it-sicherheit/ it securityit-security-map.de/fileadmin/user_upload/it-sicherheit_it_security.pdf ·...
TRANSCRIPT
IT-Sicherheit/ IT SecurityRecht /Recht /Recht /
Recht /
Law Law Law
Law
Zivilrecht /Zivilrecht /Zivilrecht /
Zivilrecht /
Civil Law Civil Law Civil Law
Civil Law
Haftung / LiabilityHaftung / LiabilityHaftung / Liability
Haftung / Liability
IT-ComplianceIT-ComplianceIT-Compliance
IT-Compliance
E-CommerceE-CommerceE-Commerce
E-Commerce
Produkthaftung, Produzentenhaftung / Product- andProdukthaftung, Produzentenhaftung / Product- andProdukthaftung, Produzentenhaftung / Product- and
Produkthaftung, Produzentenhaftung / Product- and
Producer LiabilityProducer LiabilityProducer Liability
Producer Liability
Beweissicherheit, Prozessrecht / Evidence andBeweissicherheit, Prozessrecht / Evidence andBeweissicherheit, Prozessrecht / Evidence and
Beweissicherheit, Prozessrecht / Evidence and
Procedural LawProcedural LawProcedural Law
Procedural Law
Gewerblicher Rechtsschutz Gewerblicher Rechtsschutz Gewerblicher Rechtsschutz
Gewerblicher Rechtsschutz
/ / /
/
Intellectual Property andIntellectual Property andIntellectual Property and
Intellectual Property and
CompetiCompetiCompeti
Competi
tion Lawtion Lawtion Law
tion Law
IT-Vertragsrecht / IT Contract LawIT-Vertragsrecht / IT Contract LawIT-Vertragsrecht / IT Contract Law
IT-Vertragsrecht / IT Contract Law
Verbraucherrecht / Consumer RightsVerbraucherrecht / Consumer RightsVerbraucherrecht / Consumer Rights
Verbraucherrecht / Consumer Rights
Kartellrecht / Kartellrecht / Kartellrecht /
Kartellrecht /
Antitrust LawAntitrust LawAntitrust Law
Antitrust Law
Öffentliches Recht /Öffentliches Recht /Öffentliches Recht /
Öffentliches Recht /
Public Law Public Law Public Law
Public Law
Verfassungsrecht / Constitutional LawVerfassungsrecht / Constitutional LawVerfassungsrecht / Constitutional Law
Verfassungsrecht / Constitutional Law
Staatliche Schutzpflichten, IT- Sicherheitsgesetz, BSIG /Staatliche Schutzpflichten, IT- Sicherheitsgesetz, BSIG /Staatliche Schutzpflichten, IT- Sicherheitsgesetz, BSIG /
Staatliche Schutzpflichten, IT- Sicherheitsgesetz, BSIG /
State and government´s duties , IT Security RegulationsState and government´s duties , IT Security RegulationsState and government´s duties , IT Security Regulations
State and government´s duties , IT Security Regulations
Vergaberecht / Public Procurement LawVergaberecht / Public Procurement LawVergaberecht / Public Procurement Law
Vergaberecht / Public Procurement Law
nationales Datenschutzrecht / National Data Protectionnationales Datenschutzrecht / National Data Protectionnationales Datenschutzrecht / National Data Protection
nationales Datenschutzrecht / National Data Protection
LawLawLaw
Law
Polizeirecht, Ordnungsrecht / PolicePolizeirecht, Ordnungsrecht / PolicePolizeirecht, Ordnungsrecht / Police
Polizeirecht, Ordnungsrecht / Police
and Regulatory Lawand Regulatory Lawand Regulatory Law
and Regulatory Law
E-GovernanceE-GovernanceE-Governance
E-Governance
Verwaltungsrecht / Administrative LawVerwaltungsrecht / Administrative LawVerwaltungsrecht / Administrative Law
Verwaltungsrecht / Administrative Law
KRITIS, Gesundheit, Energie, Wasser, Ernährung,KRITIS, Gesundheit, Energie, Wasser, Ernährung,KRITIS, Gesundheit, Energie, Wasser, Ernährung,
KRITIS, Gesundheit, Energie, Wasser, Ernährung,
Finanzen, Verwaltung, Verkehr, Telekommunikation,Finanzen, Verwaltung, Verkehr, Telekommunikation,Finanzen, Verwaltung, Verkehr, Telekommunikation,
Finanzen, Verwaltung, Verkehr, Telekommunikation,
Medien / Critical InfrastructureMedien / Critical InfrastructureMedien / Critical Infrastructure
Medien / Critical Infrastructure
Rechtsinformatik /Rechtsinformatik /Rechtsinformatik /
Rechtsinformatik /
Legal Informatics Legal Informatics Legal Informatics
Legal Informatics
Europarecht /Europarecht /Europarecht /
Europarecht /
EU Law EU Law EU Law
EU LawCybercrimeCybercrimeCybercrime
