{"id":94387,"date":"2021-10-15T12:00:00","date_gmt":"2021-10-15T10:00:00","guid":{"rendered":"https:\/\/industry-science.com\/artikel\/it-security-in-enterprises-766d25ad27ae5fc4bfbff39563c1373b45ab27ba9466d1600304b33d117ca5f4e2766d25ad27ae5fc4bfbff39563c1373b45ab27ba9466d1600304b33d117ca5f488766d25ad27ae5fc4bfbff39563c1373b45ab\/"},"modified":"2025-08-07T09:45:37","modified_gmt":"2025-08-07T07:45:37","slug":"it-security-in-enterprises-%e2%88%92-a-methodology-for-classification-using-a-maturity-grade-model","status":"publish","type":"article","link":"https:\/\/industry-science.com\/en\/articles\/it-security-in-enterprises-%e2%88%92-a-methodology-for-classification-using-a-maturity-grade-model\/","title":{"rendered":"IT Security in Enterprises"},"content":{"rendered":"<p><!-- GITO PUB shortened content start --><\/p>\n<div class=\"gito-pub-frontend-post-protected\"><\/div>\n<p><!-- GITO PUB shortened content end --><\/p>\n<div style=\"display:block;text-align:center !important;margin:30px 0;\">\n<div style=\"display:inline-block;border:1px solid #555;padding:10px;max-width:600px;text-align:left;\">\n<h2 class=\"gito-pub-download-section\"><center>Access limited<\/center><\/h2>\n<p>You are currently <strong>not logged in \/ not yet registered<\/strong>.<\/p>\n<p>In order to download the desired file(s), you must be logged in and have an appropriate inclusive subscription. Alternatively, you can also obtain access by paying a one-off fee.<\/p>\n<div style=\"text-align:center;\">\n<table style=\"width:90% !important;margin-left:5% !important;\">\n<thead>\n<tr>\n<th>Subscription<\/th>\n<th style=\"text-align:center !important;\">included<\/th>\n<th style=\"text-align:right;\">Purchase<\/th>\n<tr><\/thead>\n<tbody>\n<tr>\n<td>without<\/td>\n<td style=\"text-align:center !important;\">&#8722;<\/td>\n<td style=\"text-align:right;\">29,00 \u20ac<\/td>\n<tr>\n<tr>\n<td>Digital<\/td>\n<td style=\"text-align:center !important;\">&#8722;<\/td>\n<td style=\"text-align:right;\">27,55 \u20ac<\/td>\n<tr>\n<tr>\n<td>Expert<\/td>\n<td style=\"text-align:center !important;\">&#8722;<\/td>\n<td style=\"text-align:right;\">26,10 \u20ac<\/td>\n<tr>\n<tr>\n<td>Professional<\/td>\n<td style=\"text-align:center !important;\"><span style=\"color:var(--company-color);font-weight:bold;font-size:16px;\">&#10003;<\/span><\/td>\n<td style=\"text-align:right;\">0,00 \u20ac<\/td>\n<tr><\/tbody>\n<\/table>\n<p><button style=\"font-size:14px;margin:10px;\" class=\"button gito-pub-login-register-link gito-pub-reporting-abo-button\" data-targetabo=\"professional\" data-targeturl=\"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/article\/94387\/\" data-type=\"abo-button-login\">Register \/ book subscription<\/button><a href=\"https:\/\/industry-science.com\/en\/checkout\/?add-to-cart=94387&#038;quantity=1\" style=\"font-size:14px;margin:10px;\" class=\"button gito-pub-reporting-abo-button\" data-type=\"abo-button-onetime\">Download for one time 29,00 \u20ac<\/a><\/p>\n<p><small>All prices include 7% VAT<\/small><\/p>\n<p><small>After purchasing access rights, you will automatically be redirected back to this page.<\/small><\/p>\n<\/div>\n<\/div>\n<\/div>\n<br>Potentials: <span class=\"gito-pub-tag-element\"><a href=\"\/potentials\/profitability\/\">Profitability<\/a><\/span> <br>Solutions: <span class=\"gito-pub-tag-element\"><a href=\"\/en\/functions\/safety\/\">Safety<\/a><\/span> <div class=\"gito-pub-tags-social-share\" style=\"display:flex;justify-content:space-between;\"><div>Tags: <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/it-security\/\">IT security<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/maturity-grade-model\/\">maturity grade model<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/responsibility\/\">responsibility<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/risks\/\">risks<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/safeguarding\/\">safeguarding<\/a><\/span> <\/div><div><div class=\"social-icons share-icons share-row relative\" ><a href=\"whatsapp:\/\/send?text=IT%20Security%20in%20Enterprises - https:\/\/industry-science.com\/en\/articles\/it-security-in-enterprises-%e2%88%92-a-methodology-for-classification-using-a-maturity-grade-model\/\" data-action=\"share\/whatsapp\/share\" class=\"icon button circle is-outline tooltip whatsapp show-for-medium\" title=\"Share on WhatsApp\" aria-label=\"Share on WhatsApp\"><i class=\"icon-whatsapp\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/www.facebook.com\/sharer.php?u=https:\/\/industry-science.com\/en\/articles\/it-security-in-enterprises-%e2%88%92-a-methodology-for-classification-using-a-maturity-grade-model\/\" data-label=\"Facebook\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip facebook\" title=\"Share on Facebook\" aria-label=\"Share on Facebook\" rel=\"noopener nofollow\"><i class=\"icon-facebook\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/x.com\/share?url=https:\/\/industry-science.com\/en\/articles\/it-security-in-enterprises-%e2%88%92-a-methodology-for-classification-using-a-maturity-grade-model\/\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip x\" title=\"Share on X\" aria-label=\"Share on X\" rel=\"noopener nofollow\"><i class=\"icon-x\" aria-hidden=\"true\"><\/i><\/a><a href=\"mailto:?subject=IT%20Security%20in%20Enterprises&body=Check%20this%20out%3A%20https%3A%2F%2Findustry-science.com%2Fen%2Farticles%2Fit-security-in-enterprises-%25e2%2588%2592-a-methodology-for-classification-using-a-maturity-grade-model%2F\" class=\"icon button circle is-outline tooltip email\" title=\"Email to a Friend\" aria-label=\"Email to a Friend\" rel=\"nofollow\"><i class=\"icon-envelop\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&url=https:\/\/industry-science.com\/en\/articles\/it-security-in-enterprises-%e2%88%92-a-methodology-for-classification-using-a-maturity-grade-model\/&title=IT%20Security%20in%20Enterprises\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip linkedin\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" rel=\"noopener nofollow\"><i class=\"icon-linkedin\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><hr style=\"margin-top:0px;\">\n","protected":false},"excerpt":{"rendered":"<p>There is hardly any day without publishing news on digitization and industry 4.0 and their respective necessity. Risks and shortcomings of IT-security are as well current topics. The striking question on management level is, where is my company regarding IT-security? How can we get a guiding light into the complexity of all related terms? This article is an outcome of research activities at the University of Applied Sciences Middlehesse. It is meant to support management to identify the actual status of IT-security and identify possible shortfalls. Based on a maturity grade model IT-security is described by six aspects with five levels each. This will help to point out room for improvements<\/p>\n","protected":false},"featured_media":96119,"menu_order":0,"template":"","categories":[],"tags":[75503,78188,78186,77827,78187],"product_cat":[3300],"topic":[],"technology":[],"knowhow":[],"industry":[],"writer":[83417],"content-type":[],"potential":[67658],"solution":[68055],"glossary":[],"class_list":{"0":"post-94387","1":"article","2":"type-article","3":"status-publish","4":"has-post-thumbnail","6":"tag-it-security","7":"tag-maturity-grade-model","8":"tag-responsibility","9":"tag-risks","10":"tag-safeguarding","11":"product_cat-article","12":"writer-gerrit-sames-en","13":"potential-profitability","14":"solution-safety","15":"product","16":"first","17":"instock","18":"downloadable","19":"virtual","20":"sold-individually","21":"taxable","22":"purchasable","23":"product-type-article"},"uagb_featured_image_src":{"full":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788.jpg",1400,788,false],"thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-150x150.jpg",150,150,true],"medium":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-666x375.jpg",666,375,true],"medium_large":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-768x432.jpg",768,432,true],"large":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-1024x576.jpg",1020,574,true],"front-page-entry":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-1032x320.jpg",1032,320,true],"post-entry":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-764x376.jpg",764,376,true],"post-teaser":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-392x320.jpg",392,320,true],"post-teaser-mobile":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-608x496.jpg",608,496,true],"post-custom-size":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-640x325.jpg",640,325,true],"whitepaper-teaser":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-274x376.jpg",274,376,true],"card-big":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-514x292.jpg",514,292,true],"card-portrait":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-320x440.jpg",320,440,true],"card-big-company":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-514x289.jpg",514,289,true],"gp-listing":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-196x180.jpg",196,180,true],"1536x1536":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788.jpg",1400,788,false],"2048x2048":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788.jpg",1400,788,false],"woocommerce_thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-510x510.jpg",510,510,true],"woocommerce_single":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-510x287.jpg",510,287,true],"woocommerce_gallery_thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-100x100.jpg",100,100,true],"dgwt-wcas-product-suggestion":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/sames-Ueberblick-ueber-die-IT-Sicherheit-im-Unternehmen_IM-2021-5-1400x788-64x36.jpg",64,36,true]},"uagb_author_info":{"display_name":"Christoph Brocks","author_link":"https:\/\/industry-science.com\/en\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"There is hardly any day without publishing news on digitization and industry 4.0 and their respective necessity. Risks and shortcomings of IT-security are as well current topics. The striking question on management level is, where is my company regarding IT-security? How can we get a guiding light into the complexity of all related terms? This&hellip;","_links":{"self":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/article\/94387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/article"}],"about":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/types\/article"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/media\/96119"}],"wp:attachment":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/media?parent=94387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/categories?post=94387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/tags?post=94387"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/product_cat?post=94387"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/topic?post=94387"},{"taxonomy":"technology","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/technology?post=94387"},{"taxonomy":"knowhow","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/knowhow?post=94387"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/industry?post=94387"},{"taxonomy":"writer","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/writer?post=94387"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/content-type?post=94387"},{"taxonomy":"potential","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/potential?post=94387"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/solution?post=94387"},{"taxonomy":"glossary","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/glossary?post=94387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}