Management Summary The SIFT method helps to check the credibility of online information. It consists of four steps: The method is [...]
Management Summary The Admiralty Code is a proven system for evaluating information sources that was originally developed for military intelligence [...]
Information security (IS) and business continuity (BC) are two essential management systems in today's networked world. In order to minimize the risks [...]
Management Summary Business Impact Analysis (BIA) is an essential component of a Business Continuity Management System (BCMS) and analyzes the effects [...]
Management Summary The classic protection goals of information security are confidentiality, integrity and availability. These three protection goals are often referred to as the CIA triad, [...]
Management Summary With the Insurance Supervisory Requirements for IT (VAIT), the German Federal Financial Supervisory Authority (BaFin) formulates clear expectations for the management and [...]