Anhang C: Verwendete Abkürzungen

ADK

Additional Decryption Key

AES

Advanced Encryption Standard (Kryptoalgorithmus)

BCM

Business Continuity Management

BDSG

Bundesdatenschutzgesetz

BIA

Business Impact Analysis

BSI

Bundesamt für Sicherheit in der Informationstechnik

BYOA

Bring Your Own Apps

BYOD

Bring Your Own Device

CCTA

(UK) Central Computing and Telecommunications Agency

CERT

Computer Emergency Response Team

CISA

Certified Information Systems Auditor

COBIT

Control Objectives for Information and Related Technology

COPE

Company owned, personally enabled

CSI

Continual Service Improvement

CYOD

Choose Your Own Device

DDoS

Distributed Denial of Service ...

Get Mobile IT-Infrastrukturen - Management, Sicherheit und Compliance now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.