Refine
Year of publication
- 2016 (56) (remove)
Document Type
- Article (13)
- Bachelor Thesis (13)
- Conference Proceeding (8)
- Report (8)
- Study Thesis (6)
- Working Paper (5)
- Book (1)
- Master's Thesis (1)
- Periodical Part (1)
Has Fulltext
- yes (56)
Is part of the Bibliography
- no (56)
Keywords
- Autobewerter (3)
- E-Learning (3)
- Grader (3)
- IT-Sicherheit (3)
- Java <Programmiersprache> (3)
- Programmieraufgabe (3)
- Programmierung (3)
- e-Assessment (3)
- Öffentliche Bibliothek (3)
- Übung <Hochschule> (3)
- Bachelorstudium (2)
- Benutzerfreundlichkeit (2)
- Computersicherheit (2)
- Computerunterstütztes Lernen (2)
- Forschungsdaten (2)
- JFLAP (2)
- JUnit (2)
- Java (2)
- Klassifikation (2)
- Konfiguration <Informatik> (2)
- LON-CAPA (2)
- Lernaufgabe (2)
- Open Access (2)
- SKOS (2)
- Semantic Web (2)
- Semantik (2)
- Softwaretest (2)
- Softwarewartung (2)
- Softwarewerkzeug (2)
- Theoretische Informatik (2)
- Thesaurus (2)
- API (1)
- ASD-STE 100 (1)
- Adsorption (1)
- Affektives Commitment (1)
- Aktives Zuhören (1)
- Allergie (1)
- Ampel (1)
- Aphasie (1)
- Arbeitsbezogene Erwartungen (1)
- Arbeitswelt (1)
- Aristoteles (1)
- Atomic force microscopy (1)
- Augmented Reality (1)
- Automatenlehre (1)
- Automatentheorie (1)
- Automation ML (1)
- Automatische Klassifikation (1)
- Automatische Sicherheitsanalyse (1)
- Bachelorstudiengang (1)
- Bearbeitung (1)
- Bedrohungsanalyse (1)
- Beeinflussung (1)
- Befragung (1)
- Bekleidungsindustrie (1)
- Benchmarking (1)
- Betriebswirtschaftslehre (1)
- Bewertungsaspekt (1)
- Bewertungsmaßstab (1)
- Bibliografische Beschreibung (1)
- Bibliothek (1)
- Bibliotheksführung (1)
- Bibliothekswebsite (1)
- C2C (1)
- Catalysts and Catalysis (1)
- Censorship (1)
- Chemical properties (1)
- Computerspiel (1)
- Computerunterstützter Unterricht (1)
- Contactless Payment (1)
- Cyberattacke (1)
- Cybersecurity (1)
- Data Mining (1)
- Datenanalyse (1)
- Datenmapping (1)
- Datenschutz (1)
- Density functional theory (1)
- Dichtefunktionalformalismus (1)
- Digital Natives (1)
- Digitale Verwaltung (1)
- Discovery Service (1)
- Discovery-System (1)
- Dritte-Person-Effekt (1)
- Dyslexie (1)
- E-Assessment (1)
- EMA (1)
- Edutainment (1)
- Einfache Sprache (1)
- Elderly (1)
- Electronic Payment (1)
- Enugu (1)
- Evaluation (1)
- Fehlerverhütung (1)
- Ferritic steels (1)
- Ferritischer Stahl (1)
- Flüchtlinge (1)
- Focus groups (1)
- Formale Sprache (1)
- Forschungsdateninfrastruktur (1)
- Forschungsdatenmanagement (1)
- Fragebogen (1)
- Freiluftsport (1)
- Funktionalisierung <Chemie> (1)
- Fußgänger (1)
- Gaming (1)
- Gedächtnis (1)
- Geistige Behinderung (1)
- Gender (1)
- General practitioners (1)
- Generation Y (1)
- Geregelte Sprache (1)
- Geschäftsmodell (1)
- Geschäftsmodellinnovation (1)
- Gesundheitsschaden (1)
- Graja (1)
- Graphen (1)
- Graphene (1)
- Grounded theory (1)
- Grundschule (1)
- Gruppenidentität (1)
- HSU/ UniBw H (1)
- Haber-Bosch-Verfahren (1)
- Haber–Bosch process (1)
- Handlungsempfehlungen (1)
- Handypayment (1)
- Hannover <Ortsname> (1)
- Health promotion (1)
- Healthy aging (1)
- Helmut-Schmidt-Universität (1)
- Hochschule Hannover (1)
- Hydrierung (1)
- Hydrogen embrittlement (1)
- Hydrogenation process (1)
- ICS Security (1)
- Influence-of-Presumed-Media-Influence-Ansatz (1)
- Informatikunterricht (1)
- Information Dissemination (1)
- Information materials (1)
- Informationsmanagement (1)
- Informationssicherheit (1)
- Inhaltserschließung (1)
- Interdisciplinary communication (1)
- Interdisziplinarität (1)
- Java <Programmiersprache> (1)
- Journalist (1)
- KIRON (1)
- Katalog 2.0 (1)
- Klein- und Mittelbetrieb (1)
- Knowledge Life Cycle (1)
- Koalitionsvertrag (1)
- Kontaktloses Bezahlen (1)
- Kontrollierte Sprache (1)
- Kontrolliertes Vokabular (1)
- Kooperation (1)
- LRS (1)
- Lactose intolerance (1)
- Lactoseintoleranz (1)
