Index
Index - Auswahl
    A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Hinweis:
Die Indexfunktionalität ist in dieser Demoversion nicht verfügbar.

Adaptiver Chosen-Ciphertext-Angriff6.3/3  
Adaptiver Chosen-Plaintext-Angriff6.3/3  
Adware5.3/3  
AH (Authentication Header)8.6/3  
Android10.2/4  10.3/6  10.3/11  
Angemessenheit2.3/3  2.3/5  
Angriff4.2/4  
Anomalie-Erkennung9.2/3  
Anonymität6.3/4  
App10.2/6  10.3/11  
App Store10.2/6  
Apple iOS10.2/4  
Appliance9.1/13  
Application Level Gateway9.1/8  
Application Level Proxy9.1/9  
Application Sandboxing10.3/11  
Authentication Header (AH)8.6/3  
Authentifizierung6.1/5  7.8/2  8.6/2  
Authentifizierungsverfahren6.3/2  
Authentizität6.3/4  
Awareness9.6/2  
 
top
 
B2B1.3/3  8.7/2  
B2C1.3/3  8.7/2  
B2E1.3/3  8.7/2  
B2P1.3/3  8.7/2  
B2X1.3/3  
Backup1.3/2  
Baselining5.3/4  
Bastion Host9.1/7  9.1/11  
BDSG (Bundesdatenschutzgesetz)8.7/8  
Bedrohung1.1/3  4.1/3  4.2/2  4.2/4  5.1/2  
Bedrohung, beabsichtigte1.1/3  
Bedrohung, unbeabsichtigte1.1/3  
Bedrohungsanalyse4.1/2  4.2/2  4.2/5  
Bedrohungsart1.1/3  
BlackBerry10.3/6  
BlackBerry OS10.2/4  
Black Box9.5/4  
Black-Box-Test3.4/7  
Blockchiffre6.3/5  6.3/7  
Blowfish8.3/7  
Bluetooth10.2/5  10.3/9  
Bootvirus5.2/6  
Branding (Mobile Computing)10.2/4  
Bring Your Own Device10.3/13  
Brute Force Attack6.3/6  6.6/3  
BSI (Bundesamt für Sicherheit in der Informationstechnik)3.2/2  11.1/4  
BSI-Grundschutzkataloge3.2/2  3.3/2  3.4/2  
Bugtrack4.3/2  
Bundesamt für Sicherheit in der Informationstechnik (BSI)3.2/2  11.1/4  
BYOD10.3/13  
 
top
 
CA (Certification Authority)7.2/3  7.3/2  7.8/2  7.9/4  9.3/3  
Cäsar-Chiffre6.1/4  
CBC-Modus (Cipher-Block-Chaining-Modus)6.3/8  6.4/4  
CERT (Computer Emergency Response Team)11.1/2  
Certificate Revocation List (CRL)7.7/2  7.9/4  
Certification Authority (CA)7.2/3  7.3/2  7.8/2  7.9/4  9.3/3  
Certification Paths7.9/3  
Challenge-and-Response-Protokoll8.2/3  
Chiffrat6.1/4  6.3/5  6.3/9  
Chosen-Ciphertext-Angriff6.3/3  8.6/6  
Chosen-Plaintext-Angriff6.3/3  
Cipher-Block-Chaining-Modus (CBC-Modus)6.3/8  6.4/4  
Ciphersuite8.2/3  
Ciphertext-only-Angriff6.3/3  
Circuit Level Proxy 9.1/9  
Client Write Key8.2/3  
Cloud Computing10.3/10  
Collaboration2.1/3  
Computer Emergency Response Team (CERT)11.1/2  
Computervirus1.1/2  5.1/2  5.2/2  9.4/2  10.3/3  
Computervirus, Mutant5.2/8  
Computervirus, polymorpher5.2/8  
Computervirus, Schutzmaßnahmen5.2/10  
Computervirus, speicherresidenter5.2/6  
Computervirus, Symptome für Befall5.2/9  
Computervirus, Typen 5.2/6  
Computerwurm1.1/2  5.1/2  5.2/3  5.3/2  9.3/2  9.4/2  
Container-Verschlüsselung8.8/2  
Cookie8.6/11  
CRL (Certificate Revocation List)7.7/2  7.9/4  
Cross-Site Scripting9.1/10  
Cryptographic Message Syntax8.4/3  
CrypTool6.3/9  
 
