Risikomanagement in der Cybersecurity:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | German |
Veröffentlicht: |
Brunn am Gebirge
TÜV Austria Fachverlag
2019
|
Ausgabe: | 1. Auflage |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | 155 Seiten Illustrationen, Diagramme 22.5 cm x 16 cm |
ISBN: | 9783903255142 3903255149 |
Internformat
MARC
LEADER | 00000nam a22000008c 4500 | ||
---|---|---|---|
001 | BV046213468 | ||
003 | DE-604 | ||
005 | 20200723 | ||
007 | t | ||
008 | 191024s2019 au a||| |||| 00||| ger d | ||
015 | |a 19,N43 |2 dnb | ||
016 | 7 | |a 1197153950 |2 DE-101 | |
020 | |a 9783903255142 |c kart. : EUR 54.89 (DE), EUR 54.89 (AT) |9 978-3-903255-14-2 | ||
020 | |a 3903255149 |9 3-903255-14-9 | ||
024 | 3 | |a 9783903255142 | |
035 | |a (OCoLC)1127298620 | ||
035 | |a (DE-599)DNB1197153950 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a ger | |
044 | |a au |c AT | ||
049 | |a DE-706 |a DE-1050 |a DE-860 | ||
084 | |a PZ 3700 |0 (DE-625)141172: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 000 |2 sdnb | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Vogt, Tom |d ca. 20./21. Jh. |e Verfasser |0 (DE-588)1199322237 |4 aut | |
245 | 1 | 0 | |a Risikomanagement in der Cybersecurity |c Tom Vogt |
250 | |a 1. Auflage | ||
264 | 1 | |a Brunn am Gebirge |b TÜV Austria Fachverlag |c 2019 | |
300 | |a 155 Seiten |b Illustrationen, Diagramme |c 22.5 cm x 16 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Risikomanagement |0 (DE-588)4121590-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | |a Risikomanager/innen, Risikobeauftragte, Qualitätsmanager/innen, Geschäftsführer/innen, IT-Fachkräfte, Techniker/innen, Juristen, Personalfachbearbeiter, an Cybersecurity interessierte Personen | ||
653 | |a Benutzerfehler | ||
653 | |a Cyberangriffe | ||
653 | |a Cybersecurity | ||
653 | |a Hackerangriffe | ||
653 | |a ISO 27001 | ||
653 | |a Risikoidentifikation | ||
653 | |a Risikomanagement | ||
653 | |a Risikomanagementsystem | ||
689 | 0 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 1 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 1 | |5 DE-604 | |
710 | 2 | |a TÜV Austria Akademie |0 (DE-588)10368345-8 |4 pbl | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031592313&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-031592313 |
Datensatz im Suchindex
_version_ | 1804180608461570048 |
---|---|
adam_text | INHALTSVERZEICHNIS
1
EINFUEHRUNG
.........................................................................................
11
1.1
ANMERKUNGEN
ZUM
BUCH
..........................................................................................................
13
2
RISIKO
..................................................................................................
14
2.1
WAS
IST
RISIKO?
...........................................................................................................................
14
2.2
RANDNOTIZ
....................................................................................................................................
15
2.3
WEITERE
BEGRIFFE
.........................................................................................................................
16
2.4
BEISPIELE
......................................................................................................................................
19
3
RISIKOMANAGEMENT
..........................................................................
21
3.1
WAS
IST
RISIKOMANAGEMENT?
.....................................................................................................
21
3.1.1
ERFASSUNG.....................................................................................................................................
21
3.1.2
BEWERTUNG
....................................................................................................................................
21
3.1.3
BEHANDLUNG
..................................................................................................................................
21
3.1.4
KONTINUIERLICHE
VERBESSERUNG
........................................................................................................
23
3.2
RANDNOTIZ
....................................................................................................................................
24
3.3
ZIELE
.............................................................................................................................................
24
3.3.1
HANDHABUNG
AUF
RISIKEN
BEKOMMEN
.........................................................................................
24
3.3.2
TRANSPARENZ
SCHAFFEN
.....................................................................................................................
24
3.3.3
REDUZIERUNG
VON
RISIKEN
..............................................................................................................
25
3.3.4
...
AUF
EINE
SYSTEMATISCHE
ART
UND
WEISE
......................................................................................
25
3.4
NORMIERUNG
................................................................................................................................
