We are currently experiencing the digital transformation of our economy and society. This fundamental change is accompanied by extensive digitization and networking in all areas, creating a world in which the previous separation between off - and online no longer predominates. The physical world is merging with the digital world.
This presents many new opportunities and possibilities, but also an equal number of challenges and risks.
ICT security in particular can no longer rely solely on established models and solution strategies. The trinity of privacy, integrity, and availability as the fundamental base of IT-Security must be reconsidered and revised to fit the new global cyberworld. In the networked world, previously self-suffi cient systems have suddenly become elements of a global "system of systems". The fusion of heterogeneous application systems increases the number of targets for cyberattacks and their harmful effects. Security gaps in soft- and hardware represent one of the biggest challenges, since they are deeply rooted in these systems’ own development histories. Over and above this, the deep integration of, and high level of interdependency between, ICT and physical systems present new areas for attack, for which innovative defense concepts are hard to find.
The discovery of the ›Meltdown‹ hardware gap, that can be exploited using the ›Spectre‹ attack scenario, illustrated that full protection against cyber-attacks can never be guaranteed. Such gaps in security as these serious processor errors often remain undiscovered for years, during which time they can be exploited by attackers. A further problematic issue is soft- and hardware components that use outdated security solutions that, in addition to this, were often never intended to be used within a system of systems. These solutions often lack basic options for retrospective back-ups, such as patch management. Security experts have thus been giving warnings about inadequate quality control in the Internet of Things for many years now. The fight for market share often comes at the cost of product security, in turn often first made possible by the lack of quality control standards.
The Cyber-Resilient Architectures and Security competence cluster is addressing these challenges, answering them with a four-point model that makes systems robust, stable, and adjustable when faced with flexible, cooperative, intelligently acting attackers:
Michael Brand, Felipe Castro, Batoul Hage Hassan, Carsten Krüger, Torben Logemann, Björn Siemers, Dennis Weller, Torge Wolff, Sebastian Lehnhoff; Abstracts of the 10th DACH+ Conference on Energy Informatics; 09 / 2021
Maedeh Mahzarnia ; Mohsen Parsa Moghaddam ; Payam Teimourzadeh Baboli ; Pierluigi Siano; IEEE Systems Journal; 2020
Attarha, Shadi and Narayan, Anand and Hage Hassan, Batoul and Krüger, Carsten and Castro, Felipe and Babazadeh, Davood and Lehnhoff, Sebastian; Energies; May / 2020
Michael Brand, Shoaib Ansari, Felipe Castro, Ranim Chakra, Batoul Hage Hassan, Carsten Krüger, Davood Babazadeh, Sebastian Lehnhoff; PowerTech; 2019
Fischer, Lars and Memmen, Jan-Menno and Veith, Eric M. S. P. and Tröschel, Martin; ENERGY 2019, The Ninth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies; 2019
Eric M.S.P. Veith, Lars Fischer, Martin Tröschel, Astrid Nieße; International Conference on Artificial Intelligence, Robotics and Control; December / 2019
Sibylle Fröschle, Axel Hahn, Julius Möller, Jin H. Park; ENAV24; 2019
Brand, Michael and Babazadeh, Davood and Lehnhoff, Sebastian and Engel, Dominik; EPJ Web of Conferences; 2019
Sibylle Fröschle; Report from Dagstuhl Seminar 19432: Analysis of Autonomous Mobile Collectives in Complex Physical Environments; 2019
Farhat, Soha and Hassan, Batool Hage and Samhat, Abed Ellatif; 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob); 2018