it-sicherheit/ it securityit-security-map.de/fileadmin/user_upload/it-sicherheit_it_security.pdf ·...

1
IT-Sicherheit/ IT Security Recht / Law Zivilrecht / Civil Law Haftung / Liability IT-Compliance E-Commerce Produkthaftung, Produzentenhaftung / Product- and Producer Liability Beweissicherheit, Prozessrecht / Evidence and Procedural Law Gewerblicher Rechtsschutz / Intellectual Property and Competi tion Law IT-Vertragsrecht / IT Contract Law Verbraucherrecht / Consumer Rights Kartellrecht / Antitrust Law Öffentliches Recht / Public Law Verfassungsrecht / Constitutional Law Staatliche Schutzpflichten, IT- Sicherheitsgesetz, BSIG / State and government´s duties , IT Security Regulations Vergaberecht / Public Procurement Law nationales Datenschutzrecht / National Data Protection Law Polizeirecht, Ordnungsrecht / Police and Regulatory Law E-Governance Verwaltungsrecht / Administrative Law KRITIS, Gesundheit, Energie, Wasser, Ernährung, Finanzen, Verwaltung, Verkehr, Telekommunikation, Medien / Critical Infrastructure Rechtsinformatik / Legal Informatics Europarecht / EU Law Cybercrime Datenschutzgrundverordnung (DSGVO) / General Data Protection Regulation) (GDPR) Strafrecht / Criminal Law IT-Forensik / IT Forensics Gesellschaft/ Society gesamtgesellschaftlich click to edit Achtsamkeit/Awareness politisch Datenschutz/ Data Protection Datensicherheit/ Data Security individuell usability Ökonomie/ Economics Anbieter/ Provider Produkte/ Products (Soft-&Hardware) Network Security Firewall Intrusion Detection & Prevention Virtual Private Network Network Access Control Wireless Security Endpoint Security Personal Firewall Antivirus, Malware Application/Device Control Mobile (Devices) Security Communication Security Messaging Server Security Messaging Client Security Web Security Web Browser Security Web Server Security Data Security Encryption Data Loss Prevention Digital Rights Management Crypto Accelerators Identity & Access Management User Authorization Management Strong Authentication Smartcards PKI and Key Management Physical Security Theft Protection Dienstleister/ Services Security Insurance Cyberinsurances Consulting Services Security/Risk Assessment Security Strategy & Architecture Service Detection & Recovery Services Forensic/Incident Investigation Business Continuity/Disaster Recovery Security Training and Certifications Certification Training and Awareness Managed Security Services Log & Configuration Management Cloud Security Services Anwender/ User Individuelle Nutzer/ Individual Users Achtsamkeit/ Awareness Willingness-to-pay Privacy Protection Usability Unternehmen/ Enterprises Informatik/Technik Networks Cloud Computing Security Mobile Security Internet of Things Network Security Systems Hardware Security Embedded Security e Robustness/Resilienc Application Areas Payment / Banking Biometrie / Biometrics Product Protection Anonymization Kryptografie / Cryptography Cryptography Domain-specific Security Industrial Security Automotive Security Governmental/Defense Security Network Security Software Secure Software Engineering Software Security

Upload: others

Post on 11-Sep-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IT-Sicherheit/ IT Securityit-security-map.de/fileadmin/user_upload/IT-Sicherheit_IT_Security.pdf · IT-Sicherheit/ IT Security Recht / Recht / Law Law Zivilrecht / Zivilrecht / Civil

IT-Sicherheit/ IT SecurityRecht /Recht /Recht /

Recht /

Law Law Law

Law

Zivilrecht /Zivilrecht /Zivilrecht /

Zivilrecht /

Civil Law Civil Law Civil Law

Civil Law

Haftung / LiabilityHaftung / LiabilityHaftung / Liability

Haftung / Liability

IT-ComplianceIT-ComplianceIT-Compliance

IT-Compliance

E-CommerceE-CommerceE-Commerce

E-Commerce

Produkthaftung, Produzentenhaftung / Product- andProdukthaftung, Produzentenhaftung / Product- andProdukthaftung, Produzentenhaftung / Product- and