top
 
Data Encryption Standard (DES)6.3/7  8.3/7  
Datenintegrität6.1/5  
Datenschutzbestimmung8.7/8  
Demilitarisierte Zone (DMZ)5.4/4  9.1/12  9.4/2  
Denial-of-Service-Attacke (DoS)5.5/2  9.1/2  
DES (Data Encryption Standard)6.3/7  8.3/7  
DES-Algorithmus6.3/9  
Dialer5.3/3  9.4/2  
Dienst (Internet)8.2/4  8.3/2  8.6/2  
Diffie-Hellman-Schlüsselvereinbarung6.7/3  8.6/10  
DKS9.3/4  
DMZ (Demilitarisierte Zone)5.4/4  9.1/12  9.4/2  
DNS (Domain Name Service)8.3/4  9.3/4  
Domain Key Signature9.3/4  
Domain Name Service (DNS)8.3/4  9.3/4  
Drive-by-Download10.3/3  
Dual-Homed Gateway9.1/6  
Dual-Homed Host9.1/4  9.1/12  
 
top
 
E-Business1.3/3  
ECB-Modus (Electronic-Code-Book-Modus)6.3/8  
E-Commerce (Electronic Commerce)8.7/2  
Einweg-Hashfunktion6.5/2  
Electronic-Code-Book-Modus (ECB-Modus)6.3/8  
Electronic Commerce (E-Commerce)8.7/2  
E-Mail (Sicherheitsprobleme)9.3/2  
Encapsulating Security Payload (ESP)8.6/3  
Endgeräte, mobile10.2/2  10.3/1  
Enrollment7.4/3  
ESP (Encapsulating Security Payload)8.6/3  
 
top
 
Feistel-Chiffre6.3/7  
Festplattenverschlüsselung8.8/2  
File Transfer Protocol Secured (FTPS)8.2/4  
Fingerabdruck, elektronischer6.5/2  
Fingerprinting9.5/4  
Firewall1.1/2  5.3/3  5.4/4  9.1/2  
Firewall, reputationsbasierte9.1/10  
Firmware (Mobile Computing)10.2/4  
FTPS (File Transfer Protocol Secured)8.2/4  
 
top
 
Gateway9.1/3  9.1/6  
Geburtstagsangriff6.5/3  
Geheimhaltung1.1/2  
Geprüfter Online Shop8.7/4  
Gesamtrisiko4.4/3  
Google Android10.2/4  
GPRS10.3/7  
Grundschutzkataloge3.2/2  
GSM10.2/5  10.3/7  
 
top
 
Hacker5.1/2  
Handshake-Protokoll8.2/3  
Hashfunktion5.2/11  6.5/2  8.2/3  8.6/3  
Hashstring8.1/4  
Hashwert8.1/4  
Heuristische Suche5.2/12  
Host-Key-Paar8.3/5  
HTTPS (Hypertext Transfer Protocol Secured)8.2/4  
Hypertext Transfer Protocol Secured (HTTPS)8.2/4  
 
top
 
IDEA (International Data Encryption Algorithm)8.3/7  
IDS (Intrusion-Detection-System)9.2/2  
IETF (Internet Engineering Task Force)7.9/2  
IMSI-Catcher10.3/7  
Infiltration5.3/3  
Informationssicherheits-Managementsystem (ISMS)3.3/2  
Injektionsangriff9.1/10  
Instant Messaging2.1/3  
Integrität2.2/2  6.3/2  10.1/3  
International Data Encryption Algorithm (IDEA)8.3/7  
Internet Engineering Task Force (IETF)7.9/2  
Internet Security Association Key Management Protocol (ISAKMP)8.6/8  
Intrusion-Detection-System5.2/13  9.2/2  
iOS10.2/4  10.3/6  10.3/11  
IP Security (IPSec)8.6/2  
IP Security (IPSec) Protocol Suite8.6/2  
IPSec (IP Security)8.6/2  
IP-Spoofing9.1/4  9.1/7  
ISAKMP (Internet Security Association Key Management Protocol)8.6/8  
ISMS (Informationssicherheits-Managementsystem)3.3/2  
ISO270013.3/1  
ITSec3.4/1  3.4/9  
IT-Sicherheit1.1/2  1.2/2  
ITU-Standard X.5097.2/3  
 
