Cybersecurity Best Practices: Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Buch |
Sprache: | English German |
Veröffentlicht: |
Wiesbaden
Springer Vieweg
[2018]
Wiesbaden Springer Fachmedien Wiesbaden GmbH [2018] |
Schlagworte: | |
Online-Zugang: | Inhaltstext http://www.springer.com/ Inhaltsverzeichnis |
Beschreibung: | LXVII, 644 Seiten Illustrationen, Diagramme 24 cm x 16.8 cm, 13108 g |
ISBN: | 9783658216542 3658216549 |
Internformat
MARC
LEADER | 00000nam a22000008c 4500 | ||
---|---|---|---|
001 | BV045120846 | ||
003 | DE-604 | ||
005 | 20181107 | ||
007 | t | ||
008 | 180807s2018 gw a||| |||| 00||| eng d | ||
015 | |a 18,N19 |2 dnb | ||
016 | 7 | |a 1157110428 |2 DE-101 | |
020 | |a 9783658216542 |c Festeinband : EUR 49.99 (DE), EUR 51.39 (AT), CHF 51.50 (freier Preis) |9 978-3-658-21654-2 | ||
020 | |a 3658216549 |9 3-658-21654-9 | ||
024 | 3 | |a 9783658216542 | |
028 | 5 | 2 | |a Bestellnummer: 978-3-658-21654-2 |
028 | 5 | 2 | |a Bestellnummer: 86923418 |
035 | |a (OCoLC)1035269764 | ||
035 | |a (DE-599)DNB1157110428 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng |a ger | |
044 | |a gw |c XA-DE-HE | ||
049 | |a DE-860 |a DE-Aug4 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 23 | |
082 | 0 | |a 005.8 |2 23/ger | |
082 | 0 | |a 658.478 |2 23/ger | |
084 | |a QP 345 |0 (DE-625)141866: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 650 |2 sdnb | ||
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Cybersecurity Best Practices |b Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden |
264 | 1 | |a Wiesbaden |b Springer Vieweg |c [2018] | |
264 | 1 | |a Wiesbaden |b Springer Fachmedien Wiesbaden GmbH |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a LXVII, 644 Seiten |b Illustrationen, Diagramme |c 24 cm x 16.8 cm, 13108 g | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
546 | |a Text teilweise deutsch, teilweise englisch | ||
650 | 4 | |a Computer science |x Leadership |x Management | |
650 | 4 | |a Information systems |x Computer security | |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Betriebliches Informationssystem |0 (DE-588)4069386-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Behörde |0 (DE-588)4005298-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberattacke |0 (DE-588)1075612675 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | |a UR | ||
653 | |a UR | ||
653 | |a KJC | ||
653 | |a KJQ | ||
653 | |a UR | ||
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 1 | |a Betriebliches Informationssystem |0 (DE-588)4069386-7 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 4 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 1 | 1 | |a Behörde |0 (DE-588)4005298-9 |D s |
689 | 1 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 4 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 1 | 5 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Bartsch, Michael |0 (DE-588)1136095209 |4 edt | |
700 | 1 | |a Frey, Stefanie |0 (DE-588)1136095349 |4 edt | |
710 | 2 | |a Springer Fachmedien Wiesbaden |0 (DE-588)1043386068 |4 pbl | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, PDF/ePub |z 978-3-658-21655-9 |w (DE-604)BV045111723 |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=0378dc02459c4d17bc239bbfb50980e1&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m X:MVB |u http://www.springer.com/ |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030510985&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-030510985 |
Datensatz im Suchindex
_version_ | 1804178771072253952 |
---|---|
adam_text | INHALTSVERZEICHNIS
1 HOW TO ELIMINATE THE PREVAILING IGNORANCE AND COMPLACENCY AROUND
CYBERSECURITY....................................................................................................
1
STEFANIE FREY
1.1 THE CHALLENGES OF THE TWENTY FIRST CENTURY
.............................................
2
1.2 CURRENT
SITUATION........................................................................................
3
1.2.1 WE HAVE NOT HAD A CYBER 9/11
.......................................................
5
1.2.2
COMPLEXITY......................................................................................
7
1.3
CONCLUSION..................................................................................................
8
REFERENCES............................................................................................................
9
TEIL I BEISPIELE AUS DER PRAXIS
2 ANGRIFF AUS DER DUNKELHEIT: CYBERATTACKE AUF DAS
LUKASKRANKENHAUS N EU
SS................................................................................
13
ULLA DAHMEN UND NICOLAS KRAEMER
LITERATUR................................................................................................................
20
3 AUDREY AND RETO GFELLER PEOPLE LIKE YOU AND M E
........................................
23
AUDREY AND RETO GFELLER
3.1 THE
STORYLINE..............................................................................................
23
3.2 EMAILS RECEIVED AFTER THE ALLEGED PURCHASE
..............................................
