ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange

Size: px
Start display at page:

Download "ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange"

Transcription

1 ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Overview on Activities Related to Academic Utilization Contributors: Cassidian Systems ERNW Enno Rey Netzwerke GmbH Fraunhofer Research Institution for Applied and Integrated Security (AISEC) Hochschule Augsburg Nokia Siemens Networks GmbH & Co KG RWTH Aachen Editor: André Egners (RWTH Aachen)

2 Author(s) Company André Egners RWTH Aachen About the ASMONIA project Given their inherent complexity, protecting telecommunication networks from attacks requires the implementation of a multitude of technical and organizational controls. Furthermore, to be fully effective these measures call for the collaboration between different administrative domains such as network operators, manufacturers, service providers, government authorities, and users of the services. ASMONIA is the acronym for the German name* of a research project that aims to improve the resilience, reliability and security of current and future mobile telecommunication networks. For this purpose the ASMONIA consortium made up of several partners from academia and industry performs a number of research tasks, based on the specific expertise of the individual partners. The project running from September 2011 till May 2013 receives funding from the German Federal Ministry of Education and Research (Bundesministerium für Bildung und Forschung, BMBF). Various associated partners further contribute on a voluntary basis. * The full name is "Angriffsanalyse und Schutzkonzepte für MObilfunkbasierte Netzinfrastrukturen unterstützt durch kooperativen InformationsAustausch" (Attack analysis and security concepts for mobile network infrastructures, supported by collaborative information exchange). Partners: Associated Partners: Cassidian Systems ERNW Enno Rey Netzwerke GmbH Fraunhofer Research Institution for Applied and Integrated Security (AISEC) Hochschule Augsburg Nokia Siemens Networks GmbH & Co KG RWTH Aachen Federal Agency for Digital Radio of Security Authorities and Organizations (BDBOS) Federal Office for Information Security (BSI) Deutsche Telecom AG (DTAG) For more details about the project please visit 2 Copyright 2012 ASMONIA consortium. All rights reserved.

3 Executive Summary The purpose of this document is to collect and summarize ongoing and finished work with respect to the academic utilization. Each of the partners involved in the ASMONIA project devoted some resources to utilizing the results achieved during the project s runtime. This includes publications at various conferences, the organization of project workshops, talks or posters at external events, as well as the thematic integration into teaching curricula. Copyright 2012 ASMONIA consortium. All rights reserved. 3

4

5 Table of Contents 1 Publications 6 2 External Workshops st External ASMONIA Workshop 7 3 Posters & Talks Posters Talks 8 4 ASMONIA Website 9 References 10 Glossary and Abbreviations 11 Glossary 11 Abbreviations 11 Revision History 12 Copyright 2012 ASMONIA consortium. All rights reserved. 5

6 1 Publications This chapter presents the publications in conferences proceedings, academic journals, and other written formats of the ASMONIA project as of January Tailored Concepts for Software Integrity Protection in Mobile Networks, Manfred Schäfer (NSN) and Wolf-Dietrich Moeller (NSN), Germany, in International Journal on Advances in Security Volume 4, 2011 [SM2011] Mit Sicherheit zum Geschäftserfolg: Ökonomische Einflüsse von Sicherheitsmechanismen auf die Wertschöpfung in Mobilfunknetzen, Michael Hoche (CASSIDIAN) and Heiko Kirsch (CASSIDIAN), in Praxis der Informationsverarbeitung und Kommunikation (PIK), Volume 34, Issue 4, Walter de Gruyter GmbH & Co. KG, Berlin/Boston, 2011 [HK_PIK2011] 6 Copyright 2012 ASMONIA consortium. All rights reserved.

7 2 External Workshops This chapter presents the workshops of the ASMONIA project as of January st External ASMONIA Workshop Date: This external workshop has been organized by ERNW and was held in conjunction with the Troopers 2011 IT-Security conference in Heidelberg. The slide set of each talk can be found on the ASMONIA website The agenda can be seen below: ASMONIA Overview and Reference Architecture for Collaborative Information Exchange, Hans Hofinger, Fraunhofer AISEC, Garching near Munich, Germany Cyber Fed Model - a Collaborative Threat Mitigation Tool, Scott C. Pinkerton, Argonne National Laboratory, Chicago, IL, US Input for the Local Security Overview and Dashboard, Heiko Kirsch and Michael Hoche, Cassidian Systems, Friedrichshafen, Germany FIDeS: Event Correlation based on Knowledge-Supported Machine Learning, Mirko Horstmann, Technologie-Zentrum Informatik und Informationstechnik, Bremen, Germany Integrity Protection for 4G Devices and NW Elements, Manfred Schäfer and Sascha Wessel, Nokia Siemens Networks and Fraunhofer AISEC, Munich, Germany Femtocell: Femtostep to the Holy Grail, Ravishankar Borgaonkar and Kevin Redon, T-Labs, Berlin, Germany Future Directions in Malware Detection on Mobile Handsets, André Egners, RWTH Aachen University, Germany Project AMSEL: Automatically Collect and Learn to Detect Malware, Michael Meier, Technical University Dortmund, Germany Worldwide Observatory of Malicious Behaviours and Attack Threats, Apostolis Zarras, Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH), Greece Usage Scenarios of Elastic Systems in a Telco Infrastrucutre, Mark Gall, Fraunhofer AISEC, Garching near Munich, Germany Cloud Networking Research in SAIL Project, Dominique Dudkowski, NEC Europe Ltd., Heidelberg, Germany Threats and risks for 4G Mobile Communication Networks and Terminals, Peter Schneider, Nokia Siemens Networks, Munich, Germany Copyright 2012 ASMONIA consortium. All rights reserved. 7