25
3.5
EINFUEHRUNG
VON
RISIKOMANAGEMENT
........................................................................................
26
3.5.1
PRE-MORTEM
.................................................................................................................................
26
3.6
ROLLEN
UND
VERANTWORTLICHKEITEN
.............................................................................................
27
3.6.1
RISIKOMANAGER
.............................................................................................................................
28
3.6.2
RISIKOEIGNER
.................................................................................................................................
28
3.6.3
RISIKOENTSCHEIDER
.........................................................................................................................
29
3.6.4
PROZESS-,
SYSTEM-UND
DOKUMENTENEIGNER
....................................................................................
29
3.6.5
STAKEHOLDER/INTERESSIERTE
PARTEIEN
................................................................................................
29
3.7
KOMMUNIKATION
.........................................................................................................................
30
3.8
ZUSAMMENFASSUNG
.....................................................................................................................
30
4
KONTEXT
..............................................................................................
31
4.1
EINLEITUNG
....................................................................................................................................
31
4.2
ANWENDUNGSBEREICH
..................................................................................................................
32
4.3
METHODEN
....................................................................................................................................
33
4.4
KRITERIEN
......................................................................................................................................
33
4.5
ORGANISATION
................................................................................................................................
34
ANWENDUNGSBEISPIEL
................................................................................................................
35
5
RISIKOIDENTIFIKATION
............................................................................
37
5.1
EINLEITUNG
...................................................................................................................................
37
5.2
ABLEITUNG
AUS
WERTEN
................................................................................................................
38
5.3
THREAT
MODELING
........................................................................................................................
41
5.3.1
DFD
+STRIDE
........................................................................................................................
41
5.3.2
ATTACK
TREES
.................................................................................................................................
43
5.3.3
WEITERE
METHODEN
........................................................................................................................
44
5.4
PRE-MORTEM-ADAPTION
.............................................................................................................
45
5.5
UNBEKANNTE
BEDROHUNGEN
.......................................................................................................
46
5.6
EXKURS:
ANGREIFER
......................................................................................................................
47
5.7
EXKURS:
SCHWACHSTELLEN
.............................................................................................................
51
ANWENDUNGSBEISPIEL
................................................................................................................
53
6
RISIKOANALYSE
....................................................................................
56
6.1
EINLEITUNG
...................................................................................................................................
56
6.2
PROGNOSEN
...................................................................................................................................
57
6.2.1
INTUITION
.....................................................................................................................................
57
6.3
METHODENUEBERBLICK
....................................................................................................................
60
6.4
QUALITATIVER
ANSATZ
....................................................................................................................
60
6.4.1
EXKURS:
SEMI-QUANTITATIVE
VERFAHREN
..........................................................................................
62
6.4.2
KORREKTE
VERWENDUNG
..................................................................................................................
64
6.5
SCORING-VERFAHREN
......................................................................................................................
66
6.6
QUANTITATIVE
METHODEN
...........................................................................................................
68
6.6.1
WAHRSCHEINLICHKEIT
ODER
FREQUENZ
..............................................................................................
69
6.6.2
QUANTIFIZIERUNG
VON
AUSWIRKUNGEN
............................................................................................
71
6.6.3
BERUECKSICHTIGUNG
VON
UNGEWISSHEIT
............................................................................................
72
6.6.4
MONTE-CARLO-SIMULATION
...........................................................................................................
74
6.6.5
FAKTOREN
.....................................................................................................................................
78
6.6.6
ABSCHAETZUNGEN
.............................................................................................................................
83
6.6.7
VERTEILUNGSFUNKTIONEN.................................................................................................................
91
6.7
MODELLIERUNG
.............................................................................................................................
100
6.8
AD-HOC-RISIKOANALYSE
................................................................................................................
103
6.9
EXISTENZBEDROHENDE
RISIKEN
.....................................................................................................
104
6.9.1
QUALITATIVE
ANALYSE
....................................................................................................................
105
6.9.2
QUANTITATIVE
ANALYSE
..................................................................................................................
105
6.9.3
AKZEPTANZ
...................................................................................................................................
106
6.10
KOSTEN-NUTZEN-BETRACHTUNG
....................................................................................................
107
ANWENDUNGSBEISPIEL
................................................................................................................
109
7
RISIKOBEHANDLUNG
............................................................................
115
7.1
EINLEITUNG
...................................................................................................................................
