{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T13:26:52Z","timestamp":1648646812982},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s11623-021-1525-z","type":"journal-article","created":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T19:01:03Z","timestamp":1635879663000},"page":"733-737","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Angriffserkennung beim Betrieb von KRITIS gem\u00e4\u00df IT-Sicherheitsgesetz 2.0"],"prefix":"10.1007","volume":"45","author":[{"given":"Michael","family":"Pilgermann","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Stein","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Schrader","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Weber","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,2]]},"reference":[{"key":"1525_CR1","unstructured":"Der Bundesbeauftragte f\u00fcr den Datenschutz und die Informationsfreiheit, \u201eSozialdatenschutz \u2013 Die B\u00fcrger und ihre Daten im Netz der sozialen Sicherheit\u201c. 2020, Zugegriffen: Dez. 23, 2020. [Online]. Verf\u00fcgbar unter: https:\/\/www.bfdi.bund.de\/SharedDocs\/Publikationen\/Infobroschueren\/INFO3.pdf."},{"key":"1525_CR2","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), \u201eDie Lage der IT-Sicherheit in Deutschland 2020\u201c, 2020 [Online]. Verf\u00fcgbar unter: https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/Lageberichte\/Lagebericht2020.pdf."},{"key":"1525_CR3","unstructured":"Runder Tisch IT-Sicherheit Krankenh\u00e4user, \u201eMa\u00dfnahmenplan\u201c, 2020 [Online]. Verf\u00fcgbar unter: https:\/\/msagd.rlp.de\/fileadmin\/msagd\/Presse\/Presse_Dokumente\/Empfehlungen_Runder_Tisch_IT_2020.pdf."},{"key":"1525_CR4","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik, \u201eCyber-Sicherheitsbetrachtung vernetzter Medizinprodukte \u2013 BSI-Projekt 392: Manipulation von Medizinprodukten (ManiMed)\u201c. 2020 [Online]. Verf\u00fcgbar unter: https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/DigitaleGesellschaft\/ManiMed_Abschlussbericht.pdf."},{"key":"1525_CR5","unstructured":"K. Panetta, \u201eGartner Top 7 Security and Risk Trends for 2019\u201c, 2019 [Online]. Verf\u00fcgbar unter: https:\/\/www.gartner.com\/smarterwithgartner\/gartner-top-7-security-and-risk-trends-for-2019."},{"key":"1525_CR6","unstructured":"Deutscher Bundestag, Gesetz zur Erh\u00f6hung der Sicherheit informationstechnischer Systeme. 2015."},{"key":"1525_CR7","unstructured":"Bundesverband der Krankenhaustr\u00e4ger der Bundesrepublik Deutschland, \u201eBranchenspezifischer Sicherheitsstandard f\u00fcr die Gesundheitsversorgung im Krankenhaus, Version 1.1\u201c. 2019 [Online]. Verf\u00fcgbar unter: https:\/\/www.dkgev.de\/fileadmin\/default\/Mediapool\/2_Themen\/2.1_Digitalisierung_Daten\/2.1.4._IT-Sicherheit_und_technischer_Datenschutz\/2.1.4.1._IT-Sicherheit_im_Krankenhaus\/B3S_KH_v1.1_8a_geprueft.pdf."},{"key":"1525_CR8","unstructured":"Bundesministerium f\u00fcr Gesundheit, Gesetz f\u00fcr ein Zukunftsprogramm Krankenh\u00e4user (Krankenhauszukunftsgesetz\u2013KHZG). 2020, S. 2208\u20132219."},{"key":"1525_CR9","unstructured":"European Union, Richtlinie \u00fcber Ma\u00dfnahmen zur Gew\u00e4hrleistung eines hohen gemeinsamen Sicherheitsniveaus von Netz- und Informationssystemen in der Union. 2016."