Cybercrime
Datenschutzgrundverordnung (DSGVO) / General DataDatenschutzgrundverordnung (DSGVO) / General DataDatenschutzgrundverordnung (DSGVO) / General Data
Datenschutzgrundverordnung (DSGVO) / General Data
Protection Regulation) (GDPR)Protection Regulation) (GDPR)Protection Regulation) (GDPR)
Protection Regulation) (GDPR)
Strafrecht /Strafrecht /Strafrecht /
Strafrecht /
Criminal Law Criminal Law Criminal Law
Criminal Law
IT-Forensik / IT ForensicsIT-Forensik / IT ForensicsIT-Forensik / IT Forensics
IT-Forensik / IT Forensics
Gesellschaft/Gesellschaft/Gesellschaft/
Gesellschaft/
SocietySocietySociety
Society
gesamtgesellschaftlichgesamtgesellschaftlichgesamtgesellschaftlich
gesamtgesellschaftlich
click to editclick to editclick to edit
click to edit
Achtsamkeit/AwarenessAchtsamkeit/AwarenessAchtsamkeit/Awareness
Achtsamkeit/Awareness
politischpolitischpolitisch
politisch
Datenschutz/ Data ProtectionDatenschutz/ Data ProtectionDatenschutz/ Data Protection
Datenschutz/ Data Protection
Datensicherheit/ Data SecurityDatensicherheit/ Data SecurityDatensicherheit/ Data Security
Datensicherheit/ Data Security
individuellindividuellindividuell
individuell
usabilityusabilityusability
usability
Ökonomie/Ökonomie/Ökonomie/
Ökonomie/
EconomicsEconomicsEconomics
Economics
Anbieter/Anbieter/Anbieter/
Anbieter/
ProviderProviderProvider
Provider
Produkte/Produkte/Produkte/
Produkte/
Products (Soft-&Hardware) Products (Soft-&Hardware) Products (Soft-&Hardware)
Products (Soft-&Hardware)
Network SecurityNetwork SecurityNetwork Security
Network Security
FirewallFirewallFirewall
Firewall
Intrusion Detection & PreventionIntrusion Detection & PreventionIntrusion Detection & Prevention
Intrusion Detection & Prevention
Virtual Private NetworkVirtual Private NetworkVirtual Private Network
Virtual Private Network
Network Access ControlNetwork Access ControlNetwork Access Control
Network Access Control
Wireless SecurityWireless SecurityWireless Security
Wireless SecurityEndpoint SecurityEndpoint SecurityEndpoint Security
Endpoint SecurityPersonal FirewallPersonal FirewallPersonal Firewall
Personal Firewall
Antivirus, MalwareAntivirus, MalwareAntivirus, Malware
Antivirus, Malware
Application/Device ControlApplication/Device ControlApplication/Device Control
Application/Device Control
Mobile (Devices) SecurityMobile (Devices) SecurityMobile (Devices) Security
Mobile (Devices) Security
Communication SecurityCommunication SecurityCommunication Security
Communication Security
Messaging Server SecurityMessaging Server SecurityMessaging Server Security
Messaging Server Security
Messaging Client SecurityMessaging Client SecurityMessaging Client Security
Messaging Client Security
Web SecurityWeb SecurityWeb Security
Web Security
Web Browser SecurityWeb Browser SecurityWeb Browser Security
Web Browser Security
Web Server SecurityWeb Server SecurityWeb Server Security
Web Server Security
Data SecurityData SecurityData Security
Data Security
EncryptionEncryptionEncryption
Encryption
Data Loss PreventionData Loss PreventionData Loss Prevention
Data Loss Prevention
Digital Rights ManagementDigital Rights ManagementDigital Rights Management
Digital Rights Management
Crypto AcceleratorsCrypto AcceleratorsCrypto Accelerators
Crypto Accelerators
Identity & AccessIdentity & AccessIdentity & Access
Identity & Access
ManagementManagementManagement
ManagementUser Authorization ManagementUser Authorization ManagementUser Authorization Management
User Authorization Management
Strong AuthenticationStrong AuthenticationStrong Authentication
Strong AuthenticationSmartcardsSmartcardsSmartcards
SmartcardsPKI and Key ManagementPKI and Key ManagementPKI and Key Management
PKI and Key Management
Physical SecurityPhysical SecurityPhysical Security
Physical Security
Theft ProtectionTheft ProtectionTheft Protection
Theft Protection
Dienstleister/Dienstleister/Dienstleister/
Dienstleister/
