Viele Cyber-Angriffe kommen von Kindern.

Slides:



Advertisements
Ähnliche Präsentationen
Doris Kocher, PH Freiburg
Advertisements

Durch die Nacht “through the night” Silbermond
Ich bau eine Stadt für dich “I am building a city for you”
Don`t make me think! A Common Sense Approach to Web Usability
| DC-IAP/SVC3 | © Bosch Rexroth Pneumatics GmbH This document, as well as the data, specifications and other information set forth in.
You need to use your mouse to see this presentation © Heidi Behrens.
You need to use your mouse to see this presentation © Heidi Behrens.
GZ der Informatik / Sicherheit 1 GZ der Informatik VIII Kryptografie, Digitale Signaturen, SET Univ.-Ass. DI. Markus Seidl University of Vienna
RETAIL 2010 MAXIMALER SCHUTZ MINIMALE BELASTUNG. RETAIL 2010 MAXIMALER SCHUTZ MINIMALE BELASTUNG Nur 8 MB Speicherverbrauch.
Potentiale für den Channel Server-Software aktualisieren Server-Hardware erneuern Migration von Anwendungen Diese Produkte stehen vor dem Ende des Support.
Präsentiert von Riccardo Fuda.  Klassische (symmetrische) Kryptographie  Der weg zur modernen Kryptographie  Message Authentification Codes  Asymmetrische.
Lust auf Lesen Treffpunkt Deutsch Sixth Edition. Relative Pronoun object of a preposition Recall from chapter 9 that relative clauses describe people,
Mein Arbeitspraktikum. Today we are learning to talk about work experience we have done, giving facts, details and opinions The bigger picture: We are.
Die Fragen Wörter Wer? Was? Wann?.
SiPass standalone.
Stephanie Müller, Rechtswissenschaftliches Institut, Universität Zürich, Rämistrasse 74/17, 8001 Zürich, Criminal liability.
Ralf M. Schnell Technical Evangelist Microsoft Deutschland GmbH
Literary Machines, zusammengestellt für ::COLLABOR:: von H. Mittendorfer Literary MACHINES 1980 bis 1987, by Theodor Holm NELSON ISBN
FTS usage at GridKa Forschungszentrum Karlsruhe GmbH
Page  1 YOUR LOGO This text can be replaced with your text. POLAROIDCHART.
? What is Open PS? SAP Open PS based on EPS 4.0
3rd Review, Vienna, 16th of April 1999 SIT-MOON ESPRIT Project Nr Siemens AG Österreich Robotiker Technische Universität Wien Politecnico di Milano.
A Quick Review. What are the four prepositions used most commonly in this chapter to talk about vacations. an auf in nach.
GERMAN WORD ORDER ORDER s. Sentences are made up by placing a variety of words in a specific order. If the order is wrong, the sentence is difficult to.
COMMANDS imperative There are three command forms: formal familiar singular familiar plural.
COMMANDS imperative 1. you (formal): Sie 2. you (familiar plural): ihr
Montag den 8. Juni Lernziel:- To launch a project and receive results.
Why Should You Choose ELeaP Learning Management System?
Gregor Graf Oracle Portal (Part of the Oracle Application Server 9i) Gregor Graf (2001,2002)
© Crown copyright 2011, Department for Education These materials have been designed to be reproduced for internal circulation, research and teaching or.
EUROPÄISCHE GEMEINSCHAFT Europäischer Sozialfonds EUROPÄISCHE GEMEINSCHAFT Europäischer Fonds für Regionale Entwicklung Workpackage 5 – guidelines Tasks.
Imperfekt (Simple Past) Irregular or strong verbs
Memorisation techniques
Kapitel 8 Grammar INDEX 1.Command Forms: The Du-Command Form & Ihr- Command 2.Sentences & Clauses.
Here‘s what we‘ll do... Talk to the person sitting in front of you. Introduce each other, and ask each other questions concerning the information on your.
Copyright CryptoTec AG Vertrauliches bleibt vertraulich.
On the case of German has 4 cases NOMINATIVE ACCUSATIVE GENITIVE DATIVE.
Indico Meeting Dennis Klein 4. August Übersicht  Korrespondenz CERN  Trouble Ticket Queue  Integration GSI-Accounts  Subversion & Wiki  Todo.
How to play: Students are broken up into 2-3 teams (depending on class size). Students can see the game board and the categories, but not point values.
Essay structure Example: Die fetten Jahre sind vorbei: Was passiert auf der Almhütte? Welche Bedeutung hat sie für jede der vier Personen? Intro: One or.
What’s the weather like?. Look at the question above Turn it around and you have Das Wetter ist.... The phrase Das Wetter ist.... or Es ist.... can be.
© 2014 VMware Inc. All rights reserved. Automatisierung und Verrechnung in einer IoT Cloud am Beispiel von Bosch Private Cloud Costing | Cloud Business.
Was ist eigentlich… Big Data?
This is a placeholder text
FREE ICONS POWERPOINT TEMPLATE.
Azure Active Directory und Azure Active Directory Domain Services
Windows Store for Business
„Unsere Kompetenz – Ihr Nutzen.“
Premiere Conferencing GmbH
GwG-konforme Signaturen durch qualifizierten Diensteanbieter nach eIDAS möglich Zusammenfassung Die Identifikation und Legitimierung von Kunden ist ein.
you: ihr ( familiar plural ) you: du ( familiar singular)
LEAFCHART All phrases can be replaced with your own text.
Ralf Wüstling | Security Engineer Energy & Transportation
Buy Elimite On the other hand, you may be given specific information about any medication or insulin changes you may need. where can i buy permethrin 10.
Volume 1, Chapter 2.
The dynamic ultrasound
Viele Cyber-Angriffe kommen von Kindern.
Insert your own text here
Telling Time in German Deutsch 1 Part 1.
Wohin bist du gegangen? Where did you go?
Voting Advice Applications and Electronic Voting
Voting Advice Applications and Electronic Voting
„Förderwolke“ A Cloud-based exchange platform for the qualitative enhancement and improvement of inclusive education Dipl. Reha-Päd. Hanna Linke scientific.
ELECTR IC CARS Karim Aly University of Applied Sciences.
CHAINCHART This is placeholder text. All phrases can be replaced with your own text. The text demonstrates how your own text will look when you replace.
Official Statistics Web Cartography in Germany − Regional Statistics, Federal and European Elections, Future Activities − Joint Working Party meeting.
OFFICE 365 FOCUS SESSION SHAREPOINT ONLINE 101:LERNE DIE BASICS 19. März 2018 Höhr-Grenzhausen.
What do you see? Looks like President Clinton and Vice President Gore, right? Wrong... It's Clinton's face twice, with two different haircuts.
School supplies.
- moodle – a internet based learning platform
 Präsentation transkript:

