<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://ismsberatung.com/glossar/a</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/access-control-list-acl</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/advanced-encryption-standard-aes</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/artificial-intelligence-ai-in-cybersecurity</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/asymmetric-encryption</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/application-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/authentication</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/authorization</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/attack-surface</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/audit-trail</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/advanced-persistent-threat-apt</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/air-gap</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/anomaly-detection</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/asset-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/attack-vector</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/anti-virus-software</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/automated-patch-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/availability</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/attack-simulation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/a/adaptive-authentication</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/backup</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/business-continuity-plan-bcp</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/business-impact-analysis-bia</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/biometric-authentication</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/brute-force-attack</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/blockchain-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/botnet</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/boundary-protection</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/breach-notification</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/buffer-overflow</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/black-hat</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/blue-team</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/bot-herder</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/bring-your-own-device-byod</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/bug-bounty</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/business-associate-agreement-baa</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/blockchain</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/b/buffer-overflow-protection</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/cloud-computing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/cybersecurity</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/cryptography</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/compliance</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/certificate-authority-ca</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/cyber-resilience</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/content-delivery-network-cdn</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/cyber-attack</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/cyber-insurance</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/confidentiality</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/cross-site-scripting-xss</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/cybercrime</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/command-and-control-c2</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/configuration-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/cyber-threat-hunting</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/chain-of-custody</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/certificate-revocation-list-crl</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/cyber-forensics</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/c/credential-stuffing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/data-breach</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/data-encryption</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/data-loss-prevention-dlp</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/denial-of-service-dos</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/disaster-recovery</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/digital-forensics</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/domain-name-system-dns</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/data-integrity</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/dynamic-malware-analysis</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/digital-signature</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/data-retention-policy</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/directory-services</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/distributed-denial-of-service-ddos</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/data-masking</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/decryption</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/digital-rights-management-drm</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/data-classification</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/data-sanitization</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/d/distributed-ledger-technology-dlt</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/encryption</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/end-to-end-encryption-e2ee</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/endpoint-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/ethical-hacking</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/exfiltration</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/exploit</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/encryption-key-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/external-audit</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/event-logging</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/endpoint-detection-and-response-edr</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/encryption-at-rest</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/encryption-in-transit</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/escalation-procedures</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/external-threat-intelligence</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/event-correlation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/emergency-response-plan</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/exposure</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/event-monitoring</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/enterprise-risk-management-erm</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/e/exploitable-vulnerability</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/firewall</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/forensische-analyse</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/file-integrity-monitoring-fim</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/false-positive</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/failover</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/full-disk-encryption-fde</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/firewall-policy</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/federated-identity</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/file-based-malware</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/fail-secure</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/firewall-as-a-service-fwaas</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/false-negative</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/file-transfer-protocol-ftp</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/firmware</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/fragmentation-attack</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/flooding-attack</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/federation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/firewall-logging</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/f/fileless-malware</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/gap-analysis</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/governance-risk-and-compliance-grc</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/geolocation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/general-data-protection-regulation-gdpr</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/grid-computing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/governance</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/guideline</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/gray-hat-hacker</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/group-policy</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/granular-access-control</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/global-security-policy</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/gartner-magic-quadrant</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/geofencing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/governance-framework</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/gold-image</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/group-based-access-control</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/green-it</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/guest-access</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/g/guided-remediation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/hacker</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/hashing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/honeypot</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/hardware-security-module-hsm</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/heuristische-analyse</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/hybrid-cloud</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/hash-collision</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/high-availability-ha</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/hids-host-based-intrusion-detection-system</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/hashwert</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/hardening</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/honeynet</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/hybrid-encryption</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/haertungstests</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/hot-site</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/human-firewall</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/hmac-hash-based-message-authentication-code</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/h/hochverfuegbarkeit-high-availability</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/incident-response</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/identity-and-access-management-iam</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/information-security-management-system-isms</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/integrity</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/intrusion-detection-system-ids</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/information-classification</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/information-security-policy</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/incident-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/isoiec-27001</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/insider-threat</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/integrity-check</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/identity-provider-idp</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/information-leakage</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/incident-reporting</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/infrastructure-as-a-service-iaas</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/intrusion-prevention-system-ips</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/isoiec-27002</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/information-risk-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/i/immutable-backup</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/java-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/jailbreaking</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/json-web-token-jwt</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/just-in-time-jit-compilation-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/juice-jacking</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/job-rotation-in-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/joint-security-task-force</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/judicial-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/jump-server</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/justification-principle</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/java-vulnerabilities</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/judiciary-data-protection</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/journaling-file-system</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/javascript-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/just-in-time-access</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/jtag-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/jurisdictional-data-compliance</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/j/job-scheduling-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/key-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/kerberos</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/key-exchange</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/key-rotation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/knowledge-based-authentication-kba</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/keylogger</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/kernel-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/key-escrow</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/kerckhoffs-prinzip</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/key-pair</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/kernel-exploit</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/key-revocation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/knowledge-transfer</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/key-splitting</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/kerberos-tickets</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/key-derivation-function-kdf</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/key-recovery</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