top
 
Jailbreak10.3/12  
 
top
 
Katalog (IT-Grundschutzkataloge)3.2/2  
Kamera (Mobile Computing)10.2/5  
Kerckhoffsches Prinzip6.3/3  6.6/2  
Key7.2/2  
Keyserver8.5/3  
Known-Plaintext-Angriff6.3/3  
Kollisionsresistenz6.5/3  
Kommunikation, geheime6.1/2  6.1/4  
Konsistenz2.3/3  2.3/6  
Kryptoanalyse6.1/4  
Kryptographie6.1/4  6.3/2  6.3/4  6.6/2  8.3/7  
Kryptologie6.1/4  8.2/3  
 
top
 
Lastgenerator9.5/2  
Lastprofil9.5/2  
Lasttest9.5/2  
LDAP (Lightweight Directory Access Protocol)7.6/2  7.9/4  8.5/4  
Leitfrage3.1/2  3.4/2  
Lightweight Directory Access Protocol (LDAP)7.6/2  7.9/4  8.5/4  
LTE10.2/5  
 
top
 
MAC (Message Authentication Code)8.2/4  8.6/3  
Mainframe1.3/2  
Makrovirus5.2/6  5.2/8  
Malware5.1/2  5.3/2  10.3/3  
Man-in-the-Middle-Angriff8.2/3  10.3/8  
Maßnahme2.2/4  
Masterkey8.2/3  
MD5 (Message Digest 5)6.5/4  8.6/3  
Mehrfachverschlüsselung6.3/9  
Message Authentication Code (MAC)8.2/4  8.6/3  
Message Digest 5 (MD5)6.5/4  8.6/3  
Message Transfer Agent (MTA)9.3/4  9.4/2  
Mikropunkt-Technik6.2/2  
MIME-Objekt8.4/3  
Mobile Computing10.1/1  10.1/2  
Mobile Computing, Plattformen10.2/1  
Mobile Device Management10.1/2  10.3/14  
Mobilfunknetze10.2/5  
Mobilität10.1/3  
MTA (Message Transfer Agent)9.3/4  9.4/2  
Mutationsengine5.2/8  
 
top
 
NFC10.2/5  
Netzwerke, soziale10.3/3  
Nicht-autorisierte Person5.1/2  5.4/2  
Norm3.3/2  
Normelement3.3/2  
Notfallplan4.4/3  
NULL-Modus8.6/6  
Nutzdaten8.6/3  
 
top
 
Objekt4.2/2  4.2/5  
OAKLEY8.6/10  
One-Time-Pad6.3/6  
Open Code6.2/4  
OpenPGP8.5/4  9.3/3  
OpenSSH8.3/8  
OTA10.3/14  
 
top
 
Padding8.2/4  8.6/6  
Paketfilter9.1/3  9.1/11  
Payload8.6/3  
Penetrationstest2.4/3  9.5/3  
Perfect Forward Secrecy8.6/10  
Perimeternetzwerk5.4/4  
Personal Firewall9.1/13  
PGP (Pretty Good Privacy)7.9/3  8.4/2  8.5/2  9.3/3  
Phishing9.3/2  9.3/4  10.3/4  10.3/8  
PKCS (Public Key Cryptosystems)7.9/3  
PKI (Public Key Infrastructure)7.1/1  7.8/2  8.1/2  8.4/5  
PKI-Policy7.3/2  7.4/2  7.8/2  
Plattform, mobile10.2/3  
Policy2.5/2  
Portscan9.5/4  
Pretty Good Privacy (PGP)7.9/3  8.4/2  8.5/2  9.3/3  
Programmvirus5.2/6  
Project AG (Beispielunternehmen)2.1/3  
Protokoll, kryptographisches6.7/2  
Proxy, dedizierter9.1/9  
Proxy, generischer9.1/9  
Proxyserver9.1/6  9.1/8  
Prüfsumme5.3/4  
Prüfsummenprogramm5.2/10  
Prüfverfahren9.5/2  
Pseudozufallsfolge6.4/3  
Pseudozufallszahl6.4/4  
Pseudozufallsgenerator6.4/4  
Public Key7.2/2  
Public Key Cryptosystems (PKCS)7.9/3  
Public Key Infrastructure (PKI)7.1/3  7.8/2  8.1/2  
Public-Key-Eigenschaft8.1/3  
Public-Key-Kryptographie6.3/10  
Public-Key-Zertifikat8.2/3  
Putty8.3/8  
 
