<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="de-AT">
	<id>https://mediawiki.fernfh.ac.at/mediawiki/index.php?action=history&amp;feed=atom&amp;title=Informationssicherheitsmanagement_-_Quellen</id>
	<title>Informationssicherheitsmanagement - Quellen - Versionsgeschichte</title>
	<link rel="self" type="application/atom+xml" href="https://mediawiki.fernfh.ac.at/mediawiki/index.php?action=history&amp;feed=atom&amp;title=Informationssicherheitsmanagement_-_Quellen"/>
	<link rel="alternate" type="text/html" href="https://mediawiki.fernfh.ac.at/mediawiki/index.php?title=Informationssicherheitsmanagement_-_Quellen&amp;action=history"/>
	<updated>2026-05-20T13:10:56Z</updated>
	<subtitle>Versionsgeschichte dieser Seite in FernFH MediaWiki</subtitle>
	<generator>MediaWiki 1.37.0</generator>
	<entry>
		<id>https://mediawiki.fernfh.ac.at/mediawiki/index.php?title=Informationssicherheitsmanagement_-_Quellen&amp;diff=1910&amp;oldid=prev</id>
		<title>JUNGBAUER Christoph am 24. Jänner 2022 um 15:36 Uhr</title>
		<link rel="alternate" type="text/html" href="https://mediawiki.fernfh.ac.at/mediawiki/index.php?title=Informationssicherheitsmanagement_-_Quellen&amp;diff=1910&amp;oldid=prev"/>
		<updated>2022-01-24T15:36:09Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;de-AT&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Nächstältere Version&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Version vom 24. Jänner 2022, 15:36 Uhr&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Zeile 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Zeile 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;br&gt;&amp;lt;hr&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;p&amp;gt;[CIS10] Information Systems Audit and Control Association (ISACA), Certified Information Security Manager (CISM), Review Manual 2010, 2010&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[COB12] COBIT 5 – Rahmenwerk für Governance und Management der Unternehmens-IT, ISACA, www.isaca.org, 2012&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[CSI01] Computer Security Institute 2001, in Information Security Management Handbook, Seite 346, http://www.gocsi.com&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[DSG00] Bundesgesetz über den Schutz personenbezogener Daten (Datenschutzgesetz 2000 - DSG 2000), Fassung vom 15.01.2015&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[FAR05] Jack A. Jones, An Introduction to Factor Analysis of Information Risk (FAIR), A framework for understanding, analyzing, and measuring information risk, Draft, Risk Management Insight, 2005&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[FRG07] Martin Fröhlich, Kurt Glasner (Hrsg.): IT Governance, Leitfaden für eine praxisgerechte Implementierung, Gabler, Wiesbaden 2007.&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISM03] Harold F. Tipton, Micki Krause: Information Security Management Handbook, Volume 4,Auerbach Publications, 2003&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISM14] Dieter Burgartz / Ralf Röhring (Hrsg.): Information Security Management, Praxishandbuch für Aufbau, Zertifizierung und Betrieb, Loseblattsammlung, TÜV Verlag, Köln, 41. Akt. Lieferung, 2014.&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISO00] ISO/IEC 27000:2014, Information technology – Security techniques – Information security management systems – Overview and vocabulary, Third edition, 2014-01-15&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISO01] ISO/IEC 27001:2013, Information technology – Security techniques – Information security management systems – Requirements, Second edition, 2013-10-01&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISO02] ISO/IEC 27002:2013, Information technology – Security techniques – Code of practice for information security controls, Second edition, 2013-10-01&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISO03] ISO 22301:2012, Societal security – Business continuity management systems – Requirements, First edition, 2012-05-15&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISO04] ISO 22313:2012, Societal security – Business continuity management systems – Guidance, First edition, 2012-12-12&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[IST07] Office of Government Commerce OCG, ITIL Service Transition, The Stationery Office (TSO), 2007&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[NIS02] Risk Management Guide for Information Technology Systems, Gary Stoneburner, Alice Goguen, Alexis Feringa, National Institute of Standards and