Skip to content
Home
FH St.Pölten
Kategorien
Herausgeber
Schlagwörter
Datenschutz
Suchen Sie Etwas?
Search this website
AIM – Amsterdam Information Management
ANSI/TIA-942 – Datenzentren
ArchiMate – Modelling Language
AS A7700 – Sichere Webapplikationen
ASL – Application Management
BABOK – Business Analyse
Balanced Scorecard – Strategische Planung
Betriebssicheres Rechenzentrum – Datenzentren
BiSL – Business Information Management
BS 10012 – Data protection
BS 8220-3 – Sicherheit von Gebäuden
BSI 100-3 – Risikomanagement
BSI 200-1 – ISMS
BSI 200-2 – Sicherheitsmanagementsystem
BSI 200-3 – Risikomanagement
BSI 200-4 – Notfallmanagement
BSI SSL/TLS – Übertragung von Daten
BSI-Standards
CIP-002-3 – Cyber Security
CIP-003-3 – Cyber Security management controls
CIP-004-3a – Cyber security training
CIP-005-3a – Eleectronic Security Perimeter
CIP-006-3c – Physical security
CIP-007-3a – System Security Management
CIP-008-3 – Incident reporting
CIP-009-3 – Recovery Plan
CMMI – Business Objective
COBIT 5 – Management
Datenschutzerklärung
DIN 50600 – Datenzentren
e-CF – ITK Kompetenzen
Embed iList
eSCM-CL – Client Organization
eSCM-SP – Capability Model
FH St.Pölten
ICB – Projektmanegment
IEC 62443-1-1 – Netzwerk/System Security
IEC 62443-2-1 – CSMS
IEC 62443-2-3 – Patch management
IEC 62443-2-4 – IACS
IEC 62443-3-1 – IACS
IEC 62443-3-3 – System Security
IEC-Standards
ISO 10116 – Modes of operation for an n-bit block cipher
ISO 10118-3 – Dedicated hash-functions
ISO 10181-x – Open Systems
ISO 10736 – Transport Layer Security
ISO 10745 – Upper Layer Security
ISO 11442 – Technical Product Documentation
ISO 11577 – Network Layer Security
ISO 11770 – Mechanisms using symmetric techniques
ISO 13491-1 – Secure cryptographic devices
ISO 13569 – Information security guidelines
ISO 13888-1 – Non-repudiation
ISO 14441 – Security and privacy requirements of EHR systems for use in conformity assessment
ISO 14888-1 – Digital signatures with appendix
ISO 15031-7 – Data Link Security
ISO 15287-2 – Standardized Application Environment Profile
ISO 15288 – System life cycle processes
ISO 15408-1 – Evaluation Criteria
ISO 15443-1 – IT security assurance
ISO 15446 – Guidance for the production of protection profiles and security targets
ISO 15504-10 – Safety extension
ISO 15764 – Extended data link security
ISO 15816 – Security information objects for access control
ISO 15945 – Specification of TTP services to support the application of digital signatures
ISO 15946-1 – Cryptographic techniques based on elliptic curves
ISO 17574 – Guidelines for security protection profiles
ISO 17839-1 – Biometric System-on-Card
ISO 18014-1 – Time-stamping services
ISO 18028-1 – Network security management
ISO 18028-4 – Securing remote access
ISO 18031 – Random bit generation
ISO 18033-1 – Encryption algorithms
ISO 18043 – Selection, deployment and operations of intrusion detection systems
ISO 18045 – Methodology for IT security evaluation
ISO 19092 – Biometrics
ISO 19772 – Authenticated encryption
ISO 19790 – Security requirements for cryptographic modules
ISO 19791 – Security assessment of operational systems
ISO 19792 – Security evaluation of biometrics
ISO 19794 – Biometric data interchange formats
ISO 19795-1 – Biometric performance testing and reporting
ISO 20000-1 – Service management system requirements
ISO 20000-2 – Guidance on the application of service management systems
ISO 20000-3 – Guidance on scope definition and applicability
ISO 20000-4 – Process reference model
ISO 20000-5 – Implementation guidance
ISO 20000-9 – Cloud Services
ISO 20000-x – ITSM
ISO 21500 – Project, programme and portfolio management
ISO 21827 – Capability Maturity Model®
ISO 22301 – Business continuity management systems
ISO 22313 – Guidance on the use of ISO 22301
ISO 22398 – Societal security guidelines
ISO 22399 – Guideline for incident preparedness and operational continuity management
ISO 2382 – Information Technology Vocabulary
ISO 24759 – Test requirements for cryptographic modules
ISO 24761 – Authentication context for biometrics
ISO 24762 – Guidelines for information and Communications technology disaster recovery services
ISO 27000 – Information security management systems
ISO 27001 – Information security management systems Requirements
ISO 27002 – ISMS Code of Practice
ISO 27003 – Information security management systems Guidance
ISO 27004 – Monitoring, measurement, analysis and evaluation
