Informationssicherheitsmanagement - Quellen: Unterschied zwischen den Versionen
(Die Seite wurde neu angelegt: „<p>[CIS10] Information Systems Audit and Control Association (ISACA), Certified Information Security Manager (CISM), Review Manual 2010, 2010</p><p>[COB12] COBIT 5 – Rahmenwerk für Governance und Management der Unternehmens-IT, ISACA, www.isaca.org, 2012</p><p>[CSI01] Computer Security Institute 2001, in Information Security Management Handbook, Seite 346, http://www.gocsi.com</p><p>[DSG00] Bundesgesetz über den Schutz personenbezogener Daten (Datensc…“) |
|||
Zeile 1: | Zeile 1: | ||
<br><hr> | |||
<p>[CIS10] Information Systems Audit and Control Association (ISACA), Certified Information Security Manager (CISM), Review Manual 2010, 2010</p><p>[COB12] COBIT 5 – Rahmenwerk für Governance und Management der Unternehmens-IT, ISACA, www.isaca.org, 2012</p><p>[CSI01] Computer Security Institute 2001, in Information Security Management Handbook, Seite 346, http://www.gocsi.com</p><p>[DSG00] Bundesgesetz über den Schutz personenbezogener Daten (Datenschutzgesetz 2000 - DSG 2000), Fassung vom 15.01.2015</p><p>[FAR05] Jack A. Jones, An Introduction to Factor Analysis of Information Risk (FAIR), A framework for understanding, analyzing, and measuring information risk, Draft, Risk Management Insight, 2005</p><p>[FRG07] Martin Fröhlich, Kurt Glasner (Hrsg.): IT Governance, Leitfaden für eine praxisgerechte Implementierung, Gabler, Wiesbaden 2007.</p><p>[ISM03] Harold F. Tipton, Micki Krause: Information Security Management Handbook, Volume 4,Auerbach Publications, 2003</p><p>[ISM14] Dieter Burgartz / Ralf Röhring (Hrsg.): Information Security Management, Praxishandbuch für Aufbau, Zertifizierung und Betrieb, Loseblattsammlung, TÜV Verlag, Köln, 41. Akt. Lieferung, 2014.</p><p>[ISO00] ISO/IEC 27000:2014, Information technology – Security techniques – Information security management systems – Overview and vocabulary, Third edition, 2014-01-15</p><p>[ISO01] ISO/IEC 27001:2013, Information technology – Security techniques – Information security management systems – Requirements, Second edition, 2013-10-01</p><p>[ISO02] ISO/IEC 27002:2013, Information technology – Security techniques – Code of practice for information security controls, Second edition, 2013-10-01</p><p>[ISO03] ISO 22301:2012, Societal security – Business continuity management systems – Requirements, First edition, 2012-05-15</p><p>[ISO04] ISO 22313:2012, Societal security – Business continuity management systems – Guidance, First edition, 2012-12-12</p><p>[IST07] Office of Government Commerce OCG, ITIL Service Transition, The Stationery Office (TSO), 2007</p><p>[NIS02] Risk Management Guide for Information Technology Systems, Gary Stoneburner, Alice Goguen, Alexis Feringa, National Institute of Standards and Technology, USA, 2002</p><p>[RFA00] John P. Kindinger, John L. Darby, Risk Factor Analysis – A New Qualitative Risk Management Tool, Probabilistic Risk and Hazards Analysis Group, Los Alamos National Laboratory, 2000</p><p>[COB07] IT Governance Institute, CobiT 4.1 – Framework, Control Objectives, Management Guidelines, Maturity Models, IT Governance Institute, 2007</p> | <p>[CIS10] Information Systems Audit and Control Association (ISACA), Certified Information Security Manager (CISM), Review Manual 2010, 2010</p><p>[COB12] COBIT 5 – Rahmenwerk für Governance und Management der Unternehmens-IT, ISACA, www.isaca.org, 2012</p><p>[CSI01] Computer Security Institute 2001, in Information Security Management Handbook, Seite 346, http://www.gocsi.com</p><p>[DSG00] Bundesgesetz über den Schutz personenbezogener Daten (Datenschutzgesetz 2000 - DSG 2000), Fassung vom 15.01.2015</p><p>[FAR05] Jack A. Jones, An Introduction to Factor Analysis of Information Risk (FAIR), A framework for understanding, analyzing, and measuring information risk, Draft, Risk Management Insight, 2005</p><p>[FRG07] Martin Fröhlich, Kurt Glasner (Hrsg.): IT Governance, Leitfaden für eine praxisgerechte Implementierung, Gabler, Wiesbaden 2007.