Produkthaftung, Produzentenhaftung / Product- and

Producer LiabilityProducer LiabilityProducer Liability

Producer Liability

Beweissicherheit, Prozessrecht / Evidence andBeweissicherheit, Prozessrecht / Evidence andBeweissicherheit, Prozessrecht / Evidence and

Beweissicherheit, Prozessrecht / Evidence and

Procedural LawProcedural LawProcedural Law

Procedural Law

Gewerblicher Rechtsschutz Gewerblicher Rechtsschutz Gewerblicher Rechtsschutz

Gewerblicher Rechtsschutz

/ / /

/

Intellectual Property andIntellectual Property andIntellectual Property and

Intellectual Property and

CompetiCompetiCompeti

Competi

tion Lawtion Lawtion Law

tion Law

IT-Vertragsrecht / IT Contract LawIT-Vertragsrecht / IT Contract LawIT-Vertragsrecht / IT Contract Law

IT-Vertragsrecht / IT Contract Law

Verbraucherrecht / Consumer RightsVerbraucherrecht / Consumer RightsVerbraucherrecht / Consumer Rights

Verbraucherrecht / Consumer Rights

Kartellrecht / Kartellrecht / Kartellrecht /

Kartellrecht /

Antitrust LawAntitrust LawAntitrust Law

Antitrust Law

Öffentliches Recht /Öffentliches Recht /Öffentliches Recht /

Öffentliches Recht /

Public Law Public Law Public Law

Public Law

Verfassungsrecht / Constitutional LawVerfassungsrecht / Constitutional LawVerfassungsrecht / Constitutional Law

Verfassungsrecht / Constitutional Law

Staatliche Schutzpflichten, IT- Sicherheitsgesetz, BSIG /Staatliche Schutzpflichten, IT- Sicherheitsgesetz, BSIG /Staatliche Schutzpflichten, IT- Sicherheitsgesetz, BSIG /

Staatliche Schutzpflichten, IT- Sicherheitsgesetz, BSIG /

State and government´s duties , IT Security RegulationsState and government´s duties , IT Security RegulationsState and government´s duties , IT Security Regulations

State and government´s duties , IT Security Regulations

Vergaberecht / Public Procurement LawVergaberecht / Public Procurement LawVergaberecht / Public Procurement Law

Vergaberecht / Public Procurement Law

nationales Datenschutzrecht / National Data Protectionnationales Datenschutzrecht / National Data Protectionnationales Datenschutzrecht / National Data Protection

nationales Datenschutzrecht / National Data Protection

LawLawLaw

Law

Polizeirecht, Ordnungsrecht / PolicePolizeirecht, Ordnungsrecht / PolicePolizeirecht, Ordnungsrecht / Police

Polizeirecht, Ordnungsrecht / Police

and Regulatory Lawand Regulatory Lawand Regulatory Law

and Regulatory Law

E-GovernanceE-GovernanceE-Governance

E-Governance

Verwaltungsrecht / Administrative LawVerwaltungsrecht / Administrative LawVerwaltungsrecht / Administrative Law

Verwaltungsrecht / Administrative Law

KRITIS, Gesundheit, Energie, Wasser, Ernährung,KRITIS, Gesundheit, Energie, Wasser, Ernährung,KRITIS, Gesundheit, Energie, Wasser, Ernährung,

KRITIS, Gesundheit, Energie, Wasser, Ernährung,

Finanzen, Verwaltung, Verkehr, Telekommunikation,Finanzen, Verwaltung, Verkehr, Telekommunikation,Finanzen, Verwaltung, Verkehr, Telekommunikation,

Finanzen, Verwaltung, Verkehr, Telekommunikation,

Medien / Critical InfrastructureMedien / Critical InfrastructureMedien / Critical Infrastructure

Medien / Critical Infrastructure

Rechtsinformatik /Rechtsinformatik /Rechtsinformatik /

Rechtsinformatik /

Legal Informatics Legal Informatics Legal Informatics

Legal Informatics

Europarecht /Europarecht /Europarecht /

Europarecht /

EU Law EU Law EU Law

EU LawCybercrimeCybercrimeCybercrime

Cybercrime

Datenschutzgrundverordnung (DSGVO) / General DataDatenschutzgrundverordnung (DSGVO) / General DataDatenschutzgrundverordnung (DSGVO) / General Data

