vault backup: 2023-05-17 10:56:25
This commit is contained in:
1556
.obsidian/plugins/obsidian-completr/scanned_words.txt
vendored
1556
.obsidian/plugins/obsidian-completr/scanned_words.txt
vendored
File diff suppressed because it is too large
Load Diff
64
.obsidian/workspace.json
vendored
64
.obsidian/workspace.json
vendored
@@ -12,15 +12,34 @@
|
||||
"id": "4759485602209736",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "markdown",
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "Algorithmen und Datenstrukturen/VL/VL06/VL07.md",
|
||||
"mode": "source",
|
||||
"source": false
|
||||
"file": "Mathe/KW20/KW20-VekRau.pdf"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "f326435b89b1ed89",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb4/04-ueb_uebungsblatt.pdf"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "a1cff18c8134d922",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb5/05-ueb_uebungsblatt.pdf"
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
],
|
||||
"currentTab": 2
|
||||
},
|
||||
{
|
||||
"id": "47553fa673bb1eb6",
|
||||
@@ -36,8 +55,21 @@
|
||||
"file": "Informationssicherheit/Ueb4/04-ueb_uebungsblatt.pdf"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "b7379d224c27748f",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb5/Ueb5.md",
|
||||
"mode": "source",
|
||||
"source": false
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
],
|
||||
"currentTab": 1
|
||||
}
|
||||
],
|
||||
"direction": "vertical"
|
||||
@@ -111,7 +143,7 @@
|
||||
"state": {
|
||||
"type": "backlink",
|
||||
"state": {
|
||||
"file": "Algorithmen und Datenstrukturen/VL/VL06/VL07.md",
|
||||
"file": "Informationssicherheit/Ueb5/05-ueb_uebungsblatt.pdf",
|
||||
"collapseAll": false,
|
||||
"extraContext": false,
|
||||
"sortOrder": "alphabetical",
|
||||
@@ -128,7 +160,7 @@
|
||||
"state": {
|
||||
"type": "outgoing-link",
|
||||
"state": {
|
||||
"file": "Algorithmen und Datenstrukturen/VL/VL06/VL07.md",
|
||||
"file": "Informationssicherheit/Ueb5/05-ueb_uebungsblatt.pdf",
|
||||
"linksCollapsed": false,
|
||||
"unlinkedCollapsed": true
|
||||
}
|
||||
@@ -151,7 +183,7 @@
|
||||
"state": {
|
||||
"type": "outline",
|
||||
"state": {
|
||||
"file": "Algorithmen und Datenstrukturen/VL/VL06/VL07.md"
|
||||
"file": "Informationssicherheit/Ueb5/05-ueb_uebungsblatt.pdf"
|
||||
}
|
||||
}
|
||||
},
|
||||
@@ -212,22 +244,22 @@
|
||||
"juggl:Juggl global graph": false
|
||||
}
|
||||
},
|
||||
"active": "4759485602209736",
|
||||
"active": "a1cff18c8134d922",
|
||||
"lastOpenFiles": [
|
||||
"Informationssicherheit/Ueb5/05-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb5/Ueb5.md",
|
||||
"Mathe/KW20/KW20-VekRau.pdf",
|
||||
"Informationssicherheit/Ueb4/Ueb4.md",
|
||||
"Informationssicherheit/Ueb4/04-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb4/Ueb4.pdf",
|
||||
"Mathe/KW20/KW20-VekRau_vor.pdf",
|
||||
"Mathe/KW20/KW20-VekRau.pdf",
|
||||
"Mathe/KW20/KW20.md",
|
||||
"Algorithmen und Datenstrukturen/VL/VL06/VL07.md",
|
||||
"Informationssicherheit/Ueb5/05-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb5",
|
||||
"Mathe/KW20",
|
||||
"Informationssicherheit/Ueb4/Ueb4.md",
|
||||
"Algorithmen und Datenstrukturen/VL/VL06/VL07.md",
|
||||
"Algorithmen und Datenstrukturen/VL/VL06/Untitled",
|
||||
"Algorithmen und Datenstrukturen/VL/VL06",
|
||||
"Algorithmen und Datenstrukturen/VL",
|
||||
"Mathe/KW17/KW17-GeoTra-solutions.pdf",
|
||||
"Mathe/KW16/KW16-EWuuEV-sol.pdf",
|
||||
"English/KW18.md",
|
||||
"Mathe/KW17/KW17.md",
|
||||
"Algorithmen und Datenstrukturen/UEB04/UEB4.md",
|
||||
|
||||
@@ -125,7 +125,6 @@ c) Notwendige Annahmen:
|
||||
- Die Assets, die durch die Firewall geschützt werden, sind wertvoll und würden bei einem Angriff Schaden nehmen.
|
||||
|
||||
# 4.5
|
||||
Aufgabe 4.5 K20
|
||||
|
||||
Die Common Criteria für Informationstechnologiesicherheitsevaluierung (CC) definiert EAL4 (Evaluation Assurance Level 4) als das Level, bei dem Methoden gegen gezielte Angriffe auf das Produkt bewertet werden.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user