8 3 Posters & Talks This chapter presents the posters and talks of the ASMONIA project as of January Posters "Sharing Knowledge to Improve Misuse Prevention and Situational Awareness", Peter Schoo (Fraunhofer AISEC), BMBF Kongress Zukünftiges Internet 2011, Juli 2011, Berlin (http://asmonia.de/publications/asmoniaposterfutureinternet2011.pdf) 3.2 Talks Security and Regulatory Requirements for Public Could Offerings to Support Selected Customer Use Cases, Joachim Lüken (NSN) and Mark Gall (FRAUNHOFER AISEC), Troopers IT-Security Conference 2011 (http://www.troopers.de/wpcontent/uploads/2011/04/tr11_gall_lueken_security_and_regulatory_requirements _for_cloud_offerings.pdf) Future Directions in Mobile Malware Detection on Mobile Handsets, André Egners (RWTH Aachen), Troopers IT-Security Conference 2011 (http://www.troopers.de/wpcontent/uploads/2011/04/tr11_egners_malware_detection.pdf) Business Transparency via Security Dashboards, Heiko Kirsch (CASSIDIAN), Michael Hoche (CASSIDIAN), Troopers IT-Security Conference 2011 (http://www.troopers.de/wpcontent/uploads/2011/04/tr11_kirsch_business_transparency.pdf) "Innovative Schutzkonzepte für Mobilfunkbasierte Netzinfrastrukturen", Peter Schoo (Fraunhofer AISEC), Kolloquium Universität der Bundeswehr München, 2011 Sicherheit hat ihren Preis: Modellierung des Einflusses von Sicherheitsmechanismen auf Werteflüsse in Informations- und Kommunikationssystemen, Heiko Kirsch (CASSIDIAN), Michael Hoche (CASSIDIAN), in Essener Workshop zur Netzsicherheit 2011 (EWNS11) [HK2011] Business meets Security Risk Economical Insights for Risk-Based Decisions, Heiko Kirsch (CASSIDIAN), Michael Hoche (CASSIDIAN), in 3 rd International Workshop on Early Warning Systems in IT (EWS11) [KH2011] 8 Copyright 2012 ASMONIA consortium. All rights reserved.

9 4 ASMONIA Website Relevant external information concerning the ongoing project is presented on the ASMONIA website News about the project status, press releases, as well the publication of project deliverables can be found on the website. The website is maintained at Fraunhofer AISEC by Hans Hofinger. Figure 1 : ASMONIA Website (December 2011) Copyright 2012 ASMONIA consortium. All rights reserved. 9

10 References [SM_IJAS2011] Manfred Schäfer, Wolf-Dietrich Moeller, "Tailored Concepts for Software Integrity Protection in Mobile Networks", International Journal On Advances in Security Vol.4, September [KH_EWNS2011] Heiko Kirsch, Michael Hoche, "Sicherheit hat ihren Preis: Modellierung des Einflusses von Sicherheitsmechanismen auf Werteflüsse in Informations- und Kommunikationssystemen", Essener Workshop zur Netzsicherheit _CASSIDIAN.pdf [HK_EWS2011] [HK_PIK2011] Michael Hoche, Heiko Kirsch, Business meets Security Risk Economical Insights for Risk-Based Decisions, 3 rd International Workshop on Early Warning Systems in IT (EWS11) Michael Hoche, Heiko Kirsch, Mit Sicherheit zum Geschäftserfolg: Ökonomische Einflüsse von Sicherheitsmechanismen auf die Wertschöpfung in Mobilfunknetzen, Praxis der Informationsverarbeitung und Kommunikation (PIK) Journal, Copyright 2012 ASMONIA consortium. All rights reserved.

11 Glossary and Abbreviations Glossary Term Explanation Source Abbreviations Copyright 2012 ASMONIA consortium. All rights reserved. 11

12 Revision History Version Date Changes Initial Version Review Version Final Version 12 Copyright 2012 ASMONIA consortium. All rights reserved.