top
 
Quality Check 9.5/2  
 
top
 
RA (Registrierungsautorität)7.3/2  
Record-Schicht8.2/4  
Referenz2.5/2  
Referenztabelle4.2/3  
Regel2.5/2  
Registrierungsautorität (RA)7.3/2  
Request for Comment (RFC)8.4/3  
Restrisiko1.2/2  2.2/2  2.3/2  4.4/2  
RFC (Request for Comment) 8.4/3  
Richtlinie2.2/4  
Risiko1.2/2  2.2/2  2.3/2  4.1/3  4.4/2  
Risikoanalyse2.3/2  4.1/2  4.4/2  
Risikovermeidung4.4/2  
r-Kommando8.3/3  8.3/7  
Rogue Access Point10.3/8  
Rooten10.3/12  
Router9.1/3  
RSA-Verschlüsselung6.3/10  8.1/4  8.3/5  8.4/3  
Rundenfunktion6.3/7  
 
top
 
S/MIME7.9/3  8.4/2  
SA (Security Association)8.6/5  
Sandboxing10.3/11  
SATAN9.5/3  
Scanner (Virensuchprogramm)5.2/10  5.2/12  5.3/4  
Scanserver9.4/2  
Schadensbegrenzung4.4/3  
Schlüssel6.1/4  6.3/3  6.4/2  7.2/2  8.6/10  9.3/3  
Schlüssel, schwacher7.4/2  
Schlüsselaustausch8.6/10  
Schlüsselgenerierung6.6/3  7.4/2  
Schlüssellänge6.3/9  
Schlüsselmanagement6.6/3  7.1/2  
Schlüsselmedium7.5/2  
Schlüsselvereinbarungsprotokoll8.6/10  
Schlüsselverzeichnis7.6/2  7.7/2  
Schutzprofil3.4/7  
Schutzziel4.2/5  
Schwachstelle, operative4.3/2  5.4/3  
Schwachstelle, strukturelle4.3/2  5.4/3  
Schwachstellenanalyse4.1/2  4.3/2  
Schwachstellen-Scanner9.5/3  
Screened Host9.1/11  
Screened Subnet9.1/12  
Screening Router9.1/4  
Secure Electronic Transaction Protocol (SET-Protokoll)8.5/4  
Secure E-Mail7.9/2  
Secure Hash Algorithm (SHA)6.5/4  8.6/3  9.3/4  
Secure Mail Gateway9.3/6  
Secure Shell (SSH)8.3/2  9.1/11  
Secure Socket Layer (SSL)7.5/2  7.9/4  8.2/2  8.7/3  
Security Association (SA)8.6/5  
Security Policy2.5/2  
Security Scan2.4/3  4.3/3  
Semagramm6.2/4  
Sensordatum9.2/5  
Server Public Key8.3/5  
Server Write Key8.2/3  
Session Hijacking9.1/10  
Session Key8.3/5  
SET-Protokoll (Secure Electronic Transaction Protocol)8.5/4  
SF (private Signaturfunktion)8.1/3  
SHA (Secure Hash Algorithm)6.5/4  8.6/3  9.3/4  
Shoulder Surfing10.3/5  
Sicherheitsanalyse4.1/2  
Sicherheitsarchitektur1.3/3  2.2/3  
Sicherheitskonzept2.2/3  4.4/3  
Sicherheitslage4.1/3  
Sicherheitsleitlinie2.2/3  
Sicherheitsmanagement3.2/2  
Sicherheitsmaßnahme2.2/3  2.3/3  4.4/3  
Sicherheitsmaßnahme, Kontrolle der2.4/2  
Sicherheitsmerkblatt2.2/3  
Sicherheitsnetzwerk5.4/4  
Sicherheitsniveau2.3/3  2.4/3  
Sicherheitspolitik2.2/3  2.4/3  
Sicherheitsrichtlinie2.2/2  2.5/2  
Sicherheitsstandard2.2/4  3.1/2  
Sicherheitstool3.2/6  3.4/9  
Sicherheitsziel4.2/2  4.2/5  
Sicherstellung1.1/2  
Signatur5.2/12  
Signatur, blinde8.1/5  
Signatur, digitale6.3/2  6.5/4  7.1/2  7.8/2  8.1/2  
Signatureigenschaft8.1/3  
Signatur-Erkennung9.2/4  
Signaturfunktion, private (SF)8.1/3  
Signaturschema8.1/3  
Signaturtabelle5.2/12  
Simple Mail Transfer Protocol (SMTP)9.3/2  
Single-Homed Gateway9.1/6  
Single-Homed Host9.1/12  
Sitzungsschlüssel7.8/2  8.3/5  
Skalierung4.2/5  
SmartCard7.4/2  
SMTP (Simple Mail Transfer Protocol)9.3/2  
Social Engineering5.4/5  5.4/6  
Spam9.3/2  9.3/4  9.4/2  
Speicherkarte10.2/5  
SSH (Secure Shell)8.3/2  9.1/11  
SSH-Verbindungsaufbau8.3/5  
SSL (Secure Socket Layer)7.5/2  7.9/4  8.2/2  8.2/5  8.7/3  
SSL-Handshake8.2/3  
Standard X.5097.9/2  
Standard, internationaler3.3/2  
Station-to-Station Protocol8.6/10  
Steganographie6.1/4  6.2/2  
Steganographie, linguistische6.2/4  
Steganographie, rechnergestützte6.2/5  
Stromchiffre6.3/5  
Social Engineering10.3/3  
 
