TY - JOUR A1 - Ahlers, Volker A1 - Hellmann, Bastian T1 - Usability Testing of Visual Policy Evaluation for Network Security Event Detection JF - Smart Data Analytics: Schriften des Forschungsclusters Smart Data Analytics 2020 N2 - The network security framework VisITMeta allows the visual evaluation and management of security event detection policies. By means of a "what-if" simulation the sensitivity of policies to specific events can be tested and adjusted. This paper presents the results of a user study for testing the usability of the approach by measuring the correct completion of given tasks as well as the user satisfaction by means of the system usability scale. KW - Network Security KW - Policy Evaluation KW - Information Visualization KW - Visual Analytics KW - Usability Testing KW - Rechnernetz KW - Computersicherheit KW - Visual Analytics KW - Benutzerfreundlichkeit Y1 - 2020 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:bsz:960-opus4-18311 SP - 94 EP - 101 ER - TY - JOUR A1 - Disterer, Georg T1 - Systematizing IT Risks JF - Journal of Information Security N2 - IT risks — risks associated with the operation or use of information technology — have taken on great importance in business, and IT risk management is accordingly important in the science and practice of information management. Therefore, it is necessary to systematize IT risks in order to plan, manage and control for different risk-specific measures. In order to choose and implement suitable measures for managing IT risks, effect-based and causebased procedures are necessary. These procedures are explained in detail for IT security risks because of their special importance. KW - Computersicherheit KW - IT Risk KW - IT Security Risk KW - IT Risk Management KW - COBIT KW - ISO 27000 Y1 - 2019 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:bsz:960-opus4-15547 SN - 2153-1242 IS - 10 SP - 237 EP - 249 ER - TY - JOUR A1 - Niemann, Karl-Heinz T1 - Organisation der ITSicherheit in der Produktion : in zehn Schritten zur sicheren Produktionsanlage JF - atp magazin N2 - Der folgende Beitrag befasst sich mit der IT-Sicherheit von Produktionsanlagen aus Betreibersicht. Hierbei liegt der Fokus auf den organisatorischen Aspekten der IT-Sicherheit. In einer Bestandsaufnahme werden zunächst die Probleme herausgearbeitet, die entstehen, sofern sich eine Organisation im Wesentlichen auf technische Aspekte der IT-Sicherheit konzentriert. Daraus wird die Notwendigkeit organisatorischer Maßnahmen abgeleitet. Eine Betrachtung von Normen und Standards, die sich mit den organisatorischen Aspekten der IT-Sicherheit in der Produktion befassen, liefert das Grundgerüst für die Ableitung eines Maßnahmenplans. Der daraus resultierende 10-Punkte-Plan zur Umsetzung der IT-Sicherheit in der Produktion schließt den Beitrag ab. N2 - This article deals with the IT security of production plants from the operator‘s point of view. The focus is on the organizational aspects of IT security. The first step is to identify the problems that arise when an organization focuses essentially on technical aspects of IT security. Conclusions are drawn about the necessary organizational measures. An examination of regulations and standards that deal with the organizational aspects of IT security in production provides the basis for formulating an action plan. The 10-point plan for the implementation of IT security in production concludes the contribution. T2 - Organizational aspects of IT security in production : ten steps towards a secure production plant KW - IT-Sicherheit KW - Organisatorische Aspekte KW - Computersicherheit KW - Vorgehensmodell KW - Produktion KW - IT security KW - organizational aspects KW - procedural model Y1 - 2018 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:bsz:960-opus4-12931 SN - 2364-3137 VL - 2018 IS - 60(11-12) SP - 1 EP - 10 ER -