ASMONIA. Analysis of Requirements for the Deployment of Cloud Systems. WP 3.1 Deliverable (public) D31-1.0

ASMONIA. Analysis of Requirements for the Deployment of Cloud Systems. WP 3.1 Deliverable (public) D31-1.0 ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Analysis of Requirements for the Deployment of Cloud Systems Contributors:

More information

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Evaluation of the Intercloud Demonstrator Contributors: Cassidian / EADS

More information

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Threat and Risk Analysis for Mobile Communication Networks and Mobile Terminals

More information

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Recommender System for Security Risk Reduction Situational Awareness for

More information

APPLIED AND INTEGRATED SECURITY

APPLIED AND INTEGRATED SECURITY APPLIED AND INTEGRATED SECURITY New approach for Compliance, Security and Data privacy assessment in the Cloud Age NGCert Next Generation Certification EuroCloud Forum 2015 Fraunhofer AGENDA Fraunhofer

More information

4G Mobile Networks At Risk

4G Mobile Networks At Risk 07.05.1203 Consortium Attack analysis and Security concepts for MObile Network infastructures supported by collaborative Information exchange 4G Mobile Networks At Risk The ASMONIA Threat and Risk Analysis

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

Security Management interoperability challenges for Collaborative Clouds

Security Management interoperability challenges for Collaborative Clouds Security interoperability challenges for Collaborative Clouds 4th International DMTF Academic Alliance Workshop on Systems and Virtualization : Standards and the Cloud (SVM 2010) - 29/10/2010 [Michael.Kretzschmar,

More information

smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany

smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany TÜV SÜD AG Embedded Systems TÜV SÜD Akademie GmbH About the Conference To

More information

Multi-Agent Systems. Expert Forum Agents within the context of Industry 4.0. Industry 4.0 Machine Learning. Energy and Smart Grids.

Multi-Agent Systems. Expert Forum Agents within the context of Industry 4.0. Industry 4.0 Machine Learning. Energy and Smart Grids. Multi-Agent Systems Event Expert Forum Agents within the context of Industry 4.0 Industry 4.0 Machine Learning Material Handling Energy and Smart Grids Energy Management Production Control Operations Scheduling

More information

Industry 4.0 Challenges and Opportunities

Industry 4.0 Challenges and Opportunities Industry 4.0 Challenges and Opportunities Institute of Industrial Management and Innovation Research Graz University of Technology 14 th International Conference on Knowledge Technologies and Data-driven

More information

Self-employed business consultant and coach, interested in new consulting, training or coaching work with companies or NGOs in Europe or the US.

Self-employed business consultant and coach, interested in new consulting, training or coaching work with companies or NGOs in Europe or the US. Martin Roell Business Consultant, Trainer and Coach martin@roell.net Summary Self-employed business consultant and coach, interested in new consulting, training or coaching work with companies or NGOs

More information

National Plan for Information Infrastructure Protection

National Plan for Information Infrastructure Protection National Plan for Information Infrastructure Protection www.bmi.bund.de Contents 1 Introduction 2 1.1 Germany s information infrastructures 2 1.2 Threats and risks to our information infrastructures 3

More information

for High Performance Computing

for High Performance Computing Technische Universität München Institut für Informatik Lehrstuhl für Rechnertechnik und Rechnerorganisation Automatic Performance Engineering Workflows for High Performance Computing Ventsislav Petkov

More information

Research scientist at the Chair of Psychology (Prof. Dr. Hugo M. Kehr)

Research scientist at the Chair of Psychology (Prof. Dr. Hugo M. Kehr) CURRICULUM VITAE DIPL.-PSYCH. MAIKA RAWOLLE January 21, 1982 Born in Rathenow, Germany CURRENT POSITION Since 01/2007 Technische Universität München, Germany Research scientist at the Chair of Psychology

More information

Paradigmenw echsel in der IT-Sicherheit Sicherheit vor Malw are-angriffen und Datenspionage

Paradigmenw echsel in der IT-Sicherheit Sicherheit vor Malw are-angriffen und Datenspionage Paradigmenw echsel in der IT-Sicherheit Sicherheit vor Malw are-angriffen und Datenspionage Ammar Alkassar, CEO 8. Oktober 2013 It-sa Forum Rot Sirrix AG Founded in 2001 as a technology spin-off from the

More information

Secure Services and Quality Testing SST. Security Engineering Privacy by Design Trusted Solutions. Mario Hoffmann. for Service Ecosystems

Secure Services and Quality Testing SST. Security Engineering Privacy by Design Trusted Solutions. Mario Hoffmann. for Service Ecosystems Secure Services and Quality Testing SST Security Engineering Privacy by Design Trusted Solutions for Service Ecosystems Mario Hoffmann Head of Department Fraunhofer AISEC in a nutshell Fraunhofer Profile

More information

The Annual Conference 2009 was supported by:

The Annual Conference 2009 was supported by: Acknowledgement of sponsors and contributors The Annual Conference 2009 was supported by: Cooperation partner Sponsorer and patron Bundesministerium für Umwelt, Naturschutz und Reaktorsicherheit Patron

More information

Applicant s Research Profile. Univ.-Prof. Dr.-Ing. habil. Dipl.-Wirt. Ing.