/knowledge-based-systems</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/k/k-anonymity</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/least-privilege</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/log-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/logic-bomb</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/ldap-lightweight-directory-access-protocol</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/link-encryption</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/log-retention</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/local-area-network-lan</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/load-balancer</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/log-analysis</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/layered-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/logical-access-control</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/login-spoofing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/log-forging</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/low-orbit-ion-cannon-loic</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/least-resistance-path</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/log-tampering</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/layer-7-attack</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/lifecycle-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/l/least-functionality</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/malware</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/multi-factor-authentication-mfa</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/mitigations</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/mobile-device-management-mdm</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/man-in-the-middle-attack-mitm</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/memory-leak</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/malvertising</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/macro-virus</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/message-integrity</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/monitoring</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/mitigation-plan</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/mantrap</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/malicious-insider</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/malware-sandbox</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/metadata</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/mail-relay</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/multi-tenancy</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/mandatory-access-control-mac</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/m/microsegmentation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/network-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/non-repudiation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/network-segmentation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/nist-framework</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/network-access-control-nac</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/null-session</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/network-traffic-analysis</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/non-disclosure-agreement-nda</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/network-firewall</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/network-intrusion-detection-system-nids</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/network-isolation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/nat-network-address-translation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/network-monitoring</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/non-persistent-threats</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/next-generation-firewall-ngfw</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/network-based-intrusion-prevention-system-nips</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/null-encryption</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/network-sniffing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/network-tokenization</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/n/non-volatile-memory-nvm</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/object-access-control</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/on-premises-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/open-authorization-oauth</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/over-the-air-ota-updates</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/open-web-application-security-project-owasp</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/offboarding</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/operational-security-opsec</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/outsourcing-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/one-time-password-otp</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/open-source-intelligence-osint</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/organizational-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/openpgp</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/operational-level-agreement-ola</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/openid-connect</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/operational-risk</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/out-of-band-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/open-port</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/online-certificate-status-protocol-ocsp</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/open-redirect</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/o/outsourced-data-processing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/penetration-testing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/patch-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/public-key-infrastructure-pki</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/privacy-impact-assessment-pia</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/privilege-escalation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/phishing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/physical-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/penetration-tester</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/password-policy</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/public-cloud</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/privileged-access-management-pam</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/personal-identifiable-information-pii</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/password-cracking</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/patch-deployment</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/privacy-by-design</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/port-scanning</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/penetration-testing-report</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/private-cloud</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/password-hashing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/p/protected-health-information-phi</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantum-cryptography</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantum-key-distribution-qkd</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/qualitative-risk-assessment</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantitative-risk-assessment</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quality-assurance-in-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantum-safe-cryptography</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quarantine-in-cybersecurity</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quality-control-in-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/query-string-injection</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantum-resistant-encryption</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quality-management-system-qms</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantitative-risk-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantum-key-encryption</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quality-of-service-qos</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/query-parameter-tampering</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantum-computing-threats</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/queue-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quarantine-policy</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantum-information-theory</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/qualified-digital-signature</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantum-secure-communication</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/query-optimization</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantum-entanglement-in-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/qualified-trust-service-providers-qtsp</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantum-cryptanalysis</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantum-noise</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantitative-analysis-in-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quality-of-data-protection</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantum-safe-algorithms</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantitative-threat-modeling</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantum-state-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/q/quantum-secure-messaging</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/risk-assessment</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/risk-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/recovery-time-objective-rto</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/recovery-point-objective-rpo</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/red-teaming</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/remote-access</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/role-based-access-control-rbac</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/ransomware</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/risk-treatment</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/risk-appetite</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/risk-register</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/residual-risk</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/regulatory-compliance</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/remote-monitoring</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/root-cause-analysis-rca</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/risk-mitigation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/recovery-strategy</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/remote-wipe</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/retina-scan</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/retention-policy</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/reverse-engineering</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/risk-acceptance</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/risk-communication</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/redundancy</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/rootkit</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/risk-transfer</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/replay-attack</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/risk-evaluation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/restricted-access</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/r/regulatory-risk</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-policy</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-awareness-training</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-operations-center-soc</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/secure-sockets-layer-ssl</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/social-engineering</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/single-sign-on-sso</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-information-and-event-management-siem</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-incident-response</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-control</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/symmetric-encryption</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-token</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/secure-shell-ssh</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/spear-phishing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/software-update</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/secure-boot</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/segmentation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/spyware</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-breach</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/sandboxing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-audit</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/secure-erase</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/software-as-a-service-saas</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-risk-assessment</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/secure-coding</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-perimeter</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/session-hijacking</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-vulnerability</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/steganography</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-clearance</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/service-level-agreement-sla</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/source-code-review</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-breach-notification</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/software-composition-analysis-sca</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-assertion-markup-language-saml</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-operations</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/secure-access-service-edge-sase</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/server-hardening</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-testing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/self-service-password-reset-sspr</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/software-patch-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/secure-remote-access</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-policy-enforcement</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/system-hardening</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/social-media-