Information Security
Thomas Liedtke
* Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.
Sozialwissenschaften, Recht, Wirtschaft / Allgemeines, Lexika
Beschreibung
This book explains the most important technical terms and contents and assigns them to the corresponding areas. It also includes seemingly peripheral areas that play a role in information security. For instance, the topic complexes of functional Safety and Privacy are examined in terms of their similarities and differences. The book presents currently used attack patterns and how to protect against them. Protection must be implemented on both a technical level (e.g., through the use of cryptography) and on an organizational and personnel level (e.g., through appropriate management systems and awareness training). How can one determine how secure data is? How can relevant threats be identified that need protection? How do risk analyses proceed?
Kundenbewertungen
Cryptography, Cybersecurity Standards, IT-Service-Management, Cypersecuritiy, Cyber Resilience, Blockchain, Data Security, Laws, Types of Damage, Risk Assessment, Security Risk Analysis, IT, Information Security, Functional Safety (Safety), Attack Scenarios, Data Protection, Hacking, IT Security, IT Security Act