25
3.3 CONTINUATION OF EVENTS AFTER RETURNING FROM VACATION
............................
26
3.4 THE E N D
......................................................................................................
28
3.5 LIST OF ALL BOUGHT ITEM
S............................................................................
28
TEIL II STAATEN UND BEHOERDEN
STATES AND AUTHORITIES
4
VORWORTE..............................................................................................................
37
ARNE SCHOENBOHM UND UDO HELMBRECHT
4.1 INTEGRIERTE WERTSCHOEPFUNGSKETTE DER CYBER-SICHERHEIT
..............................
38
4.2 CYBER SECURITY IS A SHARED RESPONSIBILITY
..................................................
39
REFERENCES............................................................................................................
41
5 ENISA*S CONTRIBUTION TO NATIONAL CYBER SECURITY STRATEGIES
.......................
43
DIMITRA LIVERI, ANNA SARRI AND ELENI DARRA
5.1
INTRODUCTION................................................................................................
44
5.2 A RESILIENT NATIONAL STRATEGY
....................................................................
45
5.2.1 MEMBER STATE*S OBJECTIVES
............................................................
47
5.2.2 OBJECTIVE 3: ORGANIZE CYBERSECURITY EXERCISES
..............................
47
5.2.3 OBJECTIVE 4: ESTABLISH BASELINE SECURITY MEASURES
........................
48
5.2.4 OBJECTIVE 5: ESTABLISH INCIDENT REPORTING MECHANISMS
................
48
5.2.5 OBJECTIVE 6: RAISE USER AWARENESS
................................................
49
5.2.6 OBJECTIVE 7: STRENGTHEN TRAINING AND EDUCATIONAL PROGRAMS
........
49
5.2.7 OBJECTIVE 8: ESTABLISHMENT OF INCIDENT RESPONSE CAPABILITY
........
50
5.2.8 OBJECTIVE 9: ADDRESS CYBER C RIM E
................................................
51
5.2.9 OBJECTIVE 10: ENGAGE IN INTERNATIONAL COOPERATION
........................
51
5.2.10 OBJECTIVE 11: ESTABLISH A PUBLIC-PRIVATE PARTNERSHIP
......................
52
5.2.11 OBJECTIVE 13: INSTITUTIONALIZE COOPERATION BETWEEN
PUBLIC A
GENCIES............................................................................
53
5.3 GOVERNANCE STRUCTURES IN THE EU
................................................................
54
5.3.1 CENTRALIZED APPROACH
......................................................................
55
5.3.2 DECENTRALIZED APPROACH
..................................................................
56
5.3.3 CO-REGULATION WITH THE PRIVATE SECTOR
............................................
57
5.4
CHALLENGES..................................................................................................
59
5.5 ENISA*S CONTRIBUTION TO NCSS
..................................................................
60
5.6 THE NEXT STEPS FOR N C S S
..........................................................................
60
5.7
CONCLUSIONS................................................................................................
63
REFERENCES............................................................................................................
63
6 DIE ALLIANZ FUER CYBER-SICHERHEIT: NETZWERKE SCHUETZEN
NETZWERKE................. 65
STEFAN WUNDERLICH
6.1 WARUM EINE ALLIANZ FUER CYBER-SICHERHEIT?
................................................
65
6.2 DIE ALLIANZ FUER CYBER-SICHERHEIT
................................................................
66
6.3 STRUKTUR DER ALLIANZ FUER
CYBER-SICHERHEIT.............................................. 67
6.3.1 DIE TEILNEHMER
................................................................................
67
6.3.2 PARTNER
............................................................................................
67
6.3.3 MULTIPLIKATOREN
..............................................................................
68
6.4 DIE ANGEBOTE DER ALLIANZ FUER CYBER-SICHERHEIT
..........................................
69
6.4.1 INFORMATIONSPOOL
............................................................................
70
6.4.2 ERFAHRUNGSAUSTAUSCH
......................................................................
71
6.4.3
PRAXIS..............................................................................................
72
6.5 FAZIT UND
AUSBLICK......................................................................................
72
LITERATUR.................................................................................................................
72
7 POLIZEI - KLOTZ AM BEIN ODER PARTNER IN DER K RISE?
......................................
73
DIRK KUNZE
LITERATUR................................................................................................................
80
8 COMPREHENSIVE CYBER SECURITY APPROACH: THE FINNISH MODEL
....................
83
AAPO CEDERBERG
8.1
INTRODUCTION..............................................................................................
84
8.2 THE CYBERWORLD FROM THE FINNISH PERSPECTIVE
........................................
85
8.2.1 CYBER AS A GAME CHANGER
............................................................
86
8.2.2 NATIONAL AND INTERNATIONAL POLITICS
................................................
87
8.3 THE STRUCTURE OF THE STRATEGY AND MAIN PRINCIPLES
..................................