Datenschutzgrundverordnung (DSGVO) / General Data

Protection Regulation) (GDPR)Protection Regulation) (GDPR)Protection Regulation) (GDPR)

Protection Regulation) (GDPR)

Strafrecht /Strafrecht /Strafrecht /

Strafrecht /

Criminal Law Criminal Law Criminal Law

Criminal Law

IT-Forensik / IT ForensicsIT-Forensik / IT ForensicsIT-Forensik / IT Forensics

IT-Forensik / IT Forensics

Gesellschaft/Gesellschaft/Gesellschaft/

Gesellschaft/

SocietySocietySociety

Society

gesamtgesellschaftlichgesamtgesellschaftlichgesamtgesellschaftlich

gesamtgesellschaftlich

click to editclick to editclick to edit

click to edit

Achtsamkeit/AwarenessAchtsamkeit/AwarenessAchtsamkeit/Awareness

Achtsamkeit/Awareness

politischpolitischpolitisch

politisch

Datenschutz/ Data ProtectionDatenschutz/ Data ProtectionDatenschutz/ Data Protection

Datenschutz/ Data Protection

Datensicherheit/ Data SecurityDatensicherheit/ Data SecurityDatensicherheit/ Data Security

Datensicherheit/ Data Security

individuellindividuellindividuell

individuell

usabilityusabilityusability

usability

Ökonomie/Ökonomie/Ökonomie/

Ökonomie/

EconomicsEconomicsEconomics

Economics

Anbieter/Anbieter/Anbieter/

Anbieter/

ProviderProviderProvider

Provider

Produkte/Produkte/Produkte/

Produkte/

Products (Soft-&Hardware) Products (Soft-&Hardware) Products (Soft-&Hardware)

Products (Soft-&Hardware)

Network SecurityNetwork SecurityNetwork Security

Network Security

FirewallFirewallFirewall

Firewall

Intrusion Detection & PreventionIntrusion Detection & PreventionIntrusion Detection & Prevention

Intrusion Detection & Prevention

Virtual Private NetworkVirtual Private NetworkVirtual Private Network

Virtual Private Network

Network Access ControlNetwork Access ControlNetwork Access Control

Network Access Control

Wireless SecurityWireless SecurityWireless Security

Wireless SecurityEndpoint SecurityEndpoint SecurityEndpoint Security

Endpoint SecurityPersonal FirewallPersonal FirewallPersonal Firewall

Personal Firewall

Antivirus, MalwareAntivirus, MalwareAntivirus, Malware

Antivirus, Malware

Application/Device ControlApplication/Device ControlApplication/Device Control

Application/Device Control

Mobile (Devices) SecurityMobile (Devices) SecurityMobile (Devices) Security

Mobile (Devices) Security

Communication SecurityCommunication SecurityCommunication Security

Communication Security

Messaging Server SecurityMessaging Server SecurityMessaging Server Security

Messaging Server Security

Messaging Client SecurityMessaging Client SecurityMessaging Client Security

Messaging Client Security

Web SecurityWeb SecurityWeb Security

Web Security

Web Browser SecurityWeb Browser SecurityWeb Browser Security

Web Browser Security

Web Server SecurityWeb Server SecurityWeb Server Security

Web Server Security

Data SecurityData SecurityData Security

Data Security

EncryptionEncryptionEncryption

Encryption

Data Loss PreventionData Loss PreventionData Loss Prevention

Data Loss Prevention

Digital Rights ManagementDigital Rights ManagementDigital Rights Management

Digital Rights Management

Crypto AcceleratorsCrypto AcceleratorsCrypto Accelerators

Crypto Accelerators

Identity & AccessIdentity & AccessIdentity & Access

Identity & Access

ManagementManagementManagement

ManagementUser Authorization ManagementUser Authorization ManagementUser Authorization Management