</p><p>[ISM03] Harold F. Tipton, Micki Krause: Information Security Management Handbook, Volume 4,Auerbach Publications, 2003</p><p>[ISM14] Dieter Burgartz / Ralf Röhring (Hrsg.): Information Security Management, Praxishandbuch für Aufbau, Zertifizierung und Betrieb, Loseblattsammlung, TÜV Verlag, Köln, 41. Akt. Lieferung, 2014.</p><p>[ISO00] ISO/IEC 27000:2014, Information technology – Security techniques – Information security management systems – Overview and vocabulary, Third edition, 2014-01-15</p><p>[ISO01] ISO/IEC 27001:2013, Information technology – Security techniques – Information security management systems – Requirements, Second edition, 2013-10-01</p><p>[ISO02] ISO/IEC 27002:2013, Information technology – Security techniques – Code of practice for information security controls, Second edition, 2013-10-01</p><p>[ISO03] ISO 22301:2012, Societal security – Business continuity management systems – Requirements, First edition, 2012-05-15</p><p>[ISO04] ISO 22313:2012, Societal security – Business continuity management systems – Guidance, First edition, 2012-12-12</p><p>[IST07] Office of Government Commerce OCG, ITIL Service Transition, The Stationery Office (TSO), 2007</p><p>[NIS02] Risk Management Guide for Information Technology Systems, Gary Stoneburner, Alice Goguen, Alexis Feringa, National Institute of Standards and Technology, USA, 2002</p><p>[RFA00] John P. Kindinger, John L. Darby, Risk Factor Analysis – A New Qualitative Risk Management Tool, Probabilistic Risk and Hazards Analysis Group, Los Alamos National Laboratory, 2000</p><p>[COB07] IT Governance Institute, CobiT 4.1 – Framework, Control Objectives, Management Guidelines, Maturity Models, IT Governance Institute, 2007</p> |
Aktuelle Version vom 24. Jänner 2022, 17:36 Uhr
[CIS10] Information Systems Audit and Control Association (ISACA), Certified Information Security Manager (CISM), Review Manual 2010, 2010
[COB12] COBIT 5 – Rahmenwerk für Governance und Management der Unternehmens-IT, ISACA, www.isaca.org, 2012
[CSI01] Computer Security Institute 2001, in Information Security Management Handbook, Seite 346, http://www.gocsi.com
[DSG00] Bundesgesetz über den Schutz personenbezogener Daten (Datenschutzgesetz 2000 - DSG 2000), Fassung vom 15.01.2015
[FAR05] Jack A. Jones, An Introduction to Factor Analysis of Information Risk (FAIR), A framework for understanding, analyzing, and measuring information risk, Draft, Risk Management Insight, 2005
[FRG07] Martin Fröhlich, Kurt Glasner (Hrsg.): IT Governance, Leitfaden für eine praxisgerechte Implementierung, Gabler, Wiesbaden 2007.
[ISM03] Harold F. Tipton, Micki Krause: Information Security Management Handbook, Volume 4,Auerbach Publications, 2003
[ISM14] Dieter Burgartz / Ralf Röhring (Hrsg.): Information Security Management, Praxishandbuch für Aufbau, Zertifizierung und Betrieb, Loseblattsammlung, TÜV Verlag, Köln, 41. Akt. Lieferung, 2014.
[ISO00] ISO/IEC 27000:2014, Information technology – Security techniques – Information security management systems – Overview and vocabulary, Third edition, 2014-01-15
[ISO01] ISO/IEC 27001:2013, Information technology – Security techniques – Information security management systems – Requirements, Second edition, 2013-10-01
[ISO02] ISO/IEC 27002:2013, Information technology – Security techniques – Code of practice for information security controls, Second edition, 2013-10-01
[ISO03] ISO 22301:2012, Societal security – Business continuity management systems – Requirements, First edition, 2012-05-15
[ISO04] ISO 22313:2012, Societal security – Business continuity management systems – Guidance, First edition, 2012-12-12
[IST07] Office of Government Commerce OCG, ITIL Service Transition, The Stationery Office (TSO), 2007
[NIS02] Risk Management Guide for Information Technology Systems, Gary Stoneburner, Alice Goguen, Alexis Feringa, National Institute of Standards and Technology, USA, 2002
[RFA00] John P. Kindinger, John L. Darby, Risk Factor Analysis – A New Qualitative Risk Management Tool, Probabilistic Risk and Hazards Analysis Group, Los Alamos National Laboratory, 2000
[COB07] IT Governance Institute, CobiT 4.1 – Framework, Control Objectives, Management Guidelines, Maturity Models, IT Governance Institute, 2007