{"id":2776,"date":"2012-04-26T09:51:06","date_gmt":"2012-04-26T07:51:06","guid":{"rendered":"http:\/\/www.media-deluxe.de\/blog\/?p=2776"},"modified":"2016-04-20T06:19:06","modified_gmt":"2016-04-20T04:19:06","slug":"cvss-common-vulnerability-scoring-system-kalkulator-online","status":"publish","type":"post","link":"https:\/\/www.media-deluxe.de\/blog\/2012\/04\/cvss-common-vulnerability-scoring-system-kalkulator-online\/","title":{"rendered":"CVSS (Common Vulnerability Scoring System) Kalkulator online"},"content":{"rendered":"<div class=\"teaserimg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"CVSS-Logo\" src=\"https:\/\/www.media-deluxe.de\/blog\/wp-content\/uploads\/2012\/04\/cvss.jpg\" alt=\"CVSS-Logo\" width=\"60\" height=\"45\" \/><\/div>\n<div><strong class=\"abstract\">Dieser CVSS-Kalkulator ist ein deutschsprachiges Tool zur Berechnung von IT-Sicherheitsrisiken gem\u00e4\u00df <a href=\"https:\/\/www.media-deluxe.de\/blog\/2012\/04\/cvss-common-vulnerability-scoring-system\/\">CVSS (Common Vulnerability Scoring System)<\/a>. Er wird hier in dem Wunsch bereitgestellt, die Verbreitung von CVSS zu f\u00f6rdern. Das intuitiv zu bedienende Online-Formular eignet sich zur Berechnung aller drei CVSS Metric Groups (Base, Temporal und Environmental Metrics) und kann somit auch f\u00fcr eine Sicherheitsbewertung mit Bezug auf die eigene IT-Infrastruktur verwendet werden. <!--more--><\/strong><\/div>\n<p>[cvss-v2-inc]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dieser CVSS-Kalkulator ist ein deutschsprachiges Tool zur Berechnung von IT-Sicherheitsrisiken gem\u00e4\u00df CVSS (Common Vulnerability Scoring System). Er wird hier in dem Wunsch bereitgestellt, die Verbreitung von CVSS zu f\u00f6rdern. Das intuitiv zu bedienende Online-Formular eignet sich zur Berechnung aller drei &hellip; <a class=\"more-link\" href=\"https:\/\/www.media-deluxe.de\/blog\/2012\/04\/cvss-common-vulnerability-scoring-system-kalkulator-online\/\"> Weiter&#8230;<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,7,14,4],"tags":[269,265,266,267,268],"class_list":["post-2776","post","type-post","status-publish","format-standard","hentry","category-allgemein","category-e-business","category-knowledge_management","category-webdesign","tag-cms-wissen","tag-common-vulnerability-scoring-system","tag-cvss","tag-it-sicherheit","tag-kalkulator"],"_links":{"self":[{"href":"https:\/\/www.media-deluxe.de\/blog\/wp-json\/wp\/v2\/posts\/2776","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.media-deluxe.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.media-deluxe.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.media-deluxe.de\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.media-deluxe.de\/blog\/wp-json\/wp\/v2\/comments?post=2776"}],"version-history":[{"count":2,"href":"https:\/\/www.media-deluxe.de\/blog\/wp-json\/wp\/v2\/posts\/2776\/revisions"}],"predecessor-version":[{"id":2778,"href":"https:\/\/www.media-deluxe.de\/blog\/wp-json\/wp\/v2\/posts\/2776\/revisions\/2778"}],"wp:attachment":[{"href":"https:\/\/www.media-deluxe.de\/blog\/wp-json\/wp\/v2\/media?parent=2776"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.media-deluxe.de\/blog\/wp-json\/wp\/v2\/categories?post=2776"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.media-deluxe.de\/blog\/wp-json\/wp\/v2\/tags?post=2776"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}