%PDF-1.4
%
1 0 obj
</Producer(Adobe PDF Library 15.0)/Title(IT-Security in der Industrie 4.0 Handlungsfelder fr Betreiber)/Trapped/False>>
endobj
2 0 obj
<>>>/Lang<64652D4445>/MarkInfo<>/Metadata 7 0 R/Names 8 0 R/Outlines 714 0 R/PageLabels 847 0 R/PageLayout/OneColumn/PageMode/UseOutlines/Pages 463 0 R/StructTreeRoot 851 0 R/Type/Catalog/ViewerPreferences<>>>
endobj
3 0 obj
<>/Font<>>>/Fields[]>>
endobj
4 0 obj
<>
endobj
5 0 obj
<>
endobj
6 0 obj
<>
endobj
7 0 obj
<>stream
uuid:031509fa-6f7f-45f8-bdc8-0de89ee75c28
adobe:docid:indd:b30beba4-c186-11df-84c1-f6fb40a17b08
xmp.id:a5efcd63-ad61-4979-861e-c06bcdc1f031
proof:pdf
xmp.iid:0dc24604-48e0-46d2-95db-8ee2cfe9dee9
xmp.did:c1b4e6e9-1f2c-40a5-9488-194c543daccb
adobe:docid:indd:b30beba4-c186-11df-84c1-f6fb40a17b08
default
converted
from application/x-indesign to application/pdf
Adobe InDesign CC 2015 (Macintosh)
/
2016-11-18T11:56:30+01:00
2016-11-18T11:56:30+01:00
2016-11-25T16:07:02+01:00
2016-11-25T16:07:02+01:00
Adobe InDesign CC 2015 (Macintosh)
application/pdf
IT-Security in der Industrie 4.0 Handlungsfelder für Betreiber
Plattform Industrie 4.0
Adobe PDF Library 15.0
False
1
http://ns.adobe.com/pdf/1.3/
pdf
Adobe PDF Schema
internal
A name object indicating whether the document has been modified to include trapping information
Trapped
Text
http://ns.adobe.com/xap/1.0/mm/
xmpMM
XMP Media Management Schema
internal
UUID based identifier for specific incarnation of a document
InstanceID
URI
internal
The common identifier for all versions and renditions of a document.
OriginalDocumentID
URI
http://www.aiim.org/pdfua/ns/id/
pdfuaid
PDF/UA ID Schema
internal
Part of PDF/UA standard
part
Integer
endstream
endobj
8 0 obj
<>
endobj
9 0 obj
<>
endobj
10 0 obj
<>
endobj
11 0 obj
<>/ExtGState<>/GS1<>/GS2<>>>/Font<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Rotate 0/StructParents 49/Tabs/S/Thumb 707 0 R/TrimBox[0 0 595.276 841.89]/Type/Page>>
endobj
12 0 obj
[13 0 R 15 0 R 17 0 R 19 0 R 21 0 R 23 0 R 25 0 R 27 0 R 29 0 R 31 0 R 33 0 R 35 0 R 37 0 R 39 0 R 41 0 R 43 0 R 45 0 R 47 0 R 49 0 R 51 0 R 53 0 R 55 0 R 57 0 R 59 0 R 61 0 R 63 0 R 65 0 R]
endobj
13 0 obj
<>/Border[0 0 0]/Contents(6.5 Maschine-zu-Maschine-Kommunikation ......................................................................................................................................................... 27)/H/N/Rect[76.5354 689.077 524.409 677.677]/StructParent 50/Subtype/Link/Type/Annot>>
endobj
14 0 obj
<>
endobj
15 0 obj
<>/Border[0 0 0]/Contents(6.6 Berechtigungsmanagement ......................................................................................................................................................................................... 27)/H/N/Rect[76.5354 676.077 524.409 664.677]/StructParent 51/Subtype/Link/Type/Annot>>
endobj
16 0 obj
<>
endobj
17 0 obj
<>/Border[0 0 0]/Contents(6.7 Privilegierte Zugriffe verwalten ................................................................................................................................................................................ 28)/H/N/Rect[76.5354 663.077 524.409 651.677]/StructParent 52/Subtype/Link/Type/Annot>>
endobj
18 0 obj
<>
endobj
19 0 obj
<>/Border[0 0 0]/Contents(6.8 Verzeichnisdienste fr die Verwaltung von Identitten ......................................................................................................................... 2)/H/N/Rect[76.5354 650.077 519.659 638.677]/StructParent 53/Subtype/Link/Type/Annot>>
endobj
20 0 obj
<>
endobj
21 0 obj
<>/Border[0 0 0]/Contents(7 Sicherheit von Software in der Produktion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30)/H/N/Rect[56.6929 624.077 524.409 612.677]/StructParent 54/Subtype/Link/Type/Annot>>
endobj
22 0 obj
<>
endobj
23 0 obj