- Lebensmittelgroßhandel (1)
- Legasthenie (1)
- Lehre (1)
- Lehrevaluation (1)
- Leichte Sprache (1)
- Lernsoftware (1)
- Lesen (1)
- Leseschwierigkeit (1)
- Lesestörung (1)
- Licht (1)
- Linked Open Data (1)
- Lizenzen (1)
- M-Payment (1)
- Mannschaftssport (1)
- Marktanalyse (1)
- Marktpotenzial (1)
- Medien (1)
- Medium (1)
- Mobile Auskunft (1)
- Mobile Money Transfer (1)
- Mobile-Payment (1)
- Mobilfunkbasierende Bezahlung (1)
- Moderation (1)
- Mumbai, India (1)
- Nachhaltigkeit (1)
- Next Generation Catalogues (1)
- Nigeria (1)
- Nursing homes (1)
- Online-Katalog (1)
- Online-Medien (1)
- Ontologien (1)
- Open Data (1)
- Open Educational Resources (1)
- Open Government (1)
- Open-Access-Strategie (1)
- Outdoor (1)
- Partei (1)
- Patient care (1)
- Payment (1)
- Personas (1)
- Physician-nurse relations (1)
- Physician-rating website (1)
- Plasma processing (1)
- Poststroke depression (1)
- Prevention (1)
- ProFormA-Aufgabenformat (1)
- Produktion (1)
- Programmieren für Kinder (1)
- Public reporting (1)
- Qualitative research (1)
- Quality measures (1)
- Quality of health care (1)
- RDF (1)
- RDF <Informatik> (1)
- Raman spectroscopy (1)
- Region Hannover (1)
- Rivalität (1)
- Rotlichtverstoß (1)
- Roving Librarian (1)
- SPARQL (1)
- Schulinformatik (1)
- Scratch <Programmiersprache> (1)
- ScratchJr (1)
- Security Knowledge (1)
- Security Ontology (1)
- Sehvorgang (1)
- Sekundärkrankheit (1)
- Semantic Web, VIVO, Forschungsinformationssystem, Ontologie, Ontologie erweitern (1)
- Semiconductors (1)
- Server (1)
- Smartphone (1)
- Spielkonzept (1)
- Sportfan (1)
- Sports rivalry (1)
- Standardisierung (1)
- Straße (1)
- Studienarbeit (1)
- Studium (1)
- Target groups (1)
- Texten (1)
- Third-Person-Effekt (1)
- Transition metal chalcogenides (1)
- USFDA (1)
- Usability (1)
- Van der Waals forces (1)
- Van-der-Waals-Kraft (1)
- Verkehr (1)
- Verschlüsselung (1)
- Verstehen (1)
- Verständlichkeit (1)
- Wasserstoffversprödung (1)
- Web Server (1)
- Web-Server (1)
- Website (1)
- Wikidata (1)
- Wikimedia Commons (1)
- Wirtschaftsinformatik (1)
- Wirtschaftswissenschaft (1)
- Wissenschaftliche Bibliotheken (1)
- World Wide Web (1)
- XML (1)
- Zensur (1)
- Zielgruppendefinition (1)
- adult vaccines (1)
- bioplastics (1)
- biopolymers (1)
- clinical trials (1)
- comorbidity (1)
- context vectors (1)
- corrective actions (1)
- disidentification (1)
- distributional semantics (1)
- e-Government (1)
- education (1)
- emotionale Bindung (1)
- fächerübergreifendes Lernen (1)
- health services research (1)
- identity threat (1)
- income (1)
- influence of presumed media influence approach (1)
- land use (1)
- maldigestion (1)
- market data facts (1)
- medical devices (1)
- mobile Bibliothek (1)
- online media (1)
- process routes (1)
- reciprocity (1)
- recommender systems (1)
- routine data (1)
- situation-awareness (1)
- smart buildings (1)
- supervised machine learning (1)
- thesauri (1)
- third-person effect (1)
- university students (1)
- water use (1)
- Überwachtes Lernen (1)
Industrial Control Systems (ICS) succumb to an ever evolving variety of threats. Additionally, threats are increasing in number and get more complex. This requires a holistic and up-to-date security concept for ICS as a whole. Usually security concepts are applied and updated based on regularly performed ICS security assessments. Such ICS security assessments require high effort and extensive knowledge about ICS and its security. This is often a problem for small and mediumsized enterprises (SME), which do not have sufficient respective sufficiently skilled human resources. This paper defines in a first step requirements on the knowledge needed to perform an ICS security assessment and the life cycle of this knowledge. Afterwards the ICS security knowledge and its life cycle are developed and discussed considering the requirements and related work.