • CIP-005-3a – Eleectronic Security Perimeter
  • CIP-006-3c – Physical security
  • CIP-007-3a – System Security Management
  • CIP-008-3 – Incident reporting
  • CIP-009-3 – Recovery Plan
  • CMMI – Business Objective
  • COBIT 5 – Management
  • Datenschutzerklärung
  • DIN 50600 – Datenzentren
  • e-CF – ITK Kompetenzen
  • Embed iList
  • eSCM-CL – Client Organization
  • eSCM-SP – Capability Model
  • FH St.Pölten
  • ICB – Projektmanegment
  • IEC 62443-1-1 – Netzwerk/System Security
  • IEC 62443-2-1 – CSMS
  • IEC 62443-2-3 – Patch management
  • IEC 62443-2-4 – IACS
  • IEC 62443-3-1 – IACS
  • IEC 62443-3-3 – System Security
  • IEC-Standards
  • ISO 10116 – Modes of operation for an n-bit block cipher
  • ISO 10118-3 – Dedicated hash-functions
  • ISO 10181-x – Open Systems
  • ISO 10736 – Transport Layer Security
  • ISO 10745 – Upper Layer Security
  • ISO 11442 – Technical Product Documentation
  • ISO 11577 – Network Layer Security
  • ISO 11770 – Mechanisms using symmetric techniques
  • ISO 13491-1 – Secure cryptographic devices
  • ISO 13569 – Information security guidelines
  • ISO 13888-1 – Non-repudiation
  • ISO 14441 – Security and privacy requirements of EHR systems for use in conformity assessment
  • ISO 14888-1 – Digital signatures with appendix 
  • ISO 15031-7 – Data Link Security
  • ISO 15287-2 – Standardized Application Environment Profile
  • ISO 15288 – System life cycle processes
  • ISO 15408-1 – Evaluation Criteria
  • ISO 15443-1 – IT security assurance
  • ISO 15446 – Guidance for the production of protection profiles and security targets
  • ISO 15504-10 – Safety extension
  • ISO 15764 – Extended data link security
  • ISO 15816 – Security information objects for access control
  • ISO 15945 – Specification of TTP services to support the application of digital signatures
  • ISO 15946-1 – Cryptographic techniques based on elliptic curves
  • ISO 17574 – Guidelines for security protection profiles
  • ISO 17839-1 – Biometric System-on-Card
  • ISO 18014-1 – Time-stamping services
  • ISO 18028-1 – Network security management
  • ISO 18028-4 – Securing remote access
  • ISO 18031 – Random bit generation
  • ISO 18033-1 – Encryption algorithms
  • ISO 18043 – Selection, deployment and operations of intrusion detection systems
  • ISO 18045 – Methodology for IT security evaluation
  • ISO 19092 – Biometrics
  • ISO 19772 – Authenticated encryption
  • ISO 19790 – Security requirements for cryptographic modules
  • ISO 19791 – Security assessment of operational systems
  • ISO 19792 – Security evaluation of biometrics
  • ISO 19794 – Biometric data interchange formats
  • ISO 19795-1 – Biometric performance testing and reporting
  • ISO 20000-1 – Service management system requirements
  • ISO 20000-2 – Guidance on the application of service management systems
  • ISO 20000-3 – Guidance on scope definition and applicability
  • ISO 20000-4 – Process reference model
  • ISO 20000-5 – Implementation guidance
  • ISO 20000-9 – Cloud Services
  • ISO 20000-x – ITSM
  • ISO 21500 – Project, programme and portfolio management
  • ISO 21827 – Capability Maturity Model®
  • ISO 22301 – Business continuity management systems
  • ISO 22313 – Guidance on the use of ISO 22301
  • ISO 22398 – Societal security guidelines
  • ISO 22399 – Guideline for incident preparedness and operational continuity management
  • ISO 2382 – Information Technology Vocabulary
  • ISO 24759 – Test requirements for cryptographic modules
  • ISO 24761 – Authentication context for biometrics
  • ISO 24762 – Guidelines for information and Communications technology disaster recovery services
  • ISO 27000 – Information security management systems
  • ISO 27001 – Information security management systems Requirements
  • ISO 27002 – ISMS Code of Practice
  • ISO 27003 – Information security management systems Guidance
  • ISO 27004 – Monitoring, measurement, analysis and evaluation
  • ISO 27005 – Guidance on managing information security risks
  • ISO 27006 – Requirements for bodies providing audit and certification of information security management systems
  • ISO 27007 – Guidelines for information security management systems auditing
  • ISO 27008 – Guidelines for Auditors
  • ISO 27010 – Information security management for inter-sector and inter-organizational communications
  • ISO 27011 – ISM Telecommunication Guidelines
  • ISO 27013 – Guidance on the integrated implementation
  • ISO 27014 – Governance of information security
  • ISO 27015 – ISM guidelines for financial services
  • ISO 27016 – ISM organizational economics
  • ISO 27017 – Code of practice for IS control for cloud services
  • ISO 27018 – Protection of PII in public clouds
  • ISO 27019 – ISM guidelines for energy utility industry
  • ISO 27031 – Guidelines for information and communication technology readiness for business continuity
  • ISO 27032 – Guidelines for Internet Security
  • ISO 27033-1 – Network security
  • ISO 27034-1 – Application security
  • ISO 27036-1 – Cybersecurity Supplier relationships
  • ISO 27038 – Specification for digital redaction
  • ISO 27039 – Selection, deployment and operations of intrusion detection and prevention systems
  • ISO 27040 – Storage security
  • ISO 27041 – Guidance on assuring suitability and adequacy of incident investigative method
  • ISO 27042 – Guidelines for the analysis and interpretation of digital evidence
  • ISO 27043 – Incident investigation principles and processes
  • ISO 28000 – Security management systems Requirements
  • ISO 29100 – Privacy Framework
  • ISO 29128 – Verification of cryptographic protocols
  • ISO 29151 – GPDR
  • ISO 31000 – Risk management Guidelines
  • ISO 31010 – Risk assessment techniques
  • ISO 33001 – Process assessment Concepts and terminology
  • ISO 33002 – Requirements for performing process assessment
  • ISO 33003 – Requirements for process measurement frameworks
  • ISO 33004 – Requirements for process reference, process assessment and maturity models
  • ISO 33014 – Guide for process improvement
  • ISO 33015 – Guidance for process risk determination
  • ISO 33020 – Process measurement framework for assessment of process capability
  • ISO 33030 – Process assessment guidance
  • ISO 33060 – Process assessment model for system life cycle processes
  • ISO 33061 – Process assessment model for software life cycle processes
  • ISO 33074 – Process capability assessment model for service management
  • ISO 38500 – Governance of IT for the organization
  • ISO 7064 – Check character systems
  • ISO 9564-1 – Personal Identification Number (PIN) management and security
  • ISO 9735-5 – Security rules for batch EDI
  • ISO 9735-7 – Security rules for batch EDI
  • ISO 9735-9 – Security key and certificate management message
  • ISO 9796-2 – Integer factorization based mechanisms
  • ISO 9797-1 – Mechanisms using a block cipher
  • ISO 9798-1 – Entity authentication
  • ISO Guide 73 – Risk management vocabulary
  • IT-CMF – Capability Maturity Framework
  • ITIL – Managing Services within the digital era
  • Lean IT
  • Mindmap
  • MoP – Management of portfolios
  • MoR – Management of Risk
  • MoV – Management of value
  • MSP – Managing Successful Programms
  • NIST 800-30 – Guide for Conducting Risk Assessments
  • NIST FIPS 200 – Minimum Security Requirements for Federal Information and Information Systems
  • NIST SP 1800-3 – Attribute Based Access Control
  • NIST SP 1800-4 – Mobile Device Security: Cloud and Hybrid Builds
  • NIST SP 500-299 – NIST Cloud Computing Security Reference Architecture
  • NIST SP 800-145 – The NIST Definition of Cloud Computing
  • NIST SP 800-153 – Guidelines for Securing Wireless Local Area Networks (WLANs)
  • NIST SP 800-34 – Contingency Planning Guide for Federal Information Systems
  • NIST SP 800-35 – Guide to Information Technology Security Services
  • NIST SP 800-39 – Managing Information Security Risk: Organization, Mission, and Information System View
  • NIST SP 800-45 – Guidelines on Electronic Mail Security
  • Normen und Standards
  • OPBOK – Outsourcing Professional Body of Knowledge
  • P3M3 – Portfolio, Programme, and Project Management Maturity Model
  • P3O – Portfolio, Programme and Project Offices
  • PCI DSS – Payment Card Industry Data Security Standard
  • PMBOK – Project Management Body of Knowledge
  • PRINCE2 – Projects in controlled environment
  • Projekt Normenwebsite
  • Scrum – Agile software development
  • Six Sigma – Process improvement through identifying deffects
  • SS 507 – ICT Disaster recovery
  • Suche basierend auf Kategorien
  • Suche basierend auf Schlagwörtern
  • Suche nach Herausgeber
  • TOGAF – EA Framework
  • recovery plan