<>/Border[0 0 0]/Contents(7.1 Softwaresicherheit ................................................................................................................................................................................................................ 30)/H/N/Rect[76.5354 611.077 524.409 599.677]/StructParent 55/Subtype/Link/Type/Annot>>
endobj
24 0 obj
<>
endobj
25 0 obj
<>/Border[0 0 0]/Contents(7.2 Software-Pflege und -Wartung ................................................................................................................................................................................... 31)/H/N/Rect[76.5354 598.077 524.409 586.677]/StructParent 56/Subtype/Link/Type/Annot>>
endobj
26 0 obj
<>
endobj
27 0 obj
<>/Border[0 0 0]/Contents(7.3 Software-Governance ......................................................................................................................................................................................................... 32)/H/N/Rect[76.5354 585.077 524.409 573.677]/StructParent 57/Subtype/Link/Type/Annot>>
endobj
28 0 obj
<>
endobj
29 0 obj
<>/Border[0 0 0]/Contents(7.4 Whitelisting und Systemhrtung .............................................................................................................................................................................. 32)/H/N/Rect[76.5354 572.077 524.409 560.677]/StructParent 58/Subtype/Link/Type/Annot>>
endobj
30 0 obj
<>
endobj
31 0 obj
<>/Border[0 0 0]/Contents(8 IT-Sicherheit beim Einkauf von Maschinen und Anlagen bercksichtigen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33)/H/N/Rect[56.6929 546.077 524.409 534.677]/StructParent 59/Subtype/Link/Type/Annot>>
endobj
32 0 obj
<>
endobj
33 0 obj
<>/Border[0 0 0]/Contents(8.1 Gesamtheitliche Betrachtung des Einkaufsprozesses ............................................................................................................................... 34)/H/N/Rect[76.5354 533.077 524.409 521.677]/StructParent 60/Subtype/Link/Type/Annot>>
endobj
34 0 obj
<>
endobj
35 0 obj
<>/Border[0 0 0]/Contents(8.2 Ziele einer Einkaufsrichtlinie ....................................................................................................................................................................................... 34)/H/N/Rect[76.5354 520.077 524.409 508.677]/StructParent 61/Subtype/Link/Type/Annot>>
endobj
36 0 obj
<>
endobj
37 0 obj
<>/Border[0 0 0]/Contents(8.3 Exemplarischer Katalog fr die Einkaufsrichtlinie ..................................................................................................................................... 35)/H/N/Rect[76.5354 507.077 524.409 495.677]/StructParent 62/Subtype/Link/Type/Annot>>
endobj
38 0 obj
<>
endobj
39 0 obj
<>/Border[0 0 0]/Contents(8.4 Anforderungen an Lieferanten/Integratoren von Maschinen und Anlagen ........................................................................... 39)/H/N/Rect[76.5354 299.077 524.409 287.677]/StructParent 63/Subtype/Link/Type/Annot>>
endobj
40 0 obj
<>
endobj
41 0 obj
<>/Border[0 0 0]/Contents(8.5 Anforderungen an Standardisierung ...................................................................................................................................................................... 39)/H/N/Rect[76.5354 286.077 524.409 274.677]/StructParent 64/Subtype/Link/Type/Annot>>
endobj
42 0 obj
<>
endobj
43 0 obj
<>/Border[0 0 0]/Contents(8.6 Relevante Rollen nach IEC 62443 ............................................................................................................................................................................ 39)/H/N/Rect[76.5354 273.077 524.409 261.677]/StructParent 65/Subtype/Link/Type/Annot>>
endobj
44 0 obj
<>
endobj
45 0 obj
<>/Border[0 0 0]/Contents(9 Standards, Dokumente und Organisationen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41)/H/N/Rect[56.6929 247.077 524.409 235.677]/StructParent 66/Subtype/Link/Type/Annot>>
endobj
46 0 obj
<>
