We are currently experiencing the digital transformation of our economy and society. This fundamental change is accompanied by extensive digitization and networking in all areas, creating a world in which the previous separation between off - and online no longer predominates. The physical world is merging with the digital world.
This presents many new opportunities and possibilities, but also an equal number of challenges and risks.
ICT security in particular can no longer rely solely on established models and solution strategies. The trinity of privacy, integrity, and availability as the fundamental base of IT-Security must be reconsidered and revised to fit the new global cyberworld. In the networked world, previously self-suffi cient systems have suddenly become elements of a global "system of systems". The fusion of heterogeneous application systems increases the number of targets for cyberattacks and their harmful effects. Security gaps in soft- and hardware represent one of the biggest challenges, since they are deeply rooted in these systems’ own development histories. Over and above this, the deep integration of, and high level of interdependency between, ICT and physical systems present new areas for attack, for which innovative defense concepts are hard to find.
The discovery of the ›Meltdown‹ hardware gap, that can be exploited using the ›Spectre‹ attack scenario, illustrated that full protection against cyber-attacks can never be guaranteed. Such gaps in security as these serious processor errors often remain undiscovered for years, during which time they can be exploited by attackers. A further problematic issue is soft- and hardware components that use outdated security solutions that, in addition to this, were often never intended to be used within a system of systems. These solutions often lack basic options for retrospective back-ups, such as patch management. Security experts have thus been giving warnings about inadequate quality control in the Internet of Things for many years now. The fight for market share often comes at the cost of product security, in turn often fi rst made possible by the lack of quality control standards.
The Cyber Resilient Architectures and Security competence cluster is addressing these challenges, answering them with a four-point model that makes systems robust, stable, and adjustable when faced with flexible, cooperative, intelligently acting attackers:
Farhat, Soha and Hassan, Batool Hage and Samhat, Abed Ellatif; 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob); 2018
Jithin Zacharias and Sibylle Fröschle; 2018 IEEE Vehicular Networking Conference (VNC); 2018
Marie Clausen, Marion Gottschalk, Sebastian Hanna, Christina Kronberg, Christine Rosinger, Maike Rosinger, Judith Schulte, Johann Schütz, Mathias Uslar; CIRED WORKSHOP 2018 proceedings "Microgrids and local energy communities"; June / 2018
Neureiter, Christian and Eibl, Günther and Engel, Dominik and Schlegel, Stefanie and Uslar, Mathias; Computer Science-Research and Development; 2016
Uslar, Mathias and Rosinger, Christine and Schlegel, Stefanie and Santodomingo-Berry, Rafael; Advances and New Trends in Environmental and Energy Informatics; 2016
Stühring, Alexander and Ehmen, Günter and Fröschle, Sibylle; Proceedings of the Conference on Design, Automation and Test in Europe (DATE) 2016; 2016
Döring, Michael and Burger, Karsten and Uslar, Mathias; 3. Konferenz: zukünftige Stromnetze für Erneuerbare Energien; 2016