115
7.2
RESTRISIKO
UND
GRENZERTRAG
.......................................................................................................
116
7.3
STRATEGIEN
...................................................................................................................................
117
7.3.1
VERMEIDUNG
.................................................................................................................................
118
7.3.2
REDUKTION
...................................................................................................................................
119
7.3.3
TRANSFER
........................................................................................................................................
120
7.3.4
AKZEPTANZ
....................................................................................................................................
120
7.3.5
ANDERE
STRATEGIEN
.........................................................................................................................
121
7.4
TYPISCHE
CYBERSECURITY-MASSNAHMEN
......................................................................................
122
7.4.1
FIREWALL,
PROXY
UND
ANDERE
FILTER
...............................................................................................
122
7.4.2
ANTIVIRUS
UND
ENDPOINT
PROTECTION
............................................................................................
124
7.4.3
HAERTUNG
......................................................................................................................................
124
7.4.4
NETZWERK-UND
SYSTEMARCHITEKTUR
...............................................................................................
125
7.4.5
IDSUND
IPS
................................................................................................................................
126
7.4.6
CLOUD-SECURITY
.............................................................................................................................
126
7.4.7
MDM
UND
EMM
.......................................................................................................................
127
7.4.8
KRYPTOGRAPHIE
..............................................................................................................................
128
7.4.9
AWARENESS
UND
SCHULUNGEN
..........................................................................................................
128
7.4.10
PROZESSE,
VERFAHREN
UND
HANDBUECHER
..........................................................................................
129
7.4.11
NACHWEISE
UND
LOGFILES
................................................................................................................
129
7.4.12
SOC
UND
SIEM
...........................................................................................................................
130
7.4.13
THREAT
INTELLIGENCE
.......................................................................................................................
130
7.5
MASSNAHMEN
................................................................................................................................
131
7.5.1
EXKURS:
RISIKOAVERSION
................................................................................................................
132
7.6
WIRKSAMKEIT
................................................................................................................................
134
7.7
ZUSAMMENFASSUNG
.....................................................................................................................
135
7.8
VERANTWORTLICHKEITEN
...................................................................................................................
136
7.9
NACHVERFOLGUNG
.........................................................................................................................
136
7.10
RISIKOBEHANDLUNGSPLAN
..............................................................................................................
136
7.11
EXKURS:
ABBILDUNG
BESTEHENDER
MASSNAHMEN
.........................................................................
137
ANWENDUNGSBEISPIEL
................................................................................................................
139
8
KONTINUIERLICHE
VERBESSERUNG
.........................................................
141
8.1
EINLEITUNG
....................................................................................................................................
141
8.2
MESSEN
UND
UEBERPRUEFEN
............................................................................................................
142
8.2.1
RISIKEN
.........................................................................................................................................
142
8.2.2
MASSNAHMEN
................................................................................................................................
142
8.3
DATEN
...........................................................................................................................................
144
8.4
ANPASSUNG
..................................................................................................................................
145
8.4.1
BETA-VERTEILUNG
...........................................................................................................................
145
8.4.2
BAYES.............................................................................................................................................
148
ANWENDUNGSBEISPIEL
................................................................................................................
149
9
PROZESSINTEGRATION
............................................................................
151
9.1
EINLEITUNG
....................................................................................................................................
151
9.2
SICHERHEITSVORFAELLE
.......................................................................................................................
151
9.3
HR-PROZESSE
................................................................................................................................
152
9.4
IT-PROZESSE
..................................................................................................................................
152
9.5
COMPLIANCE,
DATENSCHUTZ
ETC
....................................................................................................
153
9.6
ISMS,
QM
ETC
.............................................................................................................................
153
10
GESAMTBILD
UND
ABSCHLUSS
............................................................
154
10.1
ZUSAMMENFASSUNG
.....................................................................................................................
154
10.2
ABSCHLUSS
............................................................................................