ServicesServicesServices
Services
Security InsuranceSecurity InsuranceSecurity Insurance
Security Insurance
CyberinsurancesCyberinsurancesCyberinsurances
Cyberinsurances
Consulting ServicesConsulting ServicesConsulting Services
Consulting Services
Security/Risk AssessmentSecurity/Risk AssessmentSecurity/Risk Assessment
Security/Risk Assessment
Security Strategy & Architecture ServiceSecurity Strategy & Architecture ServiceSecurity Strategy & Architecture Service
Security Strategy & Architecture Service
Detection & Recovery ServicesDetection & Recovery ServicesDetection & Recovery Services
Detection & Recovery ServicesForensic/Incident InvestigationForensic/Incident InvestigationForensic/Incident Investigation
Forensic/Incident Investigation
Business Continuity/Disaster RecoveryBusiness Continuity/Disaster RecoveryBusiness Continuity/Disaster Recovery
Business Continuity/Disaster Recovery
Security Training and CertificationsSecurity Training and CertificationsSecurity Training and Certifications
Security Training and CertificationsCertificationCertificationCertification
Certification
Training and AwarenessTraining and AwarenessTraining and Awareness
Training and Awareness
Managed Security ServicesManaged Security ServicesManaged Security Services
Managed Security ServicesLog & Configuration ManagementLog & Configuration ManagementLog & Configuration Management
Log & Configuration Management
Cloud Security ServicesCloud Security ServicesCloud Security Services
Cloud Security Services
Anwender/Anwender/Anwender/
Anwender/
UserUserUser
User
Individuelle Nutzer/Individuelle Nutzer/Individuelle Nutzer/
Individuelle Nutzer/
Individual UsersIndividual UsersIndividual Users
Individual Users
Achtsamkeit/Achtsamkeit/Achtsamkeit/
Achtsamkeit/
AwarenessAwarenessAwareness
AwarenessWillingness-to-payWillingness-to-payWillingness-to-pay
Willingness-to-pay
Privacy ProtectionPrivacy ProtectionPrivacy Protection
Privacy Protection
UsabilityUsabilityUsability
Usability
Unternehmen/ EnterprisesUnternehmen/ EnterprisesUnternehmen/ Enterprises
Unternehmen/ Enterprises
Informatik/TechnikInformatik/TechnikInformatik/Technik
Informatik/Technik
NetworksNetworksNetworks
Networks
Cloud Computing SecurityCloud Computing SecurityCloud Computing Security
Cloud Computing Security
Mobile SecurityMobile SecurityMobile Security
Mobile SecurityInternet of ThingsInternet of ThingsInternet of Things
Internet of Things
Network SecurityNetwork SecurityNetwork Security
Network Security
SystemsSystemsSystems
Systems
Hardware SecurityHardware SecurityHardware Security
Hardware SecurityEmbedded SecurityEmbedded SecurityEmbedded Security
Embedded Security eee
e
Robustness/ResiliencRobustness/ResiliencRobustness/Resilienc
Robustness/Resilienc
Application AreasApplication AreasApplication Areas
Application Areas
Payment / BankingPayment / BankingPayment / Banking
Payment / Banking
Biometrie /Biometrie /Biometrie /
Biometrie /
Biometrics Biometrics Biometrics
BiometricsProduct ProtectionProduct ProtectionProduct Protection
Product Protection
AnonymizationAnonymizationAnonymization
Anonymization
Kryptografie / CryptographyKryptografie / CryptographyKryptografie / Cryptography
Kryptografie / Cryptography
CryptographyCryptographyCryptography
Cryptography
Domain-specific SecurityDomain-specific SecurityDomain-specific Security
Domain-specific Security
Industrial SecurityIndustrial SecurityIndustrial Security
Industrial Security
Automotive SecurityAutomotive SecurityAutomotive Security
Automotive SecurityGovernmental/Defense SecurityGovernmental/Defense SecurityGovernmental/Defense Security
Governmental/Defense Security
Network SecurityNetwork SecurityNetwork Security
Network Security
SoftwareSoftwareSoftware
Software Secure Software EngineeringSecure Software EngineeringSecure Software Engineering
Secure Software Engineering
Software SecuritySoftware SecuritySoftware Security
Software Security