Technology, USA, 2002&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[RFA00] John P. Kindinger, John L. Darby, Risk Factor Analysis – A New Qualitative Risk Management Tool, Probabilistic Risk and Hazards Analysis Group, Los Alamos National Laboratory, 2000&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[COB07] IT Governance Institute, CobiT 4.1 – Framework, Control Objectives, Management Guidelines, Maturity Models, IT Governance Institute, 2007&amp;lt;/p&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;p&amp;gt;[CIS10] Information Systems Audit and Control Association (ISACA), Certified Information Security Manager (CISM), Review Manual 2010, 2010&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[COB12] COBIT 5 – Rahmenwerk für Governance und Management der Unternehmens-IT, ISACA, www.isaca.org, 2012&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[CSI01] Computer Security Institute 2001, in Information Security Management Handbook, Seite 346, http://www.gocsi.com&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[DSG00] Bundesgesetz über den Schutz personenbezogener Daten (Datenschutzgesetz 2000 - DSG 2000), Fassung vom 15.01.2015&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[FAR05] Jack A. Jones, An Introduction to Factor Analysis of Information Risk (FAIR), A framework for understanding, analyzing, and measuring information risk, Draft, Risk Management Insight, 2005&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[FRG07] Martin Fröhlich, Kurt Glasner (Hrsg.): IT Governance, Leitfaden für eine praxisgerechte Implementierung, Gabler, Wiesbaden 2007.&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISM03] Harold F. Tipton, Micki Krause: Information Security Management Handbook, Volume 4,Auerbach Publications, 2003&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISM14] Dieter Burgartz / Ralf Röhring (Hrsg.): Information Security Management, Praxishandbuch für Aufbau, Zertifizierung und Betrieb, Loseblattsammlung, TÜV Verlag, Köln, 41. Akt. Lieferung, 2014.&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISO00] ISO/IEC 27000:2014, Information technology – Security techniques – Information security management systems – Overview and vocabulary, Third edition, 2014-01-15&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISO01] ISO/IEC 27001:2013, Information technology – Security techniques – Information security management systems – Requirements, Second edition, 2013-10-01&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISO02] ISO/IEC 27002:2013, Information technology – Security techniques – Code of practice for information security controls, Second edition, 2013-10-01&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISO03] ISO 22301:2012, Societal security – Business continuity management systems – Requirements, First edition, 2012-05-15&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISO04] ISO 22313:2012, Societal security – Business continuity management systems – Guidance, First edition, 2012-12-12&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[IST07] Office of Government Commerce OCG, ITIL Service Transition, The Stationery Office (TSO), 2007&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[NIS02] Risk Management Guide for Information Technology Systems, Gary Stoneburner, Alice Goguen, Alexis Feringa, National Institute of Standards and Technology, USA, 2002&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[RFA00] John P. Kindinger, John L. Darby, Risk Factor Analysis – A New Qualitative Risk Management Tool, Probabilistic Risk and Hazards Analysis Group, Los Alamos National Laboratory, 2000&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[COB07] IT Governance Institute, CobiT 4.1 – Framework, Control Objectives, Management Guidelines, Maturity Models, IT Governance Institute, 2007&amp;lt;/p&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>JUNGBAUER Christoph</name></author>
	</entry>
	<entry>
		<id>https://mediawiki.fernfh.ac.at/mediawiki/index.php?title=Informationssicherheitsmanagement_-_Quellen&amp;diff=1909&amp;oldid=prev</id>
		<title>JUNGBAUER Christoph: Die Seite wurde neu angelegt: „&lt;p&gt;[CIS10] Information Systems Audit and Control Association (ISACA), Certified Information Security Manager (CISM), Review Manual 2010, 2010&lt;/p&gt;&lt;p&gt;[COB12] COBIT 5 – Rahmenwerk für Governance und Management der Unternehmens-IT, ISACA, www.isaca.org, 2012&lt;/p&gt;&lt;p&gt;[CSI01] Computer Security Institute 2001, in Information Security Management Handbook, Seite 346, http://www.gocsi.com&lt;/p&gt;&lt;p&gt;[DSG00] Bundesgesetz über den Schutz personenbezogener Daten (Datensc…“</title>