    SS 507 – ICT Disaster recovery

    • Post category:BCM, SCM, DR

    Beschreibung This standard specifies requirements for ICT DR services, which include both those provided in-house and outsourced. It covers facilities and services capability and provides fallback and recovery support to…

    Continue ReadingSS 507 – ICT Disaster recovery

    CIP-009-3 – Recovery Plan

    • Post category:Cyber Security

    Beschreibung Standard CIP-009-3 ensures that recovery plan(s) are put in place for Critical Cyber Assets and that these plans follow established business continuity and disaster recovery techniques and practices.  North…

    Continue ReadingCIP-009-3 – Recovery Plan

    ISO 24762 – Guidelines for information and Communications technology disaster recovery services

    • Post category:BCM, SCM, DR

    Beschreibung ISO/IEC 24762:2008 provides guidelines on the provision of information and communications technology disaster recovery (ICT DR) services as part of business continuity management, applicable to both “in-house” and “outsourced”…

    Continue ReadingISO 24762 – Guidelines for information and Communications technology disaster recovery services
    • Kategorien
      • Technische SicherheitNormen zur Technischen Sicherherheit
      • ISMS SMS FIPSInformation Security Management System, Federal Information Processing Standard
      • KryptographieNormen zur Kryptographie
      • Process AssesmentNormen zu Process Assesment
      • Projekt ManagementNormen und Best Practice zu Projekt Management
      • BCM, SCM, DRBusiness continuity management, service continuity management, disaster recovery
      • Cyber SecurityNormen und Standards zur Cyber Security
      • RisikomanagementNormen und Standards zu Risikomanagement
      • Business ManagementBest Practice zu Business Management
      • IT ManagementNormen und Best Practice zu IT-Management
    • Weiteres dieser Kategorie
      • BCM, SCM, DR

    • Schlagwörter

      • access control audit biometrie business business continuity business management cloud communication cyber security data centres data security evaluation financial framework IACS information security infrastructure integrity ISMS kryptographie management system monitoring network pii planning portfolio management privacy process assessment process management programme management project management protection recovery plan risk risk assessment risk management security and resilience security framework security management security techniques service management system security telecommunication vocabulary withdrawn

    Copyright 2024 - FH St.Pölten