88
8.3.1 CYBER SECURITY STRATEGY: GUIDING
VISION....................................... 89
8.4 BASIC PRINCIPLES OF CYBER SECURITY MANAGEMENT
....................................
90
8.5 SITUATIONAL
AWARENESS..............................................................................
91
8.6 LEGAL
BASIS................................................................................................
93
8.7 EDUCATION AND AWARENESS OF ALL SOCIETAL ACTORS
......................................
94
8.8 FIGHTING AGAINST
CYBERCRIME....................................................................
95
8.9 CYBER DEFENCE
........................................................................................
96
8.10 PRIVATE-PUBLIC PARTNERSHIP (PPP)
..............................................................
97
8.11 CRITICAL INFRASTRUCTURE PROTECTION (CIP)
....................................................
98
8.12 INTERNATIONAL
COOPERATION........................................................................
99
8.13 THE CYBER SECURITY STRATEGY
PROCESS...........................................................100
8.14
CONCLUSIONS..............................................................................................
102
9 THE *PETNICA GROUP*: A CASE OF PUBLIC-PRIVATE PARTNERSHIP
FOR CYBER SECURITY IN THE REPUBLIC OF SERBIA
..................................................
107
IRINA RIZMAL
9.1
INTRODUCTION.................................................................................................107
9.2 HISTORY: THE *PETNICA GROUP*
.....................................................................108
9.3 LEGISLATIVE FRAMEWORK AND P P P
.................................................................110
9.4 CONTINUED EFFORTS: SERBIA*S *CYBER SECURITY NEXUS*
.................................I L L
9.5 LESSONS
LEARNT.............................................................................................114
REFERENCES............................................................................................................
115
10 NATIONALE CYBER-STRATEGIE: EINBEZUG DER LOKALEN EBENE
IN EINEM FOEDERALEN
STAAT....................................................................................
117
ANDRE DUVILLARD UND MELANIE FRIEDLI
10.1 NATIONALE CYBER-STRATEGIE: 2012-2017
....................................................
117
10.2 DER SICHERHEITSVERBUND SCHWEIZ (SY
S).....................................................118
10.3 UMSETZUNG DER NATIONALEN CYBER-STRATEGIE MIT DEN
KANTONEN
2012-2017................................................................................
118
10.4 NATIONALES KRISENMANAGEMENT BEI KRISEN MIT
CYBERAUSPRAEGUNG...............119
10.5 UEBUNG
POPULA.........................................................................................122
10.6 LESSONS LEARNED
........................................................................................
123
10.7 NATIONALE CYBER-STRATEGIE II: 2018-2022
................................................
123
11 .. JIMITEM ESSE DELENDAM - GRENZEN SIND ZU
UEBERWINDEN.................................125
MARK A. SAXER
11.1 *CUI BONO*? (WEM NUETZT D A S?
)...................................................................126
11.2 LABOR OMNIA VINCIT... - STATUTEN, PROZESSE,
VERTRAG...................................127
11.3 *RHEINGOLD*: TIT FOR TAT ODER *QUID PRO QUO*
...........................................130
11.4 UEBUNG *LOGE* [3] (DHS2015 *IRAT*)
.........................................................132
11.5 *CLAIMANT NOTIFICATION B* (ODER: DIE PROBLEMBESCHREIBUNG)
...................
134
11.6 *CYBER EUROPE 2016* (MELANI UND SCE BEUEBT)
....................................
135
11.7 *.. .LIMITEM ESSE DELENDAM* - GRENZEN SIND ZU UEBERWINDEN
.......................
136
LITERATUR...................................................................................................................
138
12 E-VOTING IN DER SCHWEIZ - HERAUSFORDERUNGEN UND SCHUTZPRINZIPEN
..........
139
CHRISTIAN FOLINI UND DENIS MOREL
12.1
EINFUEHRUNG...................................................................................................
140
12.2 ELEKTRONISCHE STIMMABGABE IN DER
SCHWEIZ...............................................140
12.2.1 ALLGEMEINE BESONDERHEITEN DES POLITISCHEN SYSTEMS
...................
140
12.2.2 E-VOTING IN DER
SCHWEIZ.................................................................141
12.3 PRINZIPIELLE HERAUSFORDERUNGEN BEIM
E-VOTING...........................................142
12.4
BEDROHUNGEN...............................................................................................143
12.5 RECHTLICHE UND REGULATORISCHE GRUNDLAGEN UND
RICHTLINIEN.......................144
12.5.1 REGULATION IN DER
SCHWEIZ.............................................................144
12.5.2 INDIVIDUELLE
VERIFIZIERBARKEIT.........................................................145
12.5.3 UNIVERSELLE
VERIFIZIERBARKEIT...........................................................146
12.5.4 BSI COMMON C
RITERIA...................................................................146
12.5.5
ZERTIFIZIERUNGEN.............................................................................146
12.6
SCHUTZPRINZIPIEN.........................................................................................147
12.7
ZUSAMMENFASSUNG.......................................................................................149
LITERATUR...................................................................................................................