155
|
any_adam_object | 1 |
author | Vogt, Tom ca. 20./21. Jh |
author_GND | (DE-588)1199322237 |
author_facet | Vogt, Tom ca. 20./21. Jh |
author_role | aut |
author_sort | Vogt, Tom ca. 20./21. Jh |
author_variant | t v tv |
building | Verbundindex |
bvnumber | BV046213468 |
classification_rvk | PZ 3700 ST 276 ST 277 |
ctrlnum | (OCoLC)1127298620 (DE-599)DNB1197153950 |
discipline | Rechtswissenschaft Allgemeines Informatik |
edition | 1. Auflage |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02510nam a22006378c 4500</leader><controlfield tag="001">BV046213468</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200723 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">191024s2019 au a||| |||| 00||| ger d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">19,N43</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1197153950</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783903255142</subfield><subfield code="c">kart. : EUR 54.89 (DE), EUR 54.89 (AT)</subfield><subfield code="9">978-3-903255-14-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3903255149</subfield><subfield code="9">3-903255-14-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783903255142</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1127298620</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1197153950</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">au</subfield><subfield code="c">AT</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-860</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3700</subfield><subfield code="0">(DE-625)141172:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">000</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Vogt, Tom</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1199322237</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Risikomanagement in der Cybersecurity</subfield><subfield code="c">Tom Vogt</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. Auflage</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Brunn am Gebirge</subfield><subfield code="b">TÜV Austria Fachverlag</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">155 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">22.5 cm x 16 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Risikomanager/innen, Risikobeauftragte, Qualitätsmanager/innen, Geschäftsführer/innen, IT-Fachkräfte, Techniker/innen, Juristen, Personalfachbearbeiter, an Cybersecurity interessierte Personen</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Benutzerfehler</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyberangriffe</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hackerangriffe</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">ISO 27001</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Risikoidentifikation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Risikomanagement</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Risikomanagementsystem</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">TÜV Austria Akademie</subfield><subfield code="0">(DE-588)10368345-8</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031592313&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031592313</subfield></datafield></record></collection> |
id | DE-604.BV046213468 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:38:28Z |
institution | BVB |
institution_GND | (DE-588)10368345-8 |
isbn | 9783903255142 3903255149 |
language | German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031592313 |
oclc_num | 1127298620 |
open_access_boolean | |
owner | DE-706 DE-1050 DE-860 |
owner_facet | DE-706 DE-1050 DE-860 |
physical | 155 Seiten Illustrationen, Diagramme 22.5 cm x 16 cm |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | TÜV Austria Fachverlag |
record_format | marc |
spelling | Vogt, Tom ca. 20./21. Jh. Verfasser (DE-588)1199322237 aut Risikomanagement in der Cybersecurity Tom Vogt 1. Auflage Brunn am Gebirge TÜV Austria Fachverlag 2019 155 Seiten Illustrationen, Diagramme 22.5 cm x 16 cm txt rdacontent n rdamedia nc rdacarrier Risikomanagement (DE-588)4121590-4 gnd rswk-swf Unternehmen (DE-588)4061963-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Risikomanager/innen, Risikobeauftragte, Qualitätsmanager/innen, Geschäftsführer/innen, IT-Fachkräfte, Techniker/innen, Juristen, Personalfachbearbeiter, an Cybersecurity interessierte Personen Benutzerfehler Cyberangriffe Cybersecurity Hackerangriffe ISO 27001 Risikoidentifikation Risikomanagement Risikomanagementsystem Unternehmen (DE-588)4061963-1 s Computersicherheit (DE-588)4274324-2 s Risikomanagement (DE-588)4121590-4 s DE-604 TÜV Austria Akademie (DE-588)10368345-8 pbl DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031592313&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Vogt, Tom ca. 20./21. Jh Risikomanagement in der Cybersecurity Risikomanagement (DE-588)4121590-4 gnd Unternehmen (DE-588)4061963-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4121590-4 (DE-588)4061963-1 (DE-588)4274324-2 |
title | Risikomanagement in der Cybersecurity |
title_auth | Risikomanagement in der Cybersecurity |
title_exact_search | Risikomanagement in der Cybersecurity |
title_full | Risikomanagement in der Cybersecurity Tom Vogt |
title_fullStr | Risikomanagement in der Cybersecurity Tom Vogt |
title_full_unstemmed | Risikomanagement in der Cybersecurity Tom Vogt |
title_short | Risikomanagement in der Cybersecurity |
title_sort | risikomanagement in der cybersecurity |
topic | Risikomanagement (DE-588)4121590-4 gnd Unternehmen (DE-588)4061963-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Risikomanagement Unternehmen Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031592313&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT vogttom risikomanagementindercybersecurity AT tuvaustriaakademie risikomanagementindercybersecurity |