Applicant s Research Profile. Univ.-Prof. Dr.-Ing. habil. Dipl.-Wirt. Ing. Applicant s Research Profile Personal Information Last Name, First Name: Cherif, Chokri Academic Title: Univ.-Prof. Dr.-Ing. habil. Dipl.-Wirt. Ing. Birthday: 24.05.1966 Nationality: Marital Status: Institution:

More information

Photonics Industry report 2013

Photonics Industry report 2013 Key Data Photonics Industry report 2013 Imprint In Charge of Content/ Publisher Workgroup Market Research Photonics Mike Bähren SPECTARIS e.v., Berlin Harald Hartmann SPECTARIS e.v., Berlin Gerhard Hein

More information

IT-/IP-Law Intellectual Property Commercial and Corporate Law Labour Law

IT-/IP-Law Intellectual Property Commercial and Corporate Law Labour Law IT-/IP-Law Intellectual Property Commercial and Corporate Law Labour Law Darmstadt Berlin We put the I in expertise, with IP, IT and IQ in any legal context. We specialize in IT and IP law in the context

More information

Cyber Security From product to system solution

Cyber Security From product to system solution Markus Brändle, Network Management Forum Heidelberg, 8./9./10. October 2013 Cyber Security From product to system solution ABB Network Management Forum October 14, 2013 Slide 1 Cyber Security A definition

More information

Security and Compliance in Clouds: Challenges and Solutions

Security and Compliance in Clouds: Challenges and Solutions Security and Compliance in Clouds: Challenges and Solutions Prof. Dr. Jan Jürjens Fraunhofer Institut für Software- und Systemtechnologie ISST, Dortmund http://jan.jurjens.de This Talk What are the challenges?

More information

Modeling Software Engineering Education with i* Michael Koch Dieter Landes Coburg University of Applied Sciences and Arts

Modeling Software Engineering Education with i* Michael Koch Dieter Landes Coburg University of Applied Sciences and Arts Modeling Software Engineering Education with i* Michael Koch Dieter Landes Coburg University of Applied Sciences and Arts istar 2014-7th International i* Workshop - Michael Koch & Dieter Landes - Modeling

More information

Incident Response from a Global Enterprise Perspective Public Siemens AG 2015. All rights reserved

Incident Response from a Global Enterprise Perspective Public Siemens AG 2015. All rights reserved eco, From Detection to Response, Thomas Schreck, 19.02.2015 Incident Response from a Global Enterprise Perspective Siemens Page 2 February 2015 Corporate Technology Corporate Technology - RTC Software

More information

Compliance in Clouds A cloud computing security perspective

Compliance in Clouds A cloud computing security perspective Compliance in Clouds A cloud computing security perspective Kristian Beckers, Martin Hirsch, Jan Jürjens GI Workshop: Governance, Risk & Compliance on the 19th of March 2010 What is Cloud Computing? Today:

More information

How to Teach Teachers to Teach with New Media: Initial and Further Teacher Education in a web-based Collaborative Distant Learning Environment

How to Teach Teachers to Teach with New Media: Initial and Further Teacher Education in a web-based Collaborative Distant Learning Environment Veröffentlicht in: Gudrun Bachmann, Odette Haefeli, Michael Kindt (Hrsg.): Campus 2002: Die virtuelle Hochschule in der Konsolidierungsphase. Waxmann: Münster u.a. 2002 How to Teach Teachers to Teach with

More information

Industrie 4.0 and Digital Transformation in NRW: Challenges, Opportunities and Potential for Cooperation Seoul, 20.04.2016

Industrie 4.0 and Digital Transformation in NRW: Challenges, Opportunities and Potential for Cooperation Seoul, 20.04.2016 Industrie 4.0 and Digital Transformation in NRW: Challenges, Opportunities and Potential for Cooperation Seoul, 20.04.2016 Industrie 4.0 and Digital Transformation in NRW 1 Challenges Enabling Technologies

More information

Kick-off Meeting im Förderschwerpunkt des BMBF: Forschung für die nachhaltige Entwicklung der Megastädte von morgen 23. - 25.11.

Kick-off Meeting im Förderschwerpunkt des BMBF: Forschung für die nachhaltige Entwicklung der Megastädte von morgen 23. - 25.11. Kick-off Meeting im Förderschwerpunkt des BMBF: Forschung für die nachhaltige Entwicklung der Megastädte von morgen 23. - 25.11.2005 Trunk Infrastructure and Urban Growth - Managing Rapid Urbanization

More information

Secondary Use of the EHR via Pseudonymisation

Secondary Use of the EHR via Pseudonymisation Secondary Use of the EHR via Klaus POMMERENING Institut für Medizinische Biometrie, Epidemiologie und Informatik Johannes-Gutenberg-Universität D-55101 Mainz, Germany Michael RENG Klinik und Poliklinik

More information

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in

More information

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas

More information

Lehrstuhl für Rechnertechnik und Rechnerorganisation (LRR-TUM) Annual Report 1998/1999

Lehrstuhl für Rechnertechnik und Rechnerorganisation (LRR-TUM) Annual Report 1998/1999 Research Report Series Lehrstuhl für Rechnertechnik und Rechnerorganisation (LRR-TUM) Technische Universität München http://wwwbode.informatik.tu-muenchen.de/ Editor: Prof. Dr. A. Bode Vol. 18 Lehrstuhl

More information

Cyber-Sicherheit aus Sicht der Wirtschaft Kompetenzen ausbauen, Kräfte bündeln, Kooperationen stärken