149
TEIL III CYBER DEFENCE
13 NATO: EIN TRANSATLANTISCHER BLICK AUF DIE C
YBERSICHERHEIT...........................153
DIETER WARNECKE UND SORIN DUCARU
13.1 CYBER-SICHERHEIT GEHT UNS ALLE A N
...............................................................154
13.2 CYBER DEFENSE BEST PRACTICE: THE NATO
EXPERIENCE.................................156
13.2.1 MEETING CHALLENGES IN CYBERSPACE: NATO*S
CYBER DEFENSE
EVOLUTION.................................................................156
13.2.2 BEST PRACTICES AND LESSONS LEARNED
...............................................
158
13.2.3 NATO AS A PLATFORM FOR DEVELOPING AND PROMOTING
AND BEST
PRACTICE.............................................................................162
13.2.4 THE WAY A
HEAD...............................................................................167
REFERENCES............................................................................................................
167
14 CYBER DEFENCE
- EINE ZWINGENDE
NOTWENDIGKEIT!.............................................169
WALTER J. UNGER
14.1 VERTEIDIGUNG - EIN MILITAERISCHER BEGRIFF
..................................................
169
14.2 SICHERHEITSPOLITISCHES UMFELD UND
TECHNOLOGIEWANDEL.............................171
14.3 TECHNOLOGIEWANDEL: DIGITALISIERUNG, AUTOMATISIERUNG
UND
VERNETZUNG..........................................................................................
171
14.4 STRATEGISCHE BEDEUTUNG DER
SICHERHEIT.......................................................173
14.5 DIE AKTUELLE BEDROHUNG - ERKENNBARE TRENDS [ 5 ]
.......................................174
14.6 FOLGERUNGEN AUS DEM BEDROHUNGSBILD [16] UND HERAUSFORDERUNGEN ....
177
14.7 DIE OESTERREICHISCHE STRATEGIE FUER CYBER-SICHERHEIT (OESCS)
[24]...............181
14.8 CYBER-SICHERHEIT - SICHER LEBEN IM
CYBER-RAUM.......................................184
14.9 GRUNDSAETZE DER SICHERHEIT UND VERTEIDIGUNG IM
CYBER-RAUM.....................185
14.10
CYBER-VERTEIDIGUNG..................................................................................
187
14.11
AUSBLICK....................................................................................................
189
LITERATUR................................................................................................................
190
15 ERFAHRUNGSELEMENTE ERFOLGREICHER STRATEGIE-ENTWICKLUNG UND -UMSETZUNG
IM UMGANG MIT EXISTENZIELLEN RISIKEN IM CYBER-RAUM
................................
193
GERALD VEMEZ UND ADOLF J. DOERIG
15.1 KOMPLEXITAET BEHERRSCHEN - GLEICHES VERSTEHEN, ANALYSIEREN UND
BEHANDELN..................................................................................................
194
15.2 FINDEN UND VERKNUEPFEN - SYSTEME, PROZESSE UND TECHNOLOGIEN
VERSTEHEN, ENTWICKELN UND
FUEHREN...............................................................196
15.3 STRATEGIESCHOEPFUNGSPROZESS - ALTE PLANUNGSVORGEHENSWEISE AN NEUE
DYNAMISCHE REALITAETEN
ANPASSEN.................................................................198
15.4 ARCHITEKTUR - DIE META-EBENE DER ORGANISATION UND PROZESSE
..................
200
LITERATUR..................................................................................................................
202
TEIL IV IT-INDUSTRIE (ANWENDER, DIENSTLEISTER UND HERSTELLER)
IT INDUSTRY (USERS, SERVICE PROVIDERS AND PRODUCERS)
16
VORWORTE................................................................................................................
205
HEINZ KARRER UND HOLGER MUEHLBAUER
16.1 MIT SICHERHEIT ZUM WIRTSCHAFTLICHEN ERFOLG IM CYBER-RAUM
....................
206
16.2 IT SECURITY MADE IN GERMANY
....................................................................
208
17 WAS UNTERNEHMEN VON STAATEN LERNEN KOENNEN:
CYBERSTRATEGIEENTWICKLUNG.................................................................................211
STEFANIE FREY
17.1 CYBERBEDROHUNGSLAGE
................................................................................
212
17.2 BEDROHUNGEN DER ZUKUNFT
..........................................................................
213
17.2.1 EINIGE BEISPIELE
............................................................................
213
17.3 STAATEN: CYBERSTRATEGIEENTWICKLUNG
............................................................
216
17.3.1 INTERNATIONALE GREMIEN UND KOOPERATIONEN
..................................