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-vulnerability-assessment</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-compliance</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-posture</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/ssltls-inspection</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-governance</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/software-development-lifecycle-sdlc</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/smart-card</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/secure-multiparty-computation-smpc</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-information-sharing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-token-service-sts</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-threat-modeling</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/self-sovereign-identity-ssi</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-analytics</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/session-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/spoofing-attack</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/social-media-monitoring</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-data-masking</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/supply-chain-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/system-integrity</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/symmetric-key-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/s/security-awareness-campaign</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/two-factor-authentication-2fa</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/threat-intelligence</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/third-party-risk-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/tokenization</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/threat-modeling</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/traffic-analysis</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/transport-layer-security-tls</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/time-based-access-control</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/trusted-platform-module-tpm</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/threat-actor</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/two-man-rule</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/token-based-authentication</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/trusted-execution-environment-tee</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/threat-landscape</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/time-synchronization</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/triage-in-incident-response</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/trust-relationship</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/trojans</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/threat-detection</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/terminal-access-controller-access-control-system-tacacs</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/third-party-audits</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/token-revocation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/threat-vector</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/trapdoor</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/tunneling-protocol</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/threat-vector-analysis</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/tamper-detection</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/token-lifetime</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/trusted-computing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/t/traffic-shaping</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/unauthorized-access</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/user-access-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/uninterruptible-power-supply-ups</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/user-training-and-awareness</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/user-activity-monitoring</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/usage-policy</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/user-authentication</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/user-access-review</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/update-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/unstructured-data</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/user-provisioning</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/user-de-provisioning</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/usb-device-control</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/unified-threat-management-utm</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/user-rights-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/usage-logs</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/user-segregation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/untrusted-network</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/user-accountability</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/unpatched-vulnerability</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/user-identity-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/unauthorized-disclosure</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/url-filtering</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/user-role-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/user-session-monitoring</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/user-permissions</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/unauthorized-use</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/user-behavior-analytics-uba</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/unified-access-control</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/user-centric-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/u/user-lockout</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/vulnerability</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/vulnerability-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/virtual-private-network-vpn</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/virtualization-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/vulnerability-assessment</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/vendor-risk-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/virus</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/virtual-desktop-infrastructure-vdi</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/voice-over-ip-voip-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/vulnerability-scanning</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/virtual-machine-vm</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/virtual-lan-vlan</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/virus-signature</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/virtual-private-cloud-vpc</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/verification</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/version-control</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/vulnerability-exploit</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/virtualization-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/voice-phishing-vishing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/virtual-security-appliance</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/volumetric-attack</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/validation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/virtual-patch</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/virtualization</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/virtualization-threats</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/virtual-machine-escape</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/virtual-firewall</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/vendor-assessment</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/vulnerability-database</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/volatile-data</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/vendor-lock-in</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/vulnerability-disclosure</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/v/vendor-management</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/wireless-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/whitelisting</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/web-application-firewall-waf</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/weak-password</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/web-filtering</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/worm</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/web-vulnerability-scanning</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/watering-hole-attack</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/web-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/wireless-intrusion-detection-system-wids</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/whitelist</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/wi-fi-protected-access-wpa3</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/website-defacement</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/wi-fi-network-segmentation</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/windows-event-log</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/weakness</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/wired-equivalent-privacy-wep</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/wireless-encryption</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/web-scraping</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/websocket-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/wi-fi-security-audit</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/web-server-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/weak-encryption</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/web-based-attack</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/web-cache-poisoning</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/web-hosting-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/wi-fi-signal-interference</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/web-services-security-ws-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/wi-fi-protected-setup-wps</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/website-spoofing</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/wi-fi-protected-access-wpa2</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/w/wi-fi-signal-jamming</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/x</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/x/x509-certificate</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/x/xss-cross-site-scripting</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/x/xor-encryption</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/x/xml-encryption</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/x/xacml-extensible-access-control-markup-language</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/x/x-content-type-options</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/x/xml-signature</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/x/xsrf-cross-site-request-forgery</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/x/x25-network-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/x/x-windows-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/x/x400-protocol-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/x/xaas-anything-as-a-service-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/x/xor-cipher</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/x/xerox-network-systems-xns-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/x/x25-packet-switching-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/x/xterm-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yubikey</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yara-rules</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yellow-team</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yagi-antenna</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yottabyte-yb</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/year-2000-problem-y2k</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yanking</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yarn-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yield-management-in-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yubihsm</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/youtube-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yaml-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yahoo-data-breach</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yardstick-for-risk-assessment</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yahoo-hack-2014</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yearly-security-review</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yaml-injection</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yandex-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yubiotp</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/y/yelp-data-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zero-day-exploit</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zero-trust-architecture</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zone-based-firewall</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zero-trust-network-access-ztna</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zero-day-vulnerability</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zombie-computer</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zeroization</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zigbee-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zero-knowledge-proof</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zombie-process</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zfs-encryption</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zero-trust-policy</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/z-score-in-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zoning-in-data-centers</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zero-latency-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zero-day-detection</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zero-day-patch</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zero-touch-deployment</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zigzag-cipher</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zigbee-authentication</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zero-copy-networking</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://ismsberatung.com/glossar/z/zero-power-security</loc>
    <lastmod>2024-11-04</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
</urlset>