Logo des Repositoriums
 

Federal Cybersecurity Architecture and Information Security Management - Adoption and Diffusion of the NIS-2 Requirements

dc.contributor.authorRehbohm, Thomas
dc.contributor.authorMoses, Frank
dc.contributor.editorGunnar Auth
dc.contributor.editorTim Pidun
dc.date.accessioned2023-11-13T10:19:40Z
dc.date.available2023-11-13T10:19:40Z
dc.date.issued2023
dc.description.abstractEurope, the federal government, the federal states, municipalities, and their business enterprises are facing the challenges of a hybrid threat situation. At a time when information technology is growing faster than ever before, information cyber security and security management system (ISMS) assessment have become one of the most important aspects of most public sector organisations. The dependency on technology for almost every single process in public sector organisations has put ISMS at the top of the corporate agenda. For public organisations in particular, the NIS 2 Directive describes abstract requirements for the development of an ISMS. At the same time, minimum requirements should be defined that help municipal administration set up an information security management system quickly and easily. This paper summarizes the different requirements and generates a foundation for a rough procedural model, for implementing the upcoming requirements of the NIS 2 Directive quickly and easily in local governments. In particular, the current discussion focuses on securing ICT infrastructures and services of all providers of services of general interest. European and national regulations provide the framework for an appropriate response to this threat to the common good. The federal cybersecurity architecture of a member state such as Germany, presented here, must fit into the European context. Procedures for the implementation of information security management systems complement this theoretical model. This thesis presents a federal cybersecurity model.en
dc.identifier.doi10.18420/rvi2023-006
dc.identifier.isbn978-3-88579-735-7
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/42622
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartof6. Fachtagung Rechts- und Verwaltungsinformatik (RVI 2023)
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-341
dc.subjectSecurity Architecture
dc.subjectFederal Government Institutions
dc.titleFederal Cybersecurity Architecture and Information Security Management - Adoption and Diffusion of the NIS-2 Requirementsen
dc.typeText/Conference Paper
gi.citation.endPage28
gi.citation.publisherPlaceBonn
gi.citation.startPage14
gi.conference.date26.-27. October 2023
gi.conference.locationDresden
gi.conference.reviewfull
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
2.pdf
Größe:
524.64 KB
Format:
Adobe Portable Document Format