217
17.4 GRUNDSAETZE DER STRATEGIEENTWICKLUNG
........................................................
218
17.4.1 CYBERSTRATEGIEENTWICKLUNG FUER UNTERNEHMEN
..............................
219
17.4.2 MASSNAHMENENTWICKLUNG
..............................................................
222
17.5 SZENARIOBASIERTE UEBUNGEN ALS ERSTER SCHRITT DER
CYBERSTRATEGIEENTWICKLUNG
........................................................................
223
17.5.1 ZIEL UND ABLAUF DES WAR G AM E
....................................................
225
17.5.2 RESULTATE DES WAR GAME
................................................................
226
17.6 ZUSAMMENFASSUNG
......................................................................................
226
LITERATUR...................................................................................................................227
18 CYBERANGRIFFE: TEIL DES ALLTAGS?
........................................................................
229
TERESA RITTER UND MARC BACHMANN
18.1
METHODE.......................................................................................................230
18.2 ERGEBNISSE DER WIRTSCHAFTSSCHUTZSTUDIE 2017
..........................................
231
18.2.1 MITTELSTAENDISCHE UNTERNEHMEN - EIN BESONDERS
BELIEBTES ANGRIFFSZIEL
....................................................................
231
18.2.2 UEBER UMWEGE ZUM ZIEL
................................................................
232
18.2.3 RUND 55 MILLIARDEN EURO SCHADEN PRO JAHR
..................................
233
18.2.4 TAETERKREIS: MITARBEITER
..................................................................
234
18.2.5 IT-SICHERHEITSSYSTEME SPIELEN BEI DER AUFDECKUNG
KAUM EINE ROLLE
............................................................................
235
18.2.6 JEDER DRITTE BETROFFENE SCHALTET STAATLICHE STELLEN E I N
..................
235
18.2.7 ANGST VOR IMAGESCHAEDEN
..............................................................
236
18.2.8 WIE SCHUTZ HEUTE AUSSIEHT
............................................................
236
18.3 AUSBLICK IN DIE ZUKUNFT
..............................................................................
237
LITERATUR...................................................................................................................238
19 PRIVATE AND PUBLIC PARTNERSHIP: AN UNAVOIDABLE ISSU E
..................................
239
CHRISTIAN AGHROUM
19.1
INTRODUCTION................................................................................................
239
19.2 PUTTING IT INTO PERSPECTIVE
..........................................................................
240
19.2.1 DEFINING PPPS
................................................................................
240
19.2.2 AN EVOLUTION OF REALITIES
..............................................................
240
19.2.3 THE DECLINE OF THE STATE AND THE ADVENT OF CAPITALISM
.................
241
19.2.4 SHARING THE TERRITORY OF DATA
........................................................
242
19.3 THE REVISION OF THE RELATIONSHIP BETWEEN STATE AND PRIVATE PARTNERS
. . . 243
19.3.1 THE PUBLIC SECTOR IS LAGGING B EHIND
..........................................
243
19.3.2 PRACTICE LEADS TO A REVISION OF STANDARDS
....................................
243
19.3.3 LEGAL REQUESTS ARE GOOD EXAMPLES OF THIS EVOLUTION
................
244
19.3.4 THE WEIGHT OF INTERNATIONAL A CTORS
..............................................
244
19.4 PERSISTENT CONSTRAINTS
..................................................................................
245
19.4.1 LACK OF LEGALITY
............................................................................
246
19.4.2 MUTUAL IGNORANCE
..........................................................................
246
19.5 THE BEST CONDITIONS FOR FOUNDING A P P P
..................................................
246
19.5.1 JUDICIAL FRAMEWORK
......................................................................
247
19.5.2 GOVERNANCE INVOLVEMENT
..............................................................
247
19.5.3 INVOLVING ALL ACTORS
......................................................................
248
19.5.4 AN ONGOING CHALLENGE
..................................................................
248
19.5.5 ENLARGING THE CIRCLE OF ACTORS
......................................................
249
19.5.6 SHARED STANDARDS
..........................................................................
249
19.6
CONCLUSION..................................................................................................
250
REFERENCES..............................................................................................................
251
20 BEST PRACTICES IN CYBERSECURITY FROM INTERGOVERNMENTAL DISCUSSIONS
AND A PRIVATE SECTOR PROPOSAL
............................................................................
253
RICHARD HILL
20.1 THE ELEVEN NORMS OF PARAGRAPH 13 OF THE UN GGE 2015 REPORT
..........
253
20.2 ADDITIONAL RECOMMENDATIONS
....................................................................
257
REFERENCES..............................................................................................................
259
21 WOHER NEHMEN, WENN NICHT STEHLEN - ODER WO HABEN SIE IHREN
CISO H E R ?
............................................................................................................
