• Keine Ergebnisse gefunden

Common Approach for more IT security - Prof. Pohlmann

N/A
N/A
Protected

Academic year: 2021

Aktie "Common Approach for more IT security - Prof. Pohlmann"

Copied!
23
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Institute for Internet Security - if(is)

Westphalian University of Applied Sciences

http://www.internet-sicherheit.de

Prof. Dr.

(TU NN)

Norbert Pohlmann

Common Approach

(2)

bert Pohlm ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

Content

Internet and IT Security

(Situation, problem areas, challenges)

Methods for more IT security

(Cooperation, sovereignty)

The right approach for more IT Security

(Analogy, goal orientation)

Strategy for more IT Security

(Objectives and tasks)

(3)

 Prof . Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

3

Content

Internet and IT Security

(Situation, problem areas, challenges)

Methods for more IT security

(Cooperation, sovereignty)

The right approach for more IT Security

(Analogy, goal orientation)

Strategy for more IT Security

(Objectives and tasks)

(4)

bert Pohlm ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

Internet and IT Security

 Situation

We are currently developing an Internet society

(source of information, e-commerce, e-government, ...,

e-assistant, ..., industry 4.0, the Internet of Things, ...)

Many local services are linked to the Internet

(intelligent analysis  Internet connectivity)

Private and corporate data stores increase in the Internet

(central storage  Internet connectivity)

The IT and IT security technologies are not sure and

trustworthy enough!

Professional hackers are very successful!

(5)

 Prof . Nor bert Pohl m ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

What are the problem areas?

 1. Privacy and Autonomy

5

Privacy / Autonomy

Different perspectives

Business models

"Payment

with personal data"

State (e.g. NSA, BND, ...):

Identifying terrorists´ activities?

Cultural differences

(Private data belong to

companies? US 76%, DE 22%)

User: autonomy within the

meaning of self-determination

(6)

bert Pohl m ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

What are the problem areas?

 2. Industrial Espionage

Industrial Espionage

about € 51 billion of damage annually

For comparison:

Cybercrime: about € 100 million per year

(7)

 Prof . Nor bert Pohl m ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

What are the problem areas?

 3. Cyberwar

7

Cyberwar

Implementation of policy objectives

 Simple and “inexpensive”

Attacks on Critical Infrastructures

e.g. Power supply, water supply, ...

(8)

bert Pohl m ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

IT Security

 The biggest challenges

Inadequate software quality

(0.5 erros 1000 LoC..)

Manipulated IT and

IT security technology

(Random numbers, Backdoors, …)

Insufficient protection

against Malware

(only 45% detection rate)

Insecure web servers

(2.5 % distribute malicious software)

Internet users are not

skilled enough

(24 % „click“ spams)

(9)

 Prof . Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

Current Challenges

 with current risks

9

No international identity management

(passwords for authentication in the Internet, …)

We need modern, easy to use, easy to integrate, … authentication systems, which

can be used in every organization (mobile device based, FIDO-ready, different

security level, for the real and virtual world,…).

New threats by mobile devices

(BYOD, quantity instead of quality, tracking, loss / theft, …)

We need intelligent, modern and secure mobile device management systems, which

make the use easy for the companies and for the users (service orientation)

Too high risks when communicating

(e-mail, web, chat, …)

We need modern communication systems, which offer an easy to use, secure and

trustworthy communication

Cloud computing is a major challenge

(session hijacking, place of storage, …)

We need easy to use, secure and trustworthy cloud services based in Germany

(10)

bert Pohlm ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

Current Challenges

 with future major risks

Industry 4.0

Complex systems and control devices are connected to the Internet

Internet of Things

(IoT)

(11)

 Prof . Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

Internet and IT security

 Evaluation of the situation

11

We know the IT security problems, but the today available and

used IT security systems and IT security measures

do not reduce the IT security risk sufficiently!

IT security is a global challenge

Future attacks will exceed the current damage

We need innovative approaches

in the field of Internet security

to reduce the risk for our society

at a reasonable level

(12)

bert Pohlm ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

Current conditions in Europe

 which will drive the IT security

eIDAS (European Law for trust services)

Trust Services ( TeleSec)

Electronic Signature (also in the cloud  remote signature)

Electronic Seal (Signature for organizations)

Electronic Time Stamps

Electronic Registered Delivery Services

...