},{"key":"1525_CR10","unstructured":"European Commission and the High Representative of the Union for Foreign Affairs and Security Policy, \u201eThe EU\u2019s Cybersecurity Strategy for the Digital Decade (JOIN(2020) 18 final)\u201c. 2020 [Online]. Verf\u00fcgbar unter: https:\/\/ec.europa.eu\/digital-single-market\/en\/news\/eus-cybersecurity-strategy-digital-decade."},{"key":"1525_CR11","unstructured":"Deutscher Bundestag, Zweites Gesetz zur Erh\u00f6hung der Sicherheit informationstechnischer Systeme. Mai 2021."},{"key":"1525_CR12","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik, \u201eMindeststandard zur Protokollierung und Detektion von Cyber-Angriffen in der Bundesverwaltung, inkl. Protokollierungsrichtlinie Bund (PR-B) \u2013 Protokollierung zur Detektion von Cyber-Angriffen auf die Informationstechnik des Bundes (Anlage 1)\u201c. 2018 [Online]. Verf\u00fcgbar unter: https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Mindeststandards\/Mindeststandard_BSI_Protokollierung_und_Detektion_Version_1_0.pdf."},{"key":"1525_CR13","unstructured":"Deutsches Institut f\u00fcr Normung, \u201eAnwendung des Risikomanagements f\u00fcr IT-Netzwerke, die Medizinprodukte beinhalten \u2013 Teil 1: Aufgaben, Verantwortlichkeiten und Aktivit\u00e4ten\u201c. 2011 [Online]. Verf\u00fcgbar unter: https:\/\/www.beuth.de\/de\/norm\/din-en-80001-1\/145057440."},{"key":"1525_CR14","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik, \u201eCyber-Sicherheitsanforderungen an netzwerkf\u00e4hige Medizinprodukte\u201c. 2018 [Online]. Verf\u00fcgbar unter: https:\/\/www.allianz-fuer-cybersicherheit.de\/ACS\/DE\/_\/downloads\/BSI-CS\/BSI-CS_132.html."},{"key":"1525_CR15","doi-asserted-by":"publisher","unstructured":"M. Pilgermann, S. Werth, und R. Creutzburg, \u201eTowards sector specific security operation\u201c, Electronic Imaging, Bd. 2020, Nr.\u00a03, S. 254-1-254\u201310, https:\/\/doi.org\/10.2352\/ISSN.2470-1173.2020.3.MOBMU-254.","DOI":"10.2352\/ISSN.2470-1173.2020.3.MOBMU-254"},{"key":"1525_CR16","doi-asserted-by":"publisher","first-page":"227756","DOI":"10.1109\/ACCESS.2020.3045514","volume":"8","author":"M Vielberth","year":"2020","unstructured":"M. Vielberth, F. Bohm, I. Fichtinger, und G. Pernul, \u201eSecurity Operations Center: A Systematic Study and Open Challenges\u201c, IEEE Access, Bd. 8, S. 227756\u2013227779, 2020, https:\/\/doi.org\/10.1109\/ACCESS.2020.3045514.","journal-title":"IEEE Access"},{"key":"1525_CR17","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik, \u201eMonitoring und Anomalieerkennung in Produktionsnetzwerken\u201c. 2019 [Online]. Verf\u00fcgbar unter: https:\/\/www.allianz-fuer-cybersicherheit.de\/ACS\/DE\/_\/downloads\/BSI-CS\/BSI-CS_134.html."},{"key":"1525_CR18","unstructured":"F. Menges, \u201eCyber Threat Intelligence Exchange\u201c, 2020."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-021-1525-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-021-1525-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-021-1525-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T19:18:21Z","timestamp":1635880701000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-021-1525-z"}},"subtitle":["Auswirkungen am Beispiel von Krankenhaus-IT"],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":18,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["1525"],"URL":"https:\/\/doi.org\/10.1007\/s11623-021-1525-z","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11]]},"assertion":[{"value":"2 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}