Emerging Trends in IT (Cyber) Security

Slides:



Advertisements
Ähnliche Präsentationen
Lancing: What is the future? Lutz Heinemann Profil Institute for Clinical Research, San Diego, US Profil Institut für Stoffwechselforschung, Neuss Science.
Advertisements

Centre for Public Administration Research E-Government for European Cities Thomas Prorok
BAS5SE | Fachhochschule Hagenberg | Daniel Khan | S SPR5 MVC Plugin Development SPR6P.
ScienceAndTechnologyWissenschaftUndTechnikScienceAndTechnologyWissenschaftUndTechnik.
Negation is when you dont have or dont do something.
Titelmasterformat durch Klicken bearbeiten Textmasterformate durch Klicken bearbeiten Zweite Ebene Dritte Ebene Vierte Ebene Fünfte Ebene 1 Titelmasterformat.
RETAIL 2010 MAXIMALER SCHUTZ MINIMALE BELASTUNG. RETAIL 2010 MAXIMALER SCHUTZ MINIMALE BELASTUNG Nur 8 MB Speicherverbrauch.
Research-guided Teaching Representation in the Biology Curriculum.
1 Public libraries’ perspectives in the digital media world Doom or bloom: reinventing the library in the digital age 29th October 2009 Christian Hasiewicz.
Networking on local area knowledge of territory-continuous presence in community (family-centre – people centre – key locations)
Mein Arbeitspraktikum. Today we are learning to talk about work experience we have done, giving facts, details and opinions The bigger picture: We are.
ZeitThemaReferent – 09.05BegrüssungOlaf Feldkamp 09:15 – 10.30Entwickeln von SharePoint Apps und deren Spezialitäten Martin Loitzl, Trivadis AG.
SiPass standalone.
Literary Machines, zusammengestellt für ::COLLABOR:: von H. Mittendorfer Literary MACHINES 1980 bis 1987, by Theodor Holm NELSON ISBN
FTS usage at GridKa Forschungszentrum Karlsruhe GmbH
E STUNDE Deutsch AP. Freitag, der 19. April 2013 Deutsch AP (E Stunde)Heute ist ein G Tag Goal: to understand authentic written text, audio material and.
Welcome to Web Services & Grid Computing Jens Mache
3rd Review, Vienna, 16th of April 1999 SIT-MOON ESPRIT Project Nr Siemens AG Österreich Robotiker Technische Universität Wien Politecnico di Milano.
Museumsinsel Museum Island (German: Museumsinsel) is the name of the northern half of an island in the Spree river in the central Mitte district of Berlin,
How does the Summer Party of the LMU work? - Organizations and Networks -
E STUNDE Deutsch AP. Dienstag, der 23. April 2013 Deutsch AP (E Stunde)Heute ist ein B Tag Goal: to understand authentic written text, audio material.
Studentenstreik 2009, 2010 in Deutschland Part 1: Studiengebühren.
KLIMA SUCHT SCHUTZ EINE KAMPAGNE GEFÖRDERT VOM BUNDESUMWELTMINISTERIUM Co2 online.
Holiday destinations, language holidays and informed languages in the EU Lea Kern.
EUROPÄISCHE GEMEINSCHAFT Europäischer Sozialfonds EUROPÄISCHE GEMEINSCHAFT Europäischer Fonds für Regionale Entwicklung Workpackage 5 – guidelines Tasks.
Kapitel 8 Grammar INDEX 1.Command Forms: The Du-Command Form & Ihr- Command 2.Sentences & Clauses.
Der AUDITOR Der Rohstoffinformationsdienst The commodity information service.
E STUNDE Deutsch AP. Donnerstag, der 11. April 2013 Deutsch AP (E Stunde)Heute ist ein A Tag Goal: to understand authentic written text, audio material.
Our next PLD session is focused on turning theory into practice by learning methodologies that will scaffold learning for second language acquisition.
Ist Ihr Unternehmen reif für die digitale Zukunft? Erfolgreich auf die Herausforderung von Digitalisierung und Vernetzung reagieren Tim Cole Internet-Publizist.
Ist Ihr Unternehmen reif für die digitale Zukunft? Erfolgreich auf die neuen Megatrends reagieren Tim Cole Internet-Publizist St.Michael im Lungau.
G Stunde DEUTSCH 1.  Unit: Family & homeFamilie & Zuhause  Objectives:  Phrases about date, weather and time-telling  Family and family relations.
Money rules the medicine?! A presentation by Jan Peter Hoffmann European healthcare systems in comparison.
Wie kann ich eine Beziehung zu Gott bekommen?. Our God is greater Water you turned into wine, opened the eyes of the blind there's no one like you, none.
© 2014 VMware Inc. All rights reserved. Automatisierung und Verrechnung in einer IoT Cloud am Beispiel von Bosch Private Cloud Costing | Cloud Business.
MOBILE HOT New Hardware, new Players 2.Omnichannel 3.Data Driven Business 4.Connected Touchpoints 5.Connected Screens 6.App Ecosystem 7.App.
Part 6:The home front. Theme of the Film Our Picture General situation in 1917 Diagram Food supply Emmigration Role play Prisoners of War Family situation.
LLP DE-COMENIUS-CMP Dieses Projekt wurde mit Unterstützung der Europäischen Kommission finanziert. Die Verantwortung für den Inhalt dieser.
Fitness. An english presentation.
Staten Island
Was ist eigentlich… Big Data?
“werden” has four meanings or applications in German.
Apache Camel Christian Schneider
Premiere Conferencing GmbH
Du bist am dicksten und am dümmsten.
Formation of Questions in German
Azure Countdown Wenn der Freund und Helfer Freunde und Helfer braucht: Sichere Content-Upload-Plattform für Bürger.
Grundlagen Englisch Passive voice HFW Bern.
Buy Lamisil Tablets Online Canada
Telling Time in German Deutsch 1 Part 1.
Metadata - Catalogues and Digitised works
Enhancement Request Enable Program and suppressed faetures in UDF Pro/Program und unterdrückte KEs in UDF verwendbar machen Pro/Engineer Part - Modelling.
Welcome! Prepare for Day 1! Site Hamburg / Finkenwerder
Moderation Dr. Ulrich Kampffmeyer
ELECTR IC CARS Karim Aly University of Applied Sciences.
Official Statistics Web Cartography in Germany − Regional Statistics, Federal and European Elections, Future Activities − Joint Working Party meeting.
OFFICE 365 FOCUS SESSION SHAREPOINT ONLINE 101:LERNE DIE BASICS 19. März 2018 Höhr-Grenzhausen.
Cyber-Resilience Es ist nicht die Frage ob, sondern wann und was dann
Practical Exercises and Theory
Niedersächsisches Ministerium
Successful Cyber-attack Cyber-Attack countered by grid defender
Area of Specialization
Die tiere Share: Introduce the session and PDSA.
- moodle – a internet based learning platform
Scenario Framework for the Gas Network Development Plan
Gemeinsame Ausschreibung von Abschlussarbeiten (Bachelor/Master) des markstones Institute of Marketing, Branding & Technology Wer, wie, was, warum? Das.
 Präsentation transkript:

Emerging Trends in IT (Cyber) Security Prof. Dr. Gabi Dreo Rodosek gabi.dreo@unibw.de Wir leben in einer vernetzen Welt, die omnipräsent ist. Immer kleinere Geräte mit immer mehr Leistung ermöglichen die komfortable Nutzung verschiedenster komplexer Dienste (Apps), den Zugriff auf Daten von überall und jederzeit. Die IKT ermöglicht die Entwicklung immer „smarterer“ Technologien und Geräte so wie z.B. Smart Meter, Smart Grid, Smartphone, die uns das Leben wesentlich erleichtern. Es existieren jedoch auch Bedrohungen in dieser virtuellen Welt. Im Vortrag möchte ich zunächst auf den Paradigmen-Wechsel, den Stand der Technik und die neune Herausforderungen wenn über das Future Internet nachgedacht wird, erklären. Um in die Thematik einzuführen, möchte ich einen kleinen Filmbeitrag zeigen, der bei uns an der Uni gedreht wurde.

Our Life in Cyber Space … We need to protect our life in cyber space Digital Identities Services, Content, Data … Critical infrastructures, … But we face Billions of mobile devices, bandwidths of 100 Gbit/s and more, heterogeneity, Cloud Computing , … and everything is getting smarter … Smartphone, Smart Meter, Smart Grid, Smart Home, Smart City, Smart Car, Smart Factory ... What needs to be done to prevent them in the future?

Interconnected World Finance, Industry plants,

Paradigm Shift Example: Smart Grid / Smart Meter Manipulation of sensors in the Grid Manipulation of the electricity distribution Manipulation and reading of electricity consumption Download of malware on smart meters Analysis of usage profiles

Paradigm Shift Example: Car-IT, ConnectedDrive

Paradigm Shift Electrical Power Supply, Automotive Industry, Finance, Health, Production Control (Industry 4.0), ... Information and Communication Technology (ICT) is Key! New areas are not adequately protected! “All-over-IP” and “IP-over-All”

Cyber Attacks Today (1) 2009: Operation Aurora 2010: Stuxnet 2011: Attack on RSA SecurID 2012: Flamer, MiniFlamer Stuxnet almost ruined one-fifth of the Iranian nuclear centrifuge by spinning out of control while simultaneously replaying the recorded system values which shows the normal functioning centrifuge during the attack.[ The breach into RSA's network was carried out by crackers who sent phishing emails to two targeted, small groups of employees of RSA.[16] Attached to the email was an Excel file containing malware. When an RSA employee opened the Excel file, the malware exploited a vulnerability in Adobe Flash. The exploit allowed the hackers to use Poison Ivy Remote Administration Tool to gain control of machines and access servers in RSA's network.[

Cyber Attacks Today (2) Bank robbers are going online June 2012 „High Roller“ attack Hacking Servers of Police and Customs („No-Name-Crew“) Aim: Getting Data! A global financial fraud scheme that uses an active and passive automated transfer system to siphon money from high balance accounts 60 million euros (US$75.1 million) and 2 billion euros

Smart Attack Today: Facing Smart Attacks immune stealth victim (against existing countermeasures) difficult to detect stealth inconspicuous behaviour targeted victim goal Smart Attack persistent sleeper novel complex various attack vectors various vulnerabilities complex crafted camouflage efficient adaptable backdoor, command and control

Interconnected Systems Social Media, Cloud, Mobile Networks, Car2X ... It‘s all about Data Processes Analytics Big Problem Big Data Big System Data Correlation (Time, Place, Source, Identity, System...) Automated Actions Interconnected Systems Social Media, Cloud, Mobile Networks, Car2X ...

Concluding Remarks Threats are diverse; cyber attacks are growing, are complex, targeted and anonymous Security-by-Design! Cyber defence is expensive; a non adequate defence is even more expensive New Technologies = New Threats New Technologies = New Possibilities! Smart Attacks require Smart Defence! State Office of Criminal Investigation Federal Office for Information Security Federal Armed Forces