Viele Cyber-Angriffe kommen von Kindern. CRYPTOTEC SCHÜTZ AUCH GEGEN PROFIS. 2017

CryptoTec - Blockchain Technologies - 2017 CryptoTec AG Firmenzentrale in Köln Erfahrung Verschlüsselung seit 1997 Identity Management seit 2004 Blockchain seit 2009 CryptoTec bietet Blockchain basierte Business-Anwendungen für den Schutz der Vertraulichkeit, Schutz vor Manipulation und Fälschung für den Austausch von digitalen Daten und Werten über das Internet. Fokus ist das Identitymanagement- der sichere Zugang zu Blockchain. Hier wurden zahlreiche Anwendungen entwickelt die es dem ungeübten Benutzer möglich machen, Chat, Cloud, Filetransfer, VoIP & Mail auf höchsten Sicherheitsniveau Behörden- und Dienstleistersektor übergreifen zu nutzen. Ziel: Nutzerempfinden von WhatsAPP, Skype, Dropbox jedoch mit „CryptoTec Zone“ höchster Sicherheit. About Us CryptoTec CryptoTec - Blockchain Technologies - 2017

Das Zeitalter der Cyberbedrohung. Firewall & VPN bieten keinen ausreichenden Schutz. Exploits & Hackertools gibt es im Darknet. Up until now threat mitigation was done via VPN, Firewall and AV solutions creating an outer shell around the company infrastructure With the NSA tools this shell is easier to pierce through than ever and quickly the entire company network is compromised. Question: Would you agree that the security of current IT systems is not prepared for this kind of threat and typically not equipped with the right defensive tools? CryptoTec - Blockchain Technologies - 2017

Grundpfeiler sicherer IT-Systeme Welche Komponenten braucht man für ein sicheres verteiltes IT-System? User-Management Durchsetzen der Richtlinien Systemverfügbarkeit Integrität der Daten Vertraulicher Austausch Zuverlässiger Inhalt + + We identified the building blocks: Availability, data integrity, user management, policy enforcement, confidentiality, trusted content Blockchain: Unforgable history with high availability End-to-end: The only way to truly protect your data Trusted Identities: Digital identies for real people and machines Trusted Ids are the back bone for blockchains and end-to-end encryption There is no point in end-to-end encryption if you don‘t trust the end points CryptoTec integrates all three components into one solution Blockchain Trusted Identities Ende-zu-Ende Verschlüsselung CryptoTec - Blockchain Technologies - 2017