261
MICHAEL BARTSCH
21.1 DER CISO DEIN FREUND UND H ELFER
............................................................
261
21.2 WIE WIRD MAN EIGENTLICH C ISO ?
................................................................
262
21.3 JETZT HAT MAN EINEN CISO UND WAS NUN?
....................................................
264
21.4 POSITIONIERUNG DES CISO IM UNTERNEHMEN
................................................
265
21.5 WARUM ES TROTZ CISO ZUM CYBERANGRIFF
KOMMT........................................266
21.6 DER CISO ALS KRISENMANAGER
......................................................................
267
21.7 DER CISO ALS *ENABLER* IM UNTERNEHMEN
..................................................
268
21.8
FAZIT............................................................................................................
269
LITERATUR..................................................................................................................
269
22 EINBINDUNG DATENSCHUTZ UND BETRIEBSRAT BEIM AUFBAU EINES SIEM
............
271
MATTHIAS DRODT, LUDGER PAGEL UND THOMAS BIEDORF
22.1 CYBERANGRIFFE BEKOMMEN EIN IMMER BREITERES SPEKTRUM UND
WERDEN FUER UNTERNEHMEN ZUNEHMEND KRITISCHER
........................................
272
22.2 ENTSCHEIDEND ZUR ANGRIFFSERKENNUNG IST DIE ZEITDAUER DER
DATENSPEICHERUNG.........................................................................................278
22.3 KERNPUNKTE SIND ENGE ZWECKBINDUNG UND STARK EINGESCHRAENKTER
KREIS DER ZUGRIFFSBERECHTIGTEN
....................................................................
280
22.4 FUER DEN WEG DURCH DIE INSTANZEN IST EINE ZEITNAHE EINBINDUNG NOETIG.
. . . 282
LITERATUR...................................................................................................................284
23 DIVIDE ET IMPERA: SICHERHEIT DURCH SEPARATION
................................................
285
DIRK LOSS UND MAGNUS HARLANDER
23.1 SICHERHEITSPROBLEME DURCH KOMPLEXITAET
....................................................
285
23.2 MEHR BEHERRSCHBARKEIT DURCH SEPARATION
..................................................
286
23.3 MILS ALS VORGEHENSWEISE ZUR KONZEPTION EINER ANGEMESSENEN
SEPARIERUNG
................................................................................................
287
23.4 MECHANISMEN FUER DIE SEPARATION INNERHALB VON IT-SYSTEMEN
....................
291
23.5 ANWENDUNGSBEISPIEL DATENDIODE
................................................................
294
23.6 SEPARATION INNERHALB EINZELNER PROGRAMME
................................................
295
23.6.1 PRIVILEGE SEPARATION
......................................................................
295
23.6.2 MODULE
..........................................................................................
296
23.7 ZUSAMMENFASSUNG
......................................................................................
296
LITERATUR...................................................................................................................297
24 DIE KOMPLEXITAET DER IT-SECURITY MEISTERN
........................................................
299
RAMON MOERL
24.1 SIND WIR ZU DUMM FUER IT-SICHERHEIT?
.........................................................
300
24.1.1 FACHKRAEFTEMANGEL UND FEHLENDES KNOW-HOW IN DER
IT-SICHERHEIT
..................................................................................
300
24.1.2 VERTRAUENSKETTEN SIND MEHRDIMENSIONAL
......................................
302
24.1.3 GEEIGNETE SEKUNDAERINDIKATOREN BEI DER
ENTSCHEIDUNGSFINDUNG
..................................................................
305
24.1.4 ANFORDERUNGEN AN IT-SICHERHEIT IN DER BESCHAFFUNG
....................
307
24.1.5 SCHWELLENWERTE/MINIMALANFORDERUNG
..........................................
309
24.1.6 INFORMATIONSAUSTAUSCHPLATTFORM
....................................................
310
24.1.7 BEWERTUNG VON IT-SICHERHEITSLOESUNGEN - MANGELS M ETRIK
........
310
24.1.8 RELEVANTE STRUKTUREN IN DER HERSTELLUNG VON IT-SICHERHEIT
........
312
24.1.9 HERSTELLUNG VON SCHUTZVERFAHREN - MAKE OR BUY
..........................
314
24.1.10 IT-SECURITY-EINE UNSICHTBARE INVESTITION?
....................................
316
24.1.11 VERFUEGBARKEIT UND INTEGRITAET - GEGENLAEUFIGE ZIELE
......................
317
24.1.12 MEDIENKOMPETENZ UND WERTEWANDEL
............................................
318
24.1.13 FAZIT ZUM STATUS DER KMU
..........................................................
320
24.2 IT-SICHERHEITSARCHITEKTUR, WAS IST DAS, WEM NUTZT DAS,
WIE GEHT DAS - EIN NICHT GANZ FIKTIVES BEISPIEL
........................................