User Authorization Management

Strong AuthenticationStrong AuthenticationStrong Authentication

Strong AuthenticationSmartcardsSmartcardsSmartcards

SmartcardsPKI and Key ManagementPKI and Key ManagementPKI and Key Management

PKI and Key Management

Physical SecurityPhysical SecurityPhysical Security

Physical Security

Theft ProtectionTheft ProtectionTheft Protection

Theft Protection

Dienstleister/Dienstleister/Dienstleister/

Dienstleister/

ServicesServicesServices

Services

Security InsuranceSecurity InsuranceSecurity Insurance

Security Insurance

CyberinsurancesCyberinsurancesCyberinsurances

Cyberinsurances

Consulting ServicesConsulting ServicesConsulting Services

Consulting Services

Security/Risk AssessmentSecurity/Risk AssessmentSecurity/Risk Assessment

Security/Risk Assessment

Security Strategy & Architecture ServiceSecurity Strategy & Architecture ServiceSecurity Strategy & Architecture Service

Security Strategy & Architecture Service

Detection & Recovery ServicesDetection & Recovery ServicesDetection & Recovery Services

Detection & Recovery ServicesForensic/Incident InvestigationForensic/Incident InvestigationForensic/Incident Investigation

Forensic/Incident Investigation

Business Continuity/Disaster RecoveryBusiness Continuity/Disaster RecoveryBusiness Continuity/Disaster Recovery

Business Continuity/Disaster Recovery

Security Training and CertificationsSecurity Training and CertificationsSecurity Training and Certifications

Security Training and CertificationsCertificationCertificationCertification

Certification

Training and AwarenessTraining and AwarenessTraining and Awareness

Training and Awareness

Managed Security ServicesManaged Security ServicesManaged Security Services

Managed Security ServicesLog & Configuration ManagementLog & Configuration ManagementLog & Configuration Management

Log & Configuration Management

Cloud Security ServicesCloud Security ServicesCloud Security Services

Cloud Security Services

Anwender/Anwender/Anwender/

Anwender/

UserUserUser

User

Individuelle Nutzer/Individuelle Nutzer/Individuelle Nutzer/

Individuelle Nutzer/

Individual UsersIndividual UsersIndividual Users

Individual Users

Achtsamkeit/Achtsamkeit/Achtsamkeit/

Achtsamkeit/

AwarenessAwarenessAwareness

AwarenessWillingness-to-payWillingness-to-payWillingness-to-pay

Willingness-to-pay

Privacy ProtectionPrivacy ProtectionPrivacy Protection

Privacy Protection

UsabilityUsabilityUsability

Usability

Unternehmen/ EnterprisesUnternehmen/ EnterprisesUnternehmen/ Enterprises

Unternehmen/ Enterprises

Informatik/TechnikInformatik/TechnikInformatik/Technik

Informatik/Technik

NetworksNetworksNetworks

Networks

Cloud Computing SecurityCloud Computing SecurityCloud Computing Security

Cloud Computing Security

Mobile SecurityMobile SecurityMobile Security

Mobile SecurityInternet of ThingsInternet of ThingsInternet of Things

Internet of Things

Network SecurityNetwork SecurityNetwork Security

Network Security

SystemsSystemsSystems

Systems

Hardware SecurityHardware SecurityHardware Security

Hardware SecurityEmbedded SecurityEmbedded SecurityEmbedded Security

Embedded Security eee

e

Robustness/ResiliencRobustness/ResiliencRobustness/Resilienc

Robustness/Resilienc

Application AreasApplication AreasApplication Areas

Application Areas

Payment / BankingPayment / BankingPayment / Banking

Payment / Banking

Biometrie /Biometrie /Biometrie /

Biometrie /

Biometrics Biometrics Biometrics

BiometricsProduct ProtectionProduct ProtectionProduct Protection

Product Protection

AnonymizationAnonymizationAnonymization

Anonymization

Kryptografie / CryptographyKryptografie / CryptographyKryptografie / Cryptography

Kryptografie / Cryptography

CryptographyCryptographyCryptography

Cryptography

Domain-specific SecurityDomain-specific SecurityDomain-specific Security

Domain-specific Security

Industrial SecurityIndustrial SecurityIndustrial Security

Industrial Security

Automotive SecurityAutomotive SecurityAutomotive Security

Automotive SecurityGovernmental/Defense SecurityGovernmental/Defense SecurityGovernmental/Defense Security

Governmental/Defense Security

Network SecurityNetwork SecurityNetwork Security

Network Security

SoftwareSoftwareSoftware

Software Secure Software EngineeringSecure Software EngineeringSecure Software Engineering

Secure Software Engineering

Software SecuritySoftware SecuritySoftware Security

Software Security