Anhang C: Verwendete Abkürzungen
ADK |
Additional Decryption Key |
AES |
Advanced Encryption Standard (Kryptoalgorithmus) |
BCM |
Business Continuity Management |
BDSG |
Bundesdatenschutzgesetz |
BIA |
Business Impact Analysis |
BSI |
Bundesamt für Sicherheit in der Informationstechnik |
BYOA |
Bring Your Own Apps |
BYOD |
Bring Your Own Device |
CCTA |
(UK) Central Computing and Telecommunications Agency |
CERT |
Computer Emergency Response Team |
CISA |
Certified Information Systems Auditor |
COBIT |
Control Objectives for Information and Related Technology |
COPE |
Company owned, personally enabled |
CSI |
Continual Service Improvement |
CYOD |
Choose Your Own Device |
DDoS |
Distributed Denial of Service ... |
Get Mobile IT-Infrastrukturen - Management, Sicherheit und Compliance now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.