IT security law (in Germany)

Situation awareness, SIEM systems, reaction strategies, …

Minimum standards, “State of the art” and audits will drive the

IT security market (critical infrastructure  industry  all user)

(13)

 Prof . Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

13

Content

Internet and IT Security

(Situation, problem areas, challenges)

Methods for more IT security

(Cooperation, sovereignty)

The right approach for more IT Security

(Analogy, goal orientation)

Strategy for more IT Security

(Objectives and tasks)

(14)

bert Pohl m ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

IT Security Replaceability

 Standard Software from USA/cooperation

Security Kernel

(Trusted Computing Base)

Isolation, separation

and modeling

IT Security made in Germany

(no backdoors,

no manipulation, …)

More data encryption

Internet users must

be well educated

Examples

► Modern IT security architecture

► disk encryption

Examples

► Modern IT security architecture

► disk encryption

Modern

IT security

architecture

(15)

 Prof . Nor bert Pohl m ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

IT Security Sovereignty

 Everything comes from DE

15

Security Kernel

(Trusted Computing Base)

Isolation, separation

and modeling

IT Security made in Germany

(no backdoors,

no manipulation, …)

Standardization of interfaces

and protocols

IT security infrastructure

Modern

IT security

architecture

Examples

► Industry 4.0

► Internet of Things

► …

Examples

► Industry 4.0

► Internet of Things

► …

(16)

bert Pohlm ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

Content

Internet and IT Security

(Situation, problem areas, challenges)

Methods for more IT security

(Cooperation, sovereignty)

The right approach for more IT Security

(Analogy, goal orientation)

Strategy for more IT Security

(Objectives and tasks)

(17)

 Prof . Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

Road deaths

 1991 until today (analogy)

17

0

2.000

4.000

6.000

8.000

10.000

12.000

1991

1996

2001

2006

2011

heute

Number of road deaths in DE

1991

1996

2001

2006

2011

heute

Quelle: Statistisches Bundesamt/Statista

3.368

11.300

(18)

bert Pohl m ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

Rapide reduction of road deaths

 How was this achieved?

► Modern safety systems

(seat belt, airbag, ABS, ESP, …)

► More robust

construction

► New innovative ideas

(Car2Car / Communication Infrastructure)

► Awareness car drivers

► Seat Belts

► Enhanced

Drug Tests

Executive Authorities

("Enforcement", speed limits, traffic regulations)

► TÜV duty for cars

► Vests mandatory

in case of accidents

► Stronger controls

of buses and trucks

► deforested avenue trees

Better infrastructure

(New streets, modern traffic

control systems, , …)

Infrastructure operators

(Cities, states, federal government)

► Improved tunnels

and bridges

(19)

 Prof . Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

19

Content

Internet and IT Security

(Situation, problem areas, challenges)

Methods for more IT security

(Cooperation, sovereignty)

The right approach for more IT Security

(Analogy, goal orientation)

Strategy for more IT Security

(Objectives and tasks)

(20)

bert Pohl m ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

Strategy IT Security

 The general objective and tasks

adequate

risk

adequate

risk

adequate

risk

Creating a capital market

for IT security

Mandatory minimum standards

for IT security

Definition of requirements

on IT security for the future

Extensive product liability

for IT security in the IT

Strengthen the

IT security infrastructure

Competence development

of employees and citizens

(21)

 Prof . Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

21

Content

Internet and IT Security

(Situation, problem areas, challenges)

Methods for more IT security

(Cooperation, sovereignty)

The right approach for more IT Security

(Analogy, goal orientation)

Strategy for more IT Security

(Objectives and tasks)

(22)

bert Pohlm ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

Conclusion and outlook

 focused and common activities

We now have to define common objectives with all stakeholders

and actively implement tasks accordingly!

IT security manufacturers

(Simple, manageable and combined solutions that are well integrated in

technologies, products and services, ...)

User Companies

(purchasing cooperatives in order to motivate for example modern IT

security architectures, existing and needed solutions have to be used

actively, ...)

Universities

(Close gaps, meet new requirements, generate innovation in the necessary

fields, ...)

State

(23)

Institute for Internet Security - if(is)

Westphalian University of Applied Sciences

http://www.internet-sicherheit.de

Prof. Dr.

(TU NN)

Norbert Pohlmann

The right way to

a trusted and secure modern future

Common Approach

 for more IT security

Referenzen

ÄHNLICHE DOKUMENTE

Nor bert Pohl m ann , Ins titut für In tern et -Si cherheit - if (is) , W e stf äl ische Hoc hschule, Gels enkir chen Strategiepapier IT-Sicherheit NRW 4.0 Gemeinsam ins

Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit - if (is) , W e stf äl ische Hoc hschule, Gels enkir chen $ Bank. Nutzt

Nor bert Pohl m ann , Ins titut für In tern et -Si cherheit - if (is) , W e stf äl ische Hoc hschule, Gels enkir chen IT-Sicherheit..  Die

bert Pohl m ann , Ins titut für In tern et -Si cherheit - if (is) , W e stf äl ische Hoc hschule, Gels enkir chen Strategie IT-Sicherheit.  Generelles Ziel

Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit - if (is) , W e stf äl ische Hoc hschule, Gels enkir chen Inhalt IT-Sicherheitslage.. (Situation,

Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit - if (is) , W e stf äl ische Hoc hschule, Gels enkir chen 19 IT-Sicherheitsherausforderungen.  Wissen und

Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit - if (is) , W e stf äl ische Hoc hschule, Gels enkir chen Prinzipielle IT Sicherheitsstrategien  Fokussierung.

Nor bert Pohl m ann , Ins titut für In tern et -Si cherheit - if (is) , W e stf äl ische Hoc hschule, Gels enkir chen 12 Persönliche Daten sind ein Rohstoff