FAQ: frequently (not) asked questions
Basic concepts and facts are presented and explained here in a concise manner.
The FAQ on information security provides a comprehensive overview of the most important questions and answers on the subject. It is aimed at anyone who wants to understand why information security is important, what requirements exist and how these can be implemented in practice. The overview covers key terms, protection goals and principles and shows how information security is embedded in the overall structure of compliance (i.e. adherence to laws and guidelines).
In the following GLOSSARY below, we explain the most important basic terms to help you find your way through the jungle of gibberish and buzzwords.
An information security management system is a structured framework that defines policies, procedures and measures for securing information at RPTU. The ISMS aims to define, control, monitor and continuously improve information security. The term is used in various standards such as ISO/IEC 27001 or in the BSI IT baseline protection compendium which defines requirements for the introduction and certification of an ISMS. The ISMS helps RPTU to identify its security risks, implement suitable measures and review them regularly to ensure the confidentiality, integrity and availability of information.
The information security guideline or information security guideline (ISLL) is a strategic document that sets out the basic principles and objectives of information security at RPTU. It describes which security objectives are to be pursued, how they are to be implemented and the responsibilities of the various departments within the organization. The guideline is binding for all employees and serves as a guide for dealing with sensitive information. It should also emphasize the legal framework and the need to comply with these regulations.