321
24.2.1 SCHUTZRAEUME FUER SERVICES UND DATEN
............................................
322
24.2.2 ORDNUNG IM DSCHUNGEL DES MOEGLICHEN
........................................
322
24.2.3 KOSTENEFFIZIENZ MIT DURCHDACHTER ARCHITEKTUR
..............................
323
24.2.4 UNMOEGLICHKEIT EINER GUELTIGEN RECHTSSICHERHEIT
............................
324
24.2.5 SICHERHEIT DER ANWENDUNG HAENGT AN DER SICHERHEIT
DES SYSTEMS
..................................................................................
324
24.2.6 ANGRIFF AUF DEN DEUTSCHEN BUNDESTAG
..........................................
325
24.2.7 ERWARTUNGSHALTUNG FUER MOBILE SICHERHEIT
....................................
326
24.2.8 BEWERTUNG DES ERREICHTEN SCHUTZES
..............................................
327
24.3 WAS LAEUFT FALSCH IN DER CYBER-SICHERHEIT?
..................................................
327
24.3.1 BEISPIELHAFTE SCHWACHSTELLEN IN EINEM
SICHERHEITSPRODUKT IM ZEITLICHEN VERLAUF:
....................................
331
24.3.2 UNTERSTUETZUNG ORGANISATORISCHER VERFAHREN DURCH
TECHNISCHE ASPEKTE
........................................................................
333
24.3.3 GEEIGNETE MASSNAHMEN
..................................................................
334
QUELLENVERZEICHNIS................................................................................................
335
25 PROGRESSING TOWARDS A PRESCRIPTIVE APPROACH ON CYBER
SECURITY - ADOPTING BEST PRACTICES AND LEVERAGE TECHNICAL INNOVATION.. .
. 339
JOERG ESCH WEDER
25.1
MOTIVATION..................................................................................................
339
25.2 RELEVANCE OF THREAT INTELLIGENCE
................................................................
340
25.3 FROM SECURITY OPERATIONS TO CYBER DEFENSE: CHANGING
ROLES AND
APPROACH....................................................................................
342
25.4 PRESCRIPTIVE SECURITY: USING THE HAYSTACK TO FIND THE N EEDLE
..................
344
25.5 SIMPLIFICATION IN CYBER SECURITY BY EMERGING TECHNOLOGIES?
..................
346
REFERENCES..............................................................................................................
347
26 INCREASING THE EFFICIENCY OF SECURITY ANALYSTS
..................................................
349
ALAIN GUT AND ANDREAS WESPI
26.1
INTRODUCTION................................................................................................
349
26.2 SECURITY MONITORING AND ANALYTICS
............................................................
350
26.2.1
PRINCIPLES......................................................................................
351
26.2.2 SECURITY 360
................................................................................
352
26.3 SECURITY IN THE COGNITIVE COMPUTING E R A
..................................................
354
26.4 WATSON FOR CYBER SECURITY
..........................................................................
356
26.4.1
ARCHITECTURE...................................................................................356
26.4.2 SECURITY THREAT INVESTIGATION
........................................................
357
26.4.3 OPERATIONAL EFFICIENCY
..................................................................
358
26.5 FUTURE COGNITIVE SECURITY ENHANCEMENTS
..................................................
360
26.6
CONCLUSION...................................................................................................361
REFERENCES..................................................................
361
27 INTELLIGENCE AND CYBER THREAT M ANAGEM
ENT......................................................363
MARTIN DION
27.1
INTRODUCTION.................................................................................................363
27.2 PART 1: INTELLIGENCE AND THE CYBER DOMAIN
................................................
364
27.2.1 INTELLIGENCE: ITS TRADITIONAL USE AND V ALUE
..................................
364
27.2.2 CYBER INTELLIGENCE: HOW DOES IT DIFFER?
......................................
367
27.2.3 THE INTELLIGENCE CYCLE
..................................................................
368
27.2.4 THE OODA LOOP
..........................................................................
369
27.2.5 CYBER INTELLIGENCE: THE THREE PILLARS AND PRODUCT FAM ILY
........
370
27.2.6 BRINGING IT ALL TOGETHER
................................................................
371
27.3 PART 2: BUILDING THE CYBER INTELLIGENCE MANAGEMENT SYSTEM (CIMS). .
. 373
27.3.1 PROGRAM MANAGEMENT VERSUS MANAGEMENT SYSTEM
....................
374
27.3.2 UNDERSTANDING THE MANAGEMENT SYSTEM COMPONENTS
................
376
27.3.3 INITIATING THE CYBER INTELLIGENCE MANAGEMENT
SYSTEM
PROGRAM.............................................................................377
27.3.4 BUILDING THE CYBER INTELLIGENCE MANAGEMENT SYSTEM
..................
378
27.3.5 PRODUCTION MEASUREMENT AND CONTINUAL IMPROVEMENT
................
