• Keine Ergebnisse gefunden

Cyber security problem areas - Prof. Norbert Pohlmann

N/A
N/A
Protected

Academic year: 2021

Aktie "Cyber security problem areas - Prof. Norbert Pohlmann"

Copied!
7
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Chairman IT security association TeleTrusT

Professor for Information Security

Director of the Institute for Internet Security at the University of Applied Sciences Gelsenkirchen

Prof. Dr. (TU NN)

Norbert Pohlmann

Welcome to the

European Cyber Security Challenge

(2)

- Prof . Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

Cyber security problem areas

Privacy and Autonomy

 Cultural differences

 Business model "Payment with personal data“

 State (e.g. NSA, BND, ...): Identifying terrorists´ activities

 User: autonomy within the meaning of self-determination

Economic Espionage

 about € 51 billion of damage every year (only in Germany)

 Cybercrime: about € 100 million per year

e.g. Online Banking, DDoS, … (only in Germany)

Cyberwar

 Implementation of political goals (“simple” and “inexpensive”)

 Attacks on Critical Infrastructures

(3)

 Prof . Nor bert Pohl m ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

Increasing IT security issues

Smartphones

offer new attack vectors The Internet user

is still a problem today

Snowden

IT security

problems

time

(4)

 Prof . Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

Why do we carry out

the Cyber Security challenge?

4

Not enough IT security professionals  to solve the cyber security problems.

Cyber Security competition

 identify young cyber security talents  career in cyber security.

European Cyber Security Challenge

 national competitions  pan-European level.

The best cyber security talents from each country meet to compete against each other to find out which country has the best cyber talents.

(5)

 Prof . Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

European Cyber Security Challenge

5

This year 10 countries from Europe sent their best Cyber Security talents

100 young cyber security talents

The cyber Security talents have to solve security related tasks web security mobile security crypto puzzles reverse engineering forensics …

teams can attack the others and defend themselves accordingly

Ireland Austria Estonia Greece Switzerland Germany Liechtenstein United Kingdom Spain Romania

(6)

 Prof . Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit -if (is) , W e stf äl ische Hoc hschule, Gels enkir chen

Special Agenda Topics

6

4 pm: “10 Hacks in 10 Minutes”

6:30 pm: “Award Ceremony”

Party

(7)

Chairman IT security association TeleTrusT

Professor for Information Security

Director of the Institute for Internet Security at the University of Applied Sciences Gelsenkirchen

Prof. Dr. (TU NN)

Norbert Pohlmann

Cyber Security Challenge Conference

and talents

for an improved risk level

European Cyber Security Challenge

Referenzen

ÄHNLICHE DOKUMENTE

Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit - if (is) , W e stf äl ische Hoc hschule, Gels enkir chen $ Bank. Nutzt

Nor bert Pohl m ann , Ins titut für In tern et -Si cherheit - if (is) , W e stf äl ische Hoc hschule, Gels enkir chen IT-Sicherheit..  Die

Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit - if (is) , W e stf äl ische Hoc hschule, Gels enkir chen 2 Inhalt!. Internet

Nor bert Pohl m ann , Ins titut für In tern et -Si cherheit - if (is) , W e stf äl ische Hoc hschule, Gels enkir chen IT Security Sovereignty.  Everything comes

bert Pohl m ann , Ins titut für In tern et -Si cherheit - if (is) , W e stf äl ische Hoc hschule, Gels enkir chen Strategie IT-Sicherheit.  Generelles Ziel

Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit - if (is) , W e stf äl ische Hoc hschule, Gels enkir chen Cyber Security  Situation 2 Bugs VPN..

Nor bert Pohlm ann , Ins titut für In tern et -Si cherheit - if (is) , W e stf äl ische Hoc hschule, Gels enkir chen Prinzipielle IT Sicherheitsstrategien  Fokussierung.

Nor bert Pohl m ann , Ins titut für In tern et -Si cherheit - if (is) , W e stf äl ische Hoc hschule, Gels enkir chen 12 Persönliche Daten sind ein Rohstoff