<p>This book explains the most important technical terms and contents and assigns them to the corresponding areas. It also includes seemingly peripheral areas that play a role in information security. For instance, the topic complexes of functional Safety and Privacy are examined in terms of their similarities and differences. The book presents currently used attack patterns and how to protect against them. Protection must be implemented on both a technical level (e.g., through the use of cryptography) and on an organizational and personnel level (e.g., through appropriate management systems and awareness training). How can one determine how secure data is? How can relevant threats be identified that need protection? How do risk analyses proceed?</p>