Basic Protection
IT baseline protection (protection) encompasses standard security measures for typical IT systems, with normal protection needs.
The detection and assessment of weak points in IT systems often occurs by way of a risk assessment, wherein a threat potential is assessed, and the costs of damage to the system (or group of similar systems) are investigated individually. This approach is very time-intensive and very expensive.
Protection may rather proceed from a typical threat, which applies to 80% of cases, and recommend adequate countermeasures against it. In this way, a security level can be achieved, viewed as adequate in most cases, and, consequently, replace the more expensive risk assessment. In cases in which security needs are greater, such protection can be used as a basis for further action.
Read more about this topic: IT Baseline Protection Catalogs
Famous quotes containing the words basic and/or protection:
“Theres one basic rule you should remember about development charts that will save you countless hours of worry.... The fact that a child passes through a particular developmental stage is always more important than the age of that child when he or she does it. In the long run, it really doesnt matter whether you learn to walk at ten months or fifteen monthsas long as you learn how to walk.”
—Lawrence Kutner (20th century)
“Without infringing on the liberty we so much boast, might we not ask our professional Mayor to call upon the smokers, have them register their names in each ward, and then appoint certain thoroughfares in the city for their use, that those who feel no need of this envelopment of curling vapor, to insure protection may be relieved from a nuisance as disgusting to the olfactories as it is prejudicial to the lungs.”
—Harriot K. Hunt (18051875)