ISO 27005 – Guidance on managing information security risks
ISO 27006 – Requirements for bodies providing audit and certification of information security management systems
ISO 27007 – Guidelines for information security management systems auditing
ISO 27008 – Guidelines for Auditors
ISO 27010 – Information security management for inter-sector and inter-organizational communications
ISO 27011 – ISM Telecommunication Guidelines
ISO 27013 – Guidance on the integrated implementation
ISO 27014 – Governance of information security
ISO 27015 – ISM guidelines for financial services
ISO 27016 – ISM organizational economics
ISO 27017 – Code of practice for IS control for cloud services
ISO 27018 – Protection of PII in public clouds
ISO 27019 – ISM guidelines for energy utility industry
ISO 27031 – Guidelines for information and communication technology readiness for business continuity
ISO 27032 – Guidelines for Internet Security
ISO 27033-1 – Network security
ISO 27034-1 – Application security
ISO 27036-1 – Cybersecurity Supplier relationships
ISO 27038 – Specification for digital redaction
ISO 27039 – Selection, deployment and operations of intrusion detection and prevention systems
ISO 27040 – Storage security
ISO 27041 – Guidance on assuring suitability and adequacy of incident investigative method
ISO 27042 – Guidelines for the analysis and interpretation of digital evidence
ISO 27043 – Incident investigation principles and processes
ISO 28000 – Security management systems Requirements
ISO 29100 – Privacy Framework
ISO 29128 – Verification of cryptographic protocols
ISO 29151 – GPDR
ISO 31000 – Risk management Guidelines
ISO 31010 – Risk assessment techniques
ISO 33001 – Process assessment Concepts and terminology
ISO 33002 – Requirements for performing process assessment
ISO 33003 – Requirements for process measurement frameworks
ISO 33004 – Requirements for process reference, process assessment and maturity models
ISO 33014 – Guide for process improvement
ISO 33015 – Guidance for process risk determination
ISO 33020 – Process measurement framework for assessment of process capability
ISO 33030 – Process assessment guidance
ISO 33060 – Process assessment model for system life cycle processes
ISO 33061 – Process assessment model for software life cycle processes
ISO 33074 – Process capability assessment model for service management
ISO 38500 – Governance of IT for the organization
ISO 7064 – Check character systems
ISO 9564-1 – Personal Identification Number (PIN) management and security
ISO 9735-5 – Security rules for batch EDI
ISO 9735-7 – Security rules for batch EDI
ISO 9735-9 – Security key and certificate management message
ISO 9796-2 – Integer factorization based mechanisms
ISO 9797-1 – Mechanisms using a block cipher
ISO 9798-1 – Entity authentication
ISO Guide 73 – Risk management vocabulary
IT-CMF – Capability Maturity Framework
ITIL – Managing Services within the digital era
Lean IT
Mindmap
MoP – Management of portfolios
MoR – Management of Risk
MoV – Management of value
MSP – Managing Successful Programms
NIST 800-30 – Guide for Conducting Risk Assessments
NIST FIPS 200 – Minimum Security Requirements for Federal Information and Information Systems
NIST SP 1800-3 – Attribute Based Access Control
NIST SP 1800-4 – Mobile Device Security: Cloud and Hybrid Builds
NIST SP 500-299 – NIST Cloud Computing Security Reference Architecture
NIST SP 800-145 – The NIST Definition of Cloud Computing
NIST SP 800-153 – Guidelines for Securing Wireless Local Area Networks (WLANs)
NIST SP 800-34 – Contingency Planning Guide for Federal Information Systems
NIST SP 800-35 – Guide to Information Technology Security Services
NIST SP 800-39 – Managing Information Security Risk: Organization, Mission, and Information System View
NIST SP 800-45 – Guidelines on Electronic Mail Security
Normen und Standards
OPBOK – Outsourcing Professional Body of Knowledge
P3M3 – Portfolio, Programme, and Project Management Maturity Model
P3O – Portfolio, Programme and Project Offices
PCI DSS – Payment Card Industry Data Security Standard
PMBOK – Project Management Body of Knowledge
PRINCE2 – Projects in controlled environment
Projekt Normenwebsite
Scrum – Agile software development
Six Sigma – Process improvement through identifying deffects
SS 507 – ICT Disaster recovery
Suche basierend auf Kategorien
Suche basierend auf Schlagwörtern
Suche nach Herausgeber
TOGAF – EA Framework
Mindmap
Ich bin ein Platzhalter.