Cyber-Sicherheit aus Sicht der Wirtschaft Kompetenzen ausbauen, Kräfte bündeln, Kooperationen stärken Cyber-Sicherheit aus Sicht der Wirtschaft Kompetenzen ausbauen, Kräfte bündeln, Kooperationen stärken Dr. Kai Grassie, G&D Outline Situation within G&D symptomatic for ICT industry? Increasingly connected

More information

Groups Inside FHNW: Why it s not just another AAI SP

Groups Inside FHNW: Why it s not just another AAI SP Groups Inside FHNW: Why it s not just another AAI SP Michael Hausherr, Business Applications FHNW 1 Agenda Introduction (Groups) Inside FHNW Issue 1: authentication for different user groups Issue 2: simple

More information

Security concept for gateway integrity protection within German smart grids

Security concept for gateway integrity protection within German smart grids ASE 2014, ECSaR-Workshop Security concept for gateway integrity protection within German smart grids Prof. Dr. Kai-Oliver Detken 1, Carl-Heinz Genzel 2, Olav Hoffmann 3, Prof. Dr. Richard Sethmann 4 1

More information

Workshop Program 1st German-U.S. Workshop on Predictive Analytics, Cyber-Physical Systems, and Industrie 4.0 in Big Data Environments

Workshop Program 1st German-U.S. Workshop on Predictive Analytics, Cyber-Physical Systems, and Industrie 4.0 in Big Data Environments Workshop Program 1st German-U.S. Workshop on Predictive Analytics, Cyber-Physical Systems, and Industrie 4.0 in Big Data Environments Technische Universität München, Garching near Munich, 17 18 November

More information

Dr. Anna Maria Schneider

Dr. Anna Maria Schneider Dr. Anna Maria Schneider Postdoctoral Researcher Faculty of Economics and Business Administration Humboldt Universität zu Berlin Rosenstraße 19 10178 Berlin, Germany anna maria.schneider[at]wiwi.hu berlin.de

More information

UR:BAN Networked Transportation System. Good Practice Case of Industry-led R&D Project with Good Prospects of Post-project Exploitation

UR:BAN Networked Transportation System. Good Practice Case of Industry-led R&D Project with Good Prospects of Post-project Exploitation UR:BAN Networked Transportation System Good Practice Case of Industry-led R&D Project with Good Prospects of Post-project Exploitation Programme Mobility and Transportation Technologies "Mobility and Transport

More information

TeleTrusT Bundesverband IT-Sicherheit e.v.

TeleTrusT Bundesverband IT-Sicherheit e.v. TeleTrusT Bundesverband IT-Sicherheit e.v. TeleTrusT-Workshop "Industrial Security" 2015 München, 11.06.2015 Einführung Industrial Security anhand des IEC 62443; Bedrohungslage für Betreiber von ICS (Industrial

More information

ETSI TS 102 042: Electronic Signatures and Infrastructures (ESI): Policy

ETSI TS 102 042: Electronic Signatures and Infrastructures (ESI): Policy Abbreviations AIS BGBl BNetzA BSI CC CEM CSP DAR DATech DIN EAL ETR ETSI ISO IT ITSEC ITSEF ITSEM JIL PP SF SigG SigV SOF Anwendungshinweise und Interpretationen zum Schema [Guidance and Interpretations

More information

Automated assessment of C++ exercises with unit tests

Automated assessment of C++ exercises with unit tests Automated assessment of C++ exercises with unit tests Workshop Automatische Bewertung von Programmieraufgaben Tom-Michael Hesse, Axel Wagner, Barbara Paech Institute of Computer Science Chair of Software

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

Safety Management in Nuclear Technology

Safety Management in Nuclear Technology Safety Management in Nuclear Technology Symposium October 16 17, 2014, Munich, Germany TÜV SÜD Akademie GmbH TÜV SÜD Industrie Service GmbH The Symposium is intended for specialists and managers at Nuclear

More information

Creating an Open Innovation Ecosystem at Deutsche Telekom

Creating an Open Innovation Ecosystem at Deutsche Telekom Creating an Open Innovation Ecosystem at Deutsche Telekom Presentation at the EIRMA & OECD: Symposium on Global Innovation Networks. René Rohrbeck, EICT GmbH, Germany The open innovation ecosystem of Deutsche

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

Security und Compliance in Clouds

Security und Compliance in Clouds Security und Compliance in Clouds Prof. Dr. Jan Jürjens, Kristian Beckers Fraunhofer Institut für Software- und Systemtechnologie ISST, Dortmund http://jan.jurjens.de The NIST Cloud Definition Framework

More information

Nokia Networks. security you can rely on

Nokia Networks. security you can rely on Nokia Networks security you can rely on Protecting communication networks is critical 7 billion mobile subscriptions in 2014 1 Mobile broadband network traffic expected to grow by a factor of 1,000 by

More information

Strategic Planning at the Deutsche Bundesbank

Strategic Planning at the Deutsche Bundesbank Strategic Planning at the Deutsche Bundesbank Key aspects in Central Bank Governance 1. set of central bank tasks key aspects 5. stakeholders 2. rules for decision making bodies 4. transparency, credibility,

More information

NIST Cybersecurity Framework Overview

NIST Cybersecurity Framework Overview NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order

More information

Deutsche Gesellschaft für Essstörungen German Association of Eating Disorders

Deutsche Gesellschaft für Essstörungen German Association of Eating Disorders Deutsche Gesellschaft für Essstörungen German Association of Eating Disorders President Prof. Dr. Martina de Zwaan University Erlangen Nürnberg Vice President Prof. Dr. Stephan Herpertz Ruhr Universität

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

The Society of German Chemists (Gesellschaft Deutscher Chemiker, short: GDCh)

The Society of German Chemists (Gesellschaft Deutscher Chemiker, short: GDCh) History The history of Germany s Chemistry Information Centre (Fachinformationszentrum Chemie GmbH, short: FIZ CHEMIE Berlin), can be traced back long before its foundation in 1981 and is closely linked

More information

to confirm that its document management- and archiving solution fulfils all applicable audit criteria for document management solutions

to confirm that its document management- and archiving solution fulfils all applicable audit criteria for document management solutions The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company LOGEX SYSTEM GmbH & Co. KG Joseph-Baader Straße 8 85053 Ingolstadt, Germany to confirm that its document

More information

Athens Institute for Education and Research (ATINER) 8 th Annual International Conference on Languages & Linguistics Athens, 6 July 2015

Athens Institute for Education and Research (ATINER) 8 th Annual International Conference on Languages & Linguistics Athens, 6 July 2015 Standardized Individual Output Development: Linguistic Approaches for Requirements Engineering Problems through Cultural Differences. Case Studies from Requirements Engineering Education in the Context

More information

EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations

EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations DSS EIT ICT Labs Master Programme Distributed System and Services (Cloud Computing) The programme in Distributed Systems and Services focuses on

More information

trends in mobile malware and importance of network based user protection

trends in mobile malware and importance of network based user protection trends in mobile malware and importance of network based user protection Sicherheitsnetzwerk München: Praxisforum Anwender und Anbieter im Dialog Mobile Sicherheit im Unternehmen Joachim Lüken, Nokia Networks,

More information

Ontology based Recruitment Process

Ontology based Recruitment Process Ontology based Recruitment Process Malgorzata Mochol Radoslaw Oldakowski Institut für Informatik AG Netzbasierte Informationssysteme Freie Universität Berlin Takustr. 9, 14195 Berlin, Germany mochol@inf.fu-berlin.de

More information

ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS

ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS Cyber Physical Systems Sicherheit für eine Welt im Wandel Harald Pötter RF & Smart Sensor Systems Cyber Physical Systems Sicherheit für eine Welt im Wandel Agenda

More information

Oracle Whitepaper April 2015. Security and the Oracle Database Cloud Service

Oracle Whitepaper April 2015. Security and the Oracle Database Cloud Service Oracle Whitepaper April 2015 Security and the Oracle Database Cloud Service Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database Cloud

More information

Femtocell: Femtostep to the Holy Grail

Femtocell: Femtostep to the Holy Grail . Femtocell: Femtostep to the Holy Grail... Ravishankar Borgaonkar, Kévin Redon.. Technische Universität Berlin, SecT ravii/kredon@sec.t-labs.tu-berlin.de TROOPERS 2011, 30 March 2011 3G/UMTS femtocells

More information

Challenges to an Integrated Cost Management during Early Phases of Product Development

Challenges to an Integrated Cost Management during Early Phases of Product Development Challenges to an Integrated Cost Management during Early Phases of Product Development Dr.-Ing. Markus Mörtl Lehrstuhl für Produktentwicklung / Institute of Product Development Technische Universität München

More information

Universität Karlsruhe (TH)

Universität Karlsruhe (TH) Universität Karlsruhe (TH) Forschungsuniversität gegründet 1825 Working group meeting Software engineering for parallel systems Leipzig, Germany May 11, 2008 Dr. Victor Pankratius http://www.multicore-systems.org/separs

More information

Medical Cyber-Physical Systems On the Research Challenges for the Safe Interconnection of Medical Devices

Medical Cyber-Physical Systems On the Research Challenges for the Safe Interconnection of Medical Devices Medical Cyber-Physical Systems On the Research Challenges for the Safe Interconnection of Medical Devices Franziska Kühn 1,2 Martin Leucker 1 Daniel Thoma 1 {kuehn, leucker, thoma}@isp.uni-luebeck.de 1

More information

Spoof Detection and the Common Criteria

Spoof Detection and the Common Criteria Spoof Detection and the Common Criteria Ralph Breithaupt (BSI) Nils Tekampe (TÜViT) Content Today s situation The BSI projects LifeFinger I & II Spoofing The definition Spoof Detection in Common Criteria

More information

Integration of Sustainable Approaches in the Building Design Process

Integration of Sustainable Approaches in the Building Design Process Integration of Sustainable Approaches in the Building Design Process U. Forgber, N. Kohler, V. Koch, University of Karlsruhe Englerstrasse 7 76128 Karlsruhe, Germany F. Schmidt, R. Haller, University of

More information

Network Virtualization and Energy Efficiency

Network Virtualization and Energy Efficiency Network Virtualization and Energy Efficiency University of Passau Gergö Lovász, Andreas Fischer, and Hermann de Meer Outline 1. Power Consumption of ICT 2. Economic Principle and Energy Efficiency Benchmarks

More information

D1.3 Industry Advisory Board

D1.3 Industry Advisory Board Project acronym: Project full name: EDSA European Data Science Academy Grant agreement no: 643937 D1.3 Industry Advisory Board Deliverable Editor: Other contributors: Deliverable Reviewers: Mandy Costello

More information

CeBIT 2016. NEW: Marketing & Sales Solutions. 14 18 March 2016 cebit.com

CeBIT 2016. NEW: Marketing & Sales Solutions. 14 18 March 2016 cebit.com CeBIT 2016 NEW: Marketing & Sales Solutions 14 18 March 2016 cebit.com 2 CeBIT Global Event for Digital Business Digitization offers companies numerous new options for interacting with the customer. Big

More information

Smart Factory Innovation Forum

Smart Factory Innovation Forum Smart Factory Innovation Forum White Paper Managing security, safety and privacy in Smart Factories Based on a Panel Discussion during the Smart Factory Innovation Forum 2014 Held on September 25th, 2014

More information

ROS-INDUSTRIAL. Technologies, Trends, Applications

ROS-INDUSTRIAL. Technologies, Trends, Applications FRAUNHOFER INSTITUTe FoR Manufacturing engineering and Automation IPA Conference June 9, 2015 ROS-INDUSTRIAL Technologies, Trends, Applications Preface The Event at a Glance Established already in robotics

More information

Beraterprofil. Prof. Dr. Frank H. Witt. Managementberater

Beraterprofil. Prof. Dr. Frank H. Witt. Managementberater Beraterprofil Prof. Dr. Frank H. Witt Managementberater Geschäftsgebiet International Project Management Business Development and Growth Strategy and Change Bilstein & Kollegen Partnerbüro Hong Kong c/o

More information

1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2

1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2 Business Process Modeling with EPC and UML Transformation or Integration? Dr. Markus Nüttgens, Dipl.-Inform. Thomas Feld, Dipl.-Kfm. Volker Zimmermann Institut für Wirtschaftsinformatik (IWi), Universität

More information

SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH

SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH SECURITY REDEFINED Managing risk and securing the business in the age of the third platform Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH 1 BILLIONS OF USERS MILLIONS OF APPS 2010 HUNDREDS OF

More information

Smart Energy made in Germany

Smart Energy made in Germany Smart Energy made in Germany How ICT makes the change happen Ludwig Karg, B.A.U.M., Head of E-Energy Ancillary Research www.bmwi.de Decisions made! 2 Key Challenges in Energy geothermal triangle of hope

More information

A guide for enterprise-specific design of EA models

A guide for enterprise-specific design of EA models A guide for enterprise-specific design of EA models Master s Thesis Markus Bauer Kickoff Presentation sebis Advanced Seminar 2013-07-08 Set-Up Organizational issues Title Supervisor Advisors A guide for

More information

Future cybersecurity threats and research needs.

Future cybersecurity threats and research needs. www.thalesgroup.com Future cybersecurity threats and research needs. 3 rd Franco-American Workshop on Cybersecurity Lyon Kreshnik Musaraj kreshnik.musaraj@thalesgroup.com December 9. 2014 2 / Challenges

More information

Towards Open Urban Platforms for Smart Cities and Communities. Memorandum of Understanding

Towards Open Urban Platforms for Smart Cities and Communities. Memorandum of Understanding Towards Open Urban Platforms for Smart Cities and Communities Memorandum of Understanding 1. Outline of this Memorandum 1.1. The market for current Urban Platform(s) is fragmented and uncertain on the

More information

Deutsche Nachwuchswissenschaftler in den USA

Deutsche Nachwuchswissenschaftler in den USA Deutsche Nachwuchswissenschaftler in den USA Perspektiven der Hochschul- und Wissenschaftspolitik German Scientists in the United States: Results of the C R I S Online Survey Christoph F. Buechtemann und

More information

Windows HPC Server 2008 Deployment

Windows HPC Server 2008 Deployment Windows HPC Server 2008 Michael Wirtz wirtz@rz.rwth-aachen.de Rechen- und Kommunikationszentrum RWTH Aachen Windows-HPC 2008 19. Sept 08, RWTH Aachen Windows HPC Server 2008 - Agenda o eines 2 Knoten Clusters

More information

AUTOMATION - AUTOMOTIVE - RENEWABLE ENERGIES

AUTOMATION - AUTOMOTIVE - RENEWABLE ENERGIES AUTOMATION - AUTOMOTIVE - RENEWABLE ENERGIES DUAL.solutions Action-based and media-supported Professional Training in different technical sectors Wolfgang Lay, General Manager, Dr.-Ing. Paul Christiani

More information

Business Continuity Policy

Business Continuity Policy Business Continuity Policy Software, consultancy and services for global trade and supply chain management Business Continuity Policy Companies using AEB solutions for managing and monitoring their logistics

More information

Advantages of VoIP in the german research network

Advantages of VoIP in the german research network Advantages of VoIP in the german research network Falko Dressler Regional Computing Center (RRZE) / Department of Computer Science IV (Operating Systems) University of Erlangen-Nuremberg Martensstrasse

More information

Workshop Security of Mass Transportation

Workshop Security of Mass Transportation Workshop Security of Mass Transportation Deutsche Bahn AG Jens Puls 1 Chief Security Officer; President COLPOFER Berlin, 18 March 2009 Why can t the public transport system provide the same level of security

More information

Software Construction

Software Construction Software Construction Staff Faculty: Univ.-Prof. Dr. rer. nat. Horst Lichter lichter@informatik.rwth-aachen.de Secretary: Bärbel Kronewetter Phone: +49 241 80 21 330 Fax: +49 241 80 22 352 Research Assistants:

More information

Internationalisation and Health Care Export S. von Bandemer University of Applied Sciences, Gelsenkirchen Institute Work and Technology, Science Park

Internationalisation and Health Care Export S. von Bandemer University of Applied Sciences, Gelsenkirchen Institute Work and Technology, Science Park Internationalisation and Health Care Export S. von Bandemer University of Applied Sciences, Gelsenkirchen Institute Work and Technology, Science Park Content Why Internationalisation? Why Health Care Export?

More information

What is Industrie 4.0

What is Industrie 4.0 What is Industrie 4.0 Prof. Dr.-Ing. Reiner Anderl Computer Integrated Design (Datenverarbeitung in der Konstruktion, DiK) Fachbereich Maschinenbau Technische Universität Darmstadt Otto-Berndt-Straße 2

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

Privacy and Security Assessment. Technical Security and Data Privacy in a Single Process.

Privacy and Security Assessment. Technical Security and Data Privacy in a Single Process. Privacy and Security Assessment. Technical Security and Data Privacy in a Single Process. Deutsche Telekom AG Friedrich-Ebert-Allee 140 D-53113 Bonn www.telekom.com Contents. 2 Technical Security and Data

More information

e-journal of Practical Business Research

e-journal of Practical Business Research e-journal of Practical Business Research Six Views on the Business Rule Management System Workshop summary paper: Business Rule based Service Management (Business-Rule-basierte Servicesteuerung) at Informatik

More information

GERMAN UNIVERSITIES LIAISON OFFICES NEW YORK

GERMAN UNIVERSITIES LIAISON OFFICES NEW YORK GERMAN UNIVERSITIES LIAISON OFFICES NEW YORK German University Alliance (FU Berlin / LMU München) ConRuhr (Dortmund/ Duisburg-Essen / Bochum) Universität Heidelberg RWTH Aachen UAS 7 Hessen Universities

More information

Banker Malware Protection Test Report

Banker Malware Protection Test Report Banker Malware Protection Test Report A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: April 10 th,, last update: April 10 th, Executive Summary In March, AV-Test

More information

Education standards in Intellectual Property Rights in German Speaking Countries

Education standards in Intellectual Property Rights in German Speaking Countries Sources of Competitive Advantages in the 21 st Century Conference of the World Economy Research Institute Warsaw School of Economics 4./5.6.2009 Education standards in Intellectual Property Rights in German

More information

COSMOS events, activities and trainings in Austria, BM:UKK

COSMOS events, activities and trainings in Austria, BM:UKK This is a summary of events, activities and trainings in Austria. By: Jutta Jerlich, Elisabeth Zistler, Christian Reimers, Thomas Lebzelter The following summary is listed according to the date of the

More information

Applied and Integrated Security. C. Eckert

Applied and Integrated Security. C. Eckert Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass

More information

Information event «ehealth Suisse» and IHE Suisse

Information event «ehealth Suisse» and IHE Suisse Information event «ehealth Suisse» and IHE Suisse Agenda 1. Benefit for the practitioner Franz Marty, Medizinisches Zentrum gleis d AG, Chur, Switzerland 2. Evolution and Functions Tony Schaller, medshare

More information

Computing Power at your Service: IaaS from the Private Cloud Dynamic Services for Infrastructure

Computing Power at your Service: IaaS from the Private Cloud Dynamic Services for Infrastructure Computing Power at your Service: IaaS from the Private Cloud Dynamic Services for Infrastructure November 2011 18.11.2010 1 CIO s challenges 2010. Challenges of many CIOs in 2010: IT budgets approx. 20%

More information

Smart Energy. CO 2 emission reduction through Telekom s M2M technology. Enno Borchers (M2M Competence Center, M2M Sales Development) April 2011

Smart Energy. CO 2 emission reduction through Telekom s M2M technology. Enno Borchers (M2M Competence Center, M2M Sales Development) April 2011 Smart Energy. CO 2 emission reduction through Telekom s M2M technology. Enno Borchers (M2M Competence Center, M2M Sales Development) April 2011 Deutsche Telekom AG. Group profile and figures. Company Products

More information

Intellectual Capital Management and Open Innovation

Intellectual Capital Management and Open Innovation XXII Brazilian National Science Parks and Business Incubators Seminar XX ANPROTEC Workshop Intellectual Capital Management and Open Innovation Foz do Iguaçu, 19 th September 2012 Dr.-Ing. Markus Will Head

More information