top
 
Tarnkappenvirus5.2/6  
TDDSG (Teledienstedatenschutzgesetz)8.7/8  
Teledienstedatenschutzgesetz (TDDSG)8.7/8  
Telnet7.9/4  8.3/2  9.1/11  
Test, dynamischer2.4/3  
TLS (Transport Layer Security)8.2/2  
Transport Layer Security (TLS)8.2/2  
Transport-Modus8.6/3  
Trapdoor-Einwegfunktion6.3/10  
Triple DES6.3/7  6.3/9  
Triple DES (3DES) 8.3/7  
Trojaner5.1/2  5.3/3  5.2/11  9.4/2  10.3/3  10.3/11  
Trust Level9.3/3  
Trustcenter7.4/3  7.8/2  11.1/3  
Trusted Third Party (TTP)6.6/4  7.2/2  
TTP (Trusted Third Party)6.6/4  7.2/2  
Tunnel, kryptographischer8.6/2  
Tunnel-Modus8.6/3  
 
top
 
Überdeckungsfreiheit2.3/3  2.3/7  
Überschlüsselung2.3/7  6.3/9  
Überwachungsrouter9.1/4  
Überwälzung4.4/3  
UMTS10.2/5  10.3/7  
USB10.2/5  
 
top
 
Verbindlichkeit6.3/4  
Verfügbarkeit2.2/2  10.1/3  
Verifikationseigenschaft8.1/3  
Verifikationsfunktion, öffentliche (VF)8.1/3  
Verlust4.1/3  
Verlusterwartung4.1/3  
Verschlüsselung1.1/2  2.5/2  6.1/4  6.3/2  8.6/2  
Verschlüsselung, asymmetrische6.3/9  6.6/3  8.1/2  8.2/3  8.3/7  
Verschlüsselung, symmetrische6.3/5  6.6/3  7.1/3  8.3/7  
Verschlüsselungsalgorithmus6.5/2  
Verschlüsselungsvirus5.2/7  
Versicherung4.4/3  
Vertraulichkeit2.2/2  6.3/4  10.1/3  
VF (öffentliche Verifikationsfunktion)8.1/3  
Video-Conferencing2.1/3  
Virenscanner1.3/2  
Virenscanner (Virensuchprogramm)5.2/10  5.2/12  5.3/4  9.4/2  
Virtual Private Network (VPN)2.3/7  6.3/2  8.6/2  
Virus1.1/2  5.1/2  5.2/2  9.4/2  
Vollständigkeit2.3/3  2.3/6  
Vollverschlüsselung8.8/2  
VPN (Virtual Private Network)2.3/7  6.3/2  8.6/2  
 
top
 
Wächterprogramm5.2/10  5.2/13  
Web Application Firewall9.1/10  
Web of Trust7.9/3  8.5/3  9.3/5  
White Box9.5/4  
WLAN10.2/5  10.3/8  
Windows Phone10.2/4  10.3/6  10.3/11  
Worst Case3.2/5  
 
top
 
XOR-Funktion6.3/6  
 
top
 
 
top
 
Zertifikat3.4/9  7.2/2  7.5/2  7.7/2  7.8/2  7.9/2  8.7/3  
Zertifikatsdatenbank7.5/2  
Zertifizierung7.2/2  7.3/2  7.5/2  9.3/3  
Zertifizierungsinstanz7.2/2  
Zufallszahl6.4/2  8.2/3  
Zugriffsschutz1.1/2  
 
top