		<link rel="alternate" type="text/html" href="https://mediawiki.fernfh.ac.at/mediawiki/index.php?title=Informationssicherheitsmanagement_-_Quellen&amp;diff=1909&amp;oldid=prev"/>
		<updated>2022-01-24T15:35:54Z</updated>

		<summary type="html">&lt;p&gt;Die Seite wurde neu angelegt: „&amp;lt;p&amp;gt;[CIS10] Information Systems Audit and Control Association (ISACA), Certified Information Security Manager (CISM), Review Manual 2010, 2010&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[COB12] COBIT 5 – Rahmenwerk für Governance und Management der Unternehmens-IT, ISACA, www.isaca.org, 2012&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[CSI01] Computer Security Institute 2001, in Information Security Management Handbook, Seite 346, http://www.gocsi.com&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[DSG00] Bundesgesetz über den Schutz personenbezogener Daten (Datensc…“&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Neue Seite&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;p&amp;gt;[CIS10] Information Systems Audit and Control Association (ISACA), Certified Information Security Manager (CISM), Review Manual 2010, 2010&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[COB12] COBIT 5 – Rahmenwerk für Governance und Management der Unternehmens-IT, ISACA, www.isaca.org, 2012&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[CSI01] Computer Security Institute 2001, in Information Security Management Handbook, Seite 346, http://www.gocsi.com&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[DSG00] Bundesgesetz über den Schutz personenbezogener Daten (Datenschutzgesetz 2000 - DSG 2000), Fassung vom 15.01.2015&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[FAR05] Jack A. Jones, An Introduction to Factor Analysis of Information Risk (FAIR), A framework for understanding, analyzing, and measuring information risk, Draft, Risk Management Insight, 2005&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[FRG07] Martin Fröhlich, Kurt Glasner (Hrsg.): IT Governance, Leitfaden für eine praxisgerechte Implementierung, Gabler, Wiesbaden 2007.&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISM03] Harold F. Tipton, Micki Krause: Information Security Management Handbook, Volume 4,Auerbach Publications, 2003&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISM14] Dieter Burgartz / Ralf Röhring (Hrsg.): Information Security Management, Praxishandbuch für Aufbau, Zertifizierung und Betrieb, Loseblattsammlung, TÜV Verlag, Köln, 41. Akt. Lieferung, 2014.&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISO00] ISO/IEC 27000:2014, Information technology – Security techniques – Information security management systems – Overview and vocabulary, Third edition, 2014-01-15&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISO01] ISO/IEC 27001:2013, Information technology – Security techniques – Information security management systems – Requirements, Second edition, 2013-10-01&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISO02] ISO/IEC 27002:2013, Information technology – Security techniques – Code of practice for information security controls, Second edition, 2013-10-01&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISO03] ISO 22301:2012, Societal security – Business continuity management systems – Requirements, First edition, 2012-05-15&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[ISO04] ISO 22313:2012, Societal security – Business continuity management systems – Guidance, First edition, 2012-12-12&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[IST07] Office of Government Commerce OCG, ITIL Service Transition, The Stationery Office (TSO), 2007&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[NIS02] Risk Management Guide for Information Technology Systems, Gary Stoneburner, Alice Goguen, Alexis Feringa, National Institute of Standards and Technology, USA, 2002&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[RFA00] John P. Kindinger, John L. Darby, Risk Factor Analysis – A New Qualitative Risk Management Tool, Probabilistic Risk and Hazards Analysis Group, Los Alamos National Laboratory, 2000&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;[COB07] IT Governance Institute, CobiT 4.1 – Framework, Control Objectives, Management Guidelines, Maturity Models, IT Governance Institute, 2007&amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>JUNGBAUER Christoph</name></author>
	</entry>
</feed>