We are currently experiencing the digital transformation of our economy and society. This fundamental change is accompanied by extensive digitization and networking in all areas, creating a world in which the previous separation between off - and online no longer predominates. The physical world is merging with the digital world.
This presents many new opportunities and possibilities, but also an equal number of challenges and risks.
ICT security in particular can no longer rely solely on established models and solution strategies. The trinity of privacy, integrity, and availability as the fundamental base of IT-Security must be reconsidered and revised to fit the new global cyberworld. In the networked world, previously self-suffi cient systems have suddenly become elements of a global "system of systems". The fusion of heterogeneous application systems increases the number of targets for cyberattacks and their harmful effects. Security gaps in soft- and hardware represent one of the biggest challenges, since they are deeply rooted in these systems’ own development histories. Over and above this, the deep integration of, and high level of interdependency between, ICT and physical systems present new areas for attack, for which innovative defense concepts are hard to find.
The discovery of the ›Meltdown‹ hardware gap, that can be exploited using the ›Spectre‹ attack scenario, illustrated that full protection against cyber-attacks can never be guaranteed. Such gaps in security as these serious processor errors often remain undiscovered for years, during which time they can be exploited by attackers. A further problematic issue is soft- and hardware components that use outdated security solutions that, in addition to this, were often never intended to be used within a system of systems. These solutions often lack basic options for retrospective back-ups, such as patch management. Security experts have thus been giving warnings about inadequate quality control in the Internet of Things for many years now. The fight for market share often comes at the cost of product security, in turn often fi rst made possible by the lack of quality control standards.
The Cyber Resilient Architectures and Security competence cluster is addressing these challenges, answering them with a four-point model that makes systems robust, stable, and adjustable when faced with flexible, cooperative, intelligently acting attackers:
Michael Brand, Shoaib Ansari, Felipe Castro, Ranim Chakra, Batoul Hage Hassan, Carsten Krüger, Davood Babazadeh, Sebastian Lehnhoff; PowerTech; 2019
Fischer, Lars and Memmen, Jan-Menno and Veith, Eric M. S. P. and Tröschel, Martin; ENERGY 2019, The Ninth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies; 2019
Eric M.S.P. Veith, Lars Fischer, Martin Tröschel, Astrid Nieße; International Conference on Artificial Intelligence, Robotics and Control; December / 2019
Farhat, Soha and Hassan, Batool Hage and Samhat, Abed Ellatif; 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob); 2018
Lars Fischer and Sebastian Lehnhoff; Handbook on Resilience of Socio-technical Systems; 2018
Jithin Zacharias and Sibylle Fröschle; 2018 IEEE Vehicular Networking Conference (VNC); 2018
Marie Clausen, Marion Gottschalk, Sebastian Hanna, Christina Kronberg, Christine Rosinger, Maike Rosinger, Judith Schulte, Johann Schütz, Mathias Uslar; CIRED WORKSHOP 2018 proceedings "Microgrids and local energy communities"; June / 2018