endobj
47 0 obj
<>/Border[0 0 0]/Contents(9.1 Relevante Organisationen ............................................................................................................................................................................................... 41)/H/N/Rect[76.5354 234.077 524.409 222.677]/StructParent 67/Subtype/Link/Type/Annot>>
endobj
48 0 obj
<>
endobj
49 0 obj
<>/Border[0 0 0]/Contents(9.2 Standards und Richtlinien .............................................................................................................................................................................................. 42)/H/N/Rect[76.5354 221.077 524.409 209.677]/StructParent 68/Subtype/Link/Type/Annot>>
endobj
50 0 obj
<>
endobj
51 0 obj
<>/Border[0 0 0]/Contents(9.2.1 ISO/IEC 2700x .......................................................................................................................................................................................................... 42)/H/N/Rect[93.6929 208.077 524.409 196.677]/StructParent 69/Subtype/Link/Type/Annot>>
endobj
52 0 obj
<>
endobj
53 0 obj
<>/Border[0 0 0]/Contents(9.2.2 IEC 62443 / ISA 99 ................................................................................................................................................................................................. 43)/H/N/Rect[93.6929 195.077 524.409 183.677]/StructParent 70/Subtype/Link/Type/Annot>>
endobj
54 0 obj
<>
endobj
55 0 obj
<>/Border[0 0 0]/Contents(9.2.3 VDI/VDE Richtlinie 2182 ................................................................................................................................................................................. 43)/H/N/Rect[93.6929 182.077 524.409 170.677]/StructParent 71/Subtype/Link/Type/Annot>>
endobj
56 0 obj
<>
endobj
57 0 obj
<>/Border[0 0 0]/Contents(9.2.4 BSI IT-Grundschutz ............................................................................................................................................................................................. 44)/H/N/Rect[93.6929 169.077 524.409 157.677]/StructParent 72/Subtype/Link/Type/Annot>>
endobj
58 0 obj
<>
endobj
59 0 obj
<>/Border[0 0 0]/Contents(9.3 Weitere Leitfden und Verffentlichungen der Plattform Industrie 4.0 .................................................................................... 45)/H/N/Rect[76.5354 156.077 524.409 144.677]/StructParent 73/Subtype/Link/Type/Annot>>
endobj
60 0 obj
<>
endobj
61 0 obj
<>/Border[0 0 0]/Contents(10 Abbildungsverzeichnis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46)/H/N/Rect[56.6929 130.077 524.409 118.677]/StructParent 74/Subtype/Link/Type/Annot>>
endobj
62 0 obj
<>
endobj
63 0 obj
<>/Border[0 0 0]/Contents(11 Literatur- und Quellenverzeichnis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47)/H/N/Rect[56.6929 104.077 524.409 92.6772]/StructParent 75/Subtype/Link/Type/Annot>>
endobj
64 0 obj
<>
endobj
65 0 obj
<>/Border[0 0 0]/Contents(12 Abkrzungsverzeichnis)/H/N/Rect[56.6929 78.0771 174.773 66.6772]/StructParent 76/Subtype/Link/Type/Annot>>
endobj
66 0 obj
<>
endobj
67 0 obj
<>stream
x]r8SZޱ{شM$Ƀkw(&$v. >'_NjߋQ1=L|rQoO=}`>NfOG4k Jaf,;8~d3fJZbrpDvp=?xӫdO^?}ĪZ,S0qb3e`G#:t#Od'sgcp,[?.}Ϗ㳃yj0hCç/Q48m%p;pkp; *~,㚮=Sγkm+NWnmMԢniAInf7tR;.G61_}݈|$r
>]:Ig®ee(_j3>Y~Gv %6GWEkC_ߵcCL ̳o
BVA֠mMl+k>)#&t>9,OfyQʷ\gMn.tՀ4=FymM8l+k8tħt^x7eh~y2T28 ?7>-bPj<3!SMa{veb=xkAv1٣mEZ͝sBʘv"RMH~*|`9<-'*ĔE9c-F~|]u@sQf{## cz%
@emz݄X~x
a_Mw6%5 M
ա:Uf/Q{:[Skd S+¤ih*n֛|RWгq<0 դ̎)$w7S6U?=Hb#!wjFՍ2h`1# hWФI1RLa11aۆ~CGX#eA-:~xk8ȰlPJ5a5!y`W[xY9%/-a笈
6oVm
+Zax.ˣ*Kqkg3LP
(kQOD)0DTLA%m<(LAm"ho[A^k_^ ^N4p>3
e(=KBj#<8V|!&l8Vض!rmkبz ɼ8dX?48租fJG@'"WW+jcvبOuq]ײN]AqfiZw0R˥br=ƗdkHȗ,
?. Pkev"e/(Qnz\0{͍馞zЮ=7fPK0JжanRcƚiSb6>ujٓb>H.,?*f17{_OlVbHP:0CPBW6Nuȃym 9:PPmbTZ+<.IYX iCKQ6mcipؒyB@}8n
PPoPmomڵİ8~6NfBfߍc.N2BvCH&
܅Û*rK6&:D@̄ ìb] f^-7Qٟ~t3 9SvtY7a˽HVk_ԯv3$f>(A${JDwYJ