388
27.4
CONCLUSION..................................................................................................
389
REFERENCES...............................................................................................................391
28 DIE DIGITALE
TRANSFORMATION.................................................................................393
MICHAEL KRANAWETTER
28.1 COMPLIANCE ALS NUTZBRINGER FUER DEN GESCHAEFTSERFOLG
................................
393
28.2 ENTWICKLUNGEN DER DIGITALEN TRANSFORMATION
..............................................
396
28.2.1 TECHNOLOGIEN, TRENDS UND ZIELE
....................................................
396
28.2.2 DIGITALISIERUNG VON GESCHAEFTSPROZESSEN
......................................
397
28.2.3 DIGITALER UND MOBILER WORKSPACE
..................................................
398
28.2.4 VERAENDERTE ARBEITSTECHNIKEN
........................................................
398
28.2.5 INTERNET DER D IN G E
........................................................................
399
28.3 HERAUSFORDERUNGEN DER DIGITALEN TRANSFORMATION
......................................
400
28.3.1 KOOPERATION DURCH UEBERGREIFENDE WORKFLOWS
..............................
400
28.3.2 MOBILITAET, FLEXIBILITAET, SICHERHEIT
..................................................
400
28.3.3 SCHNELLE UND AUTOMATISIERTE KOMMUNIKATION
..............................
401
28.3.4 DIE WELT DER MASCHINEN
................................................................
401
28.4 STRATEGISCHE ASPEKTE DER DIGITALEN TRANSFORMATION
....................................
402
28.4.1 TECHNOLOGISCHE ENTWICKLUNGEN
....................................................
402
28.4.2 CLOUD ALS BASISTECHNOLOGIE
..........................................................
403
28.5 COMPLIANCE UND DIE DIGITALE TRANSFORMATION
..............................................
403
28.5.1 COMPLIANCE - EINE EINFUEHRUNG
......................................................
403
28.5.2 IT-COMPLIANCE UND CORPORATE COMPLIANCE - GRENZEN
VERSCHWIMMEN..............................................................................
404
28.5.3 IT-COMPLIANCE - EINE FRAGE DER SICHERHEIT?
................................
405
28.6 COMPLIANCE UND CLOUD: RISIKO ODER CHANCE?
............................................
408
28.6.1 COMPLIANCE ALS STRATEGIE FUER CLOUD-ANBIETER
..............................
408
28.6.2 WIE UNTERSTUETZT DIE CLOUD DIE UMSETZUNG VON COMPLIANCE?.. . . 409
28.6.3 COMPLIANCE AS A SERVICE? LEICHTER ALS GEDACHT!
..........................
410
28.7 RESUEMEE: COMPLIANCE WIRD DIGITALER UND STANDARDISIERTER
........................
411
28.8 COMPLIANCE UND GESCHAEFTSERFOLG VERBINDEN - EIN M ODELL
........................
412
28.8.1 COMPLIANCE ALS STRATEGISCHER ANSATZ
............................................
412
28.8.2 COMPLIANCE AUS GOVEMANCE-SICHT
..............................................
412
28.8.3 GRC - GOVERNANCE, RISK MANAGEMENT UND COMPLIANCE
..........
413
28.9 MIT COMPLIANCE ZUM GESCHAEFTSERFOLG
........................................................
414
28.9.1 NUTZENPOTENZIALE RESULTIEREN AUS GEMEINSAMEN ZIELEN
................
414
28.9.2 KERNBEREICHE REGULATORISCHER UND GESCHAEFTLICHER
ANFORDERUNGEN..............................................................................
417
28.10 ANWENDUNG DES COMPLIANCE-MODELLS: VOM VERSTAENDNIS- ZUM
ANWENDUNGSMODELL....................................................................................
421
28.10.1 VERFEINERUNG DES M ODELLS
............................................................
421
28.10.2 ANALYSE ALS BASIS FUER UNTERNEHMERISCHES H ANDELN
......................
422
28.10.3 HANDLUNGSFELDER ZUR VERBESSERUNG DES GESCHAEFTSERFOLGES
..........
422
28.11 BEITRAG DER CLOUD ZU COMPLIANCE UND GESCHAEFTSERFOLG
.............................
432
28.11.1 CLOUD-SERVICE-MODELLE IM VERGLEICH
............................................
432
28.11.2 STEUERUNG DES ANBIETER-KUNDEN-VERHAELTNISSES
............................
434
28.12 DIE CLOUD ALS WIN-WIN-STRATEGIE
................................................................
438
28.13
EPILOG..........................................................................................................
438
29 MODERNE DIGITALE KOOPERATIONEN UND VERBUNDKONZEPTE MIT
SENSIBLEN D A TE N
................................................................................................
441
JOERG KEBBEDIES
29.1 GRENZEN DIGