{"id":192,"date":"2015-05-07T11:19:41","date_gmt":"2015-05-07T10:19:41","guid":{"rendered":"http:\/\/www.s1001530-6081.at.webhosting.upc.biz\/zth.at\/?page_id=192"},"modified":"2021-01-25T09:39:34","modified_gmt":"2021-01-25T08:39:34","slug":"it-security","status":"publish","type":"page","link":"https:\/\/www.mandl.org\/en\/informationstechnologien\/it-security\/","title":{"rendered":"IT-Security"},"content":{"rendered":"<p>Privacy and Security:<\/p>\n<ul>\n<li>vulnerability assessments<\/li>\n<li>creating safety and security concepts<\/li>\n<li>security audits<\/li>\n<li>backup solutions<\/li>\n<li>technical building protection<\/li>\n<\/ul>\n<p>IT security concepts and assessments for<\/p>\n<ul>\n<li>Applications<\/li>\n<li>Databases<\/li>\n<li>Webserver<\/li>\n<\/ul>\n<p>Spying private or corporate data, loss of privacy, competitive disadvantage, remote control of computers, abuse the computer for criminal purposes on behalf of the victim, destruction or alteration of data and programs, &#8230; To counter such threats, the infrastructure must be documented first, to perform a risk analysis. After that appropriate protective measures and protection plans are designed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We create IT security concepts and assessments for a variety of applications. <a class=\"more-link\" href=\"https:\/\/www.mandl.org\/en\/informationstechnologien\/it-security\/\">Mehr&#8230;<\/a><\/p>\n","protected":false},"author":3,"featured_media":138,"parent":326,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-192","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT-Security - ZIVILTECHNIKERKANZLEI Dipl.-Ing. Dr.techn. Peter MANDL<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mandl.org\/en\/informationstechnologien\/it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT-Security - ZIVILTECHNIKERKANZLEI Dipl.-Ing. Dr.techn. Peter MANDL\" \/>\n<meta property=\"og:description\" content=\"We create IT security concepts and assessments for a variety of applications. Mehr...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mandl.org\/en\/informationstechnologien\/it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ZIVILTECHNIKERKANZLEI Dipl.-Ing. Dr.techn. Peter MANDL\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-25T08:39:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mandl.org\/wp-content\/uploads\/2015\/04\/encrypted.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"514\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mandl.org\\\/en\\\/informationstechnologien\\\/it-security\\\/\",\"url\":\"https:\\\/\\\/www.mandl.org\\\/en\\\/informationstechnologien\\\/it-security\\\/\",\"name\":\"IT-Security - ZIVILTECHNIKERKANZLEI Dipl.-Ing. Dr.techn. Peter MANDL\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mandl.org\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mandl.org\\\/en\\\/informationstechnologien\\\/it-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mandl.org\\\/informationstechnologien\\\/it-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mandl.org\\\/wp-content\\\/uploads\\\/2015\\\/04\\\/encrypted.jpg\",\"datePublished\":\"2015-05-07T10:19:41+00:00\",\"dateModified\":\"2021-01-25T08:39:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mandl.org\\\/en\\\/informationstechnologien\\\/it-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[[\"https:\\\/\\\/www.mandl.org\\\/en\\\/informationstechnologien\\\/it-security\\\/\"]]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mandl.org\\\/en\\\/informationstechnologien\\\/it-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mandl.org\\\/wp-content\\\/uploads\\\/2015\\\/04\\\/encrypted.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mandl.org\\\/wp-content\\\/uploads\\\/2015\\\/04\\\/encrypted.jpg\",\"width\":1200,\"height\":514},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mandl.org\\\/en\\\/informationstechnologien\\\/it-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mandl.org\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Informationstechnologien\",\"item\":\"https:\\\/\\\/www.mandl.org\\\/en\\\/informationstechnologien\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT-Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mandl.org\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.mandl.org\\\/en\\\/\",\"name\":\"ZIVILTECHNIKERKANZLEI Dipl.-Ing. Dr.techn. Peter MANDL\",\"description\":\"Your partner for Information Technologies, Electrotechnics, Communication Technologies, Measurement Technologies, Business and IT Law\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mandl.org\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mandl.org\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mandl.org\\\/en\\\/#organization\",\"name\":\"ZIVILTECHNIKERKANZLEI Dipl.