Blockchain: Private Ledger mit Hochleistung by CryptoTec Ende-zu-Ende verschlüsselte Datarooms mit Blockchain-Technologie Report.doc v1 Group Key 1 Hash F1 Report.doc v2 Hash F2 Report.doc v3 Group Key 2 Hash F3 File version ledger Merkmale Vertrauliche Speicherung und Übertragung Manipulationsgesicherte Historie Skalierung und Leistung durch Private Ledger Anwendungsbeispiele Sichere Cloud Instant Messenger Mail und Filetansfer grosser Datenmengen Internettelefonie über eigene Server Group Key 1 Users: A,B Hash G1 Users: A,B,C Hash G2 Group Key 2 Users: A,C Hash G3 Permission ledger Enough of the high-level talk: How do we do it? High performance private, permissioned ledger maps blockchain technology to enterprise requirements Using blockchain tech for confidential storage and exchange manipulation protected history performance and scalability through private ledger Two blockchains combined: Permissions, File version For each ledger: The changes and the current hash are recorded into a block, the previous block is referenced by its hash value to create the unbreakable chain of blocks: the blockchain Modularized permission ledger, can also be used for group chat or voice call Additional features: Audit trail using a public blockchain (Factum,…) BTW: This crashed at the CeBit fair in the IBM demo Do you believe there is still potential for optimization of McKesson Venture‘s blockchain strategy? CryptoTec - Blockchain Technologies - 2017

Bewährte Sicherheit – einfach gemacht. Verifiziert, digital signiert & encrypted Verzicht auf die größten Angriffsvektoren: 1. Sende einen Link per E-Mail. 2. Arbeiten mittels Webbrowser. 3. Konsequenter Wegfall von Login per Benutzername & Passwort. Dank „CryptoTec Identity“ 6

Ende-zu-Ende: Sicherer Dateitransfer Senden Sie große Dateien Ende-zu-Ende verschlüsselt über verlässliche Austausch-Server Merkmale Unbegrenzte Datengrösse 100% Ende-zu-Ende verschlüsselt, spezifisch zum Empfänger Automatisches Handling bei schlechten Netzwerkverbindungen Kein vertrauenswürdiger Server benötigt Automatisierbar für M2M Cross-Plattform Have you ever tried to send a 10 GB file over the internet? We can do it, without any file size restrictions but with end-to-end encryption Do unlimited end-to-end encrypted data transfers via trustless servers Every bit is end-to-end encrypted for specific recipient No trust in servers, admins, providers required Automatable for M2M Cross-Platform CryptoTec - Blockchain Technologies - 2017

General Identitäten verwalten: Trust Center Bundeswehr Trust Center Trust Center Circle – verifizierte Teilnehmer Rechtemanagement Identitymanagement Branche 1 # 5 # 1 # 4 # 2 # 3 CryptoTec 3/2017

“CryptoTec Zone” schütz mit Military Grade Security Alle über das Internet geteilte Daten sind zu JEDERZEIT verschlüsselt- Angriff zwecklos! By combining the three building blocks: blockchain, trusted identities, end-to-end encryption CryptoTec offers a new approach to security to protect a companies data The gain in security is achieved by seperating the information security layer from the network security layer This allows secure usage of partly compromized network infrastructure CryptoTec - Blockchain Technologies - 2017

CryptoTec - Blockchain Technologies - 2017 Fakten- Angriff zwecklos! CryptoStorage garantiert, dass alle Daten verschlüsselt werden: bei der Übertragung, bei der Speicherung und bei der Synchronisierung Usability & maximale Performance (schneller und sicherer als VPN) Automatisierte Kryptographie CryptoTec Workroom erlaubt nur Trustcenter verifizierte Teilnehmer. authorized CryptoIDs Closed User Group (CUG) Monitoring 2.0 Ungestörter Workflow: - optimiert für Delta-Kodierung - Standard-Anwendungen (MS Office) CryptoTec - Blockchain Technologies - 2017

CryptoTec - Blockchain Technologies - 2017 HONG KONG Nina Tower, 25th floor 8Yeung Uk Road Tsuen Wan NT HONG KONG INDIA German Center for Industry and Trade Delhi Private Limited Building No. 9, Tower B, level 12 DLF Cyber City Phase lll Gurgaon-122002 Haryana - INDIA CryptoTec Habsburgerring 2 50674 Köln T. +49 221 2228383 0 F. +49 221 2228383 20 contact@cryptotec.com CryptoID: contact@@cryptotec.com USA CryptoTec Inc. 113 Barksdale  Professional Center Newark, DE 19711-3258 USA cryptotec.com CryptoTec - Blockchain Technologies - 2017

Vision: Banking 2.0 KYC ensured through retail office SEPA transactions Debit card Customer stickiness – online and retail Internationally deployable 2B people have no bank account Can be used in parallel to existing bank account Retail as alternative or supplement to retail banking