-Ing. Dr.techn. Peter MANDL\",\"url\":\"https:\\\/\\\/www.mandl.org\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mandl.org\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mandl.org\\\/wp-content\\\/uploads\\\/2015\\\/08\\\/Logo-ZT-Peter-Mandl-070815_kl1-e1438955890287.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mandl.org\\\/wp-content\\\/uploads\\\/2015\\\/08\\\/Logo-ZT-Peter-Mandl-070815_kl1-e1438955890287.jpg\",\"width\":600,\"height\":128,\"caption\":\"ZIVILTECHNIKERKANZLEI Dipl.-Ing. Dr.techn. Peter MANDL\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mandl.org\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT-Security - ZIVILTECHNIKERKANZLEI Dipl.-Ing. Dr.techn. Peter MANDL","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mandl.org\/en\/informationstechnologien\/it-security\/","og_locale":"en_US","og_type":"article","og_title":"IT-Security - ZIVILTECHNIKERKANZLEI Dipl.-Ing. Dr.techn. Peter MANDL","og_description":"We create IT security concepts and assessments for a variety of applications. Mehr...","og_url":"https:\/\/www.mandl.org\/en\/informationstechnologien\/it-security\/","og_site_name":"ZIVILTECHNIKERKANZLEI Dipl.-Ing. Dr.techn. Peter MANDL","article_modified_time":"2021-01-25T08:39:34+00:00","og_image":[{"width":1200,"height":514,"url":"https:\/\/www.mandl.org\/wp-content\/uploads\/2015\/04\/encrypted.jpg","type":"image\/jpeg"}],"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.mandl.org\/en\/informationstechnologien\/it-security\/","url":"https:\/\/www.mandl.org\/en\/informationstechnologien\/it-security\/","name":"IT-Security - ZIVILTECHNIKERKANZLEI Dipl.-Ing. Dr.techn. Peter MANDL","isPartOf":{"@id":"https:\/\/www.mandl.org\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mandl.org\/en\/informationstechnologien\/it-security\/#primaryimage"},"image":{"@id":"https:\/\/www.mandl.org\/informationstechnologien\/it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mandl.org\/wp-content\/uploads\/2015\/04\/encrypted.jpg","datePublished":"2015-05-07T10:19:41+00:00","dateModified":"2021-01-25T08:39:34+00:00","breadcrumb":{"@id":"https:\/\/www.mandl.org\/en\/informationstechnologien\/it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":[["https:\/\/www.mandl.org\/en\/informationstechnologien\/it-security\/"]]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mandl.org\/en\/informationstechnologien\/it-security\/#primaryimage","url":"https:\/\/www.mandl.org\/wp-content\/uploads\/2015\/04\/encrypted.jpg","contentUrl":"https:\/\/www.mandl.org\/wp-content\/uploads\/2015\/04\/encrypted.jpg","width":1200,"height":514},{"@type":"BreadcrumbList","@id":"https:\/\/www.mandl.org\/en\/informationstechnologien\/it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mandl.org\/en\/"},{"@type":"ListItem","position":2,"name":"Informationstechnologien","item":"https:\/\/www.mandl.org\/en\/informationstechnologien\/"},{"@type":"ListItem","position":3,"name":"IT-Security"}]},{"@type":"WebSite","@id":"https:\/\/www.mandl.org\/en\/#website","url":"https:\/\/www.mandl.org\/en\/","name":"ZIVILTECHNIKERKANZLEI Dipl.-Ing. Dr.techn. Peter MANDL","description":"Your partner for Information Technologies, Electrotechnics, Communication Technologies, Measurement Technologies, Business and IT Law","publisher":{"@id":"https:\/\/www.mandl.org\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mandl.org\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mandl.org\/en\/#organization","name":"ZIVILTECHNIKERKANZLEI Dipl.-Ing. Dr.techn. Peter MANDL","url":"https:\/\/www.mandl.org\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mandl.org\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mandl.org\/wp-content\/uploads\/2015\/08\/Logo-ZT-Peter-Mandl-070815_kl1-e1438955890287.jpg","contentUrl":"https:\/\/www.mandl.org\/wp-content\/uploads\/2015\/08\/Logo-ZT-Peter-Mandl-070815_kl1-e1438955890287.jpg","width":600,"height":128,"caption":"ZIVILTECHNIKERKANZLEI Dipl.-Ing. Dr.techn. Peter MANDL"},"image":{"@id":"https:\/\/www.mandl.org\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.mandl.org\/en\/wp-json\/wp\/v2\/pages\/192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mandl.org\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.mandl.org\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.mandl.org\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mandl.org\/en\/wp-json\/wp\/v2\/comments?post=192"}],"version-history":[{"count":4,"href":"https:\/\/www.mandl.org\/en\/wp-json\/wp\/v2\/pages\/192\/revisions"}],"predecessor-version":[{"id":988,"href":"https:\/\/www.mandl.org\/en\/wp-json\/wp\/v2\/pages\/192\/revisions\/988"}],"up":[{"embeddable":true,"href":"https:\/\/www.mandl.org\/en\/wp-json\/wp\/v2\/pages\/326"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mandl.org\/en\/wp-json\/wp\/v2\/media\/138"}],"wp:attachment":[{"href":"https:\/\/www.mandl.org\/en\/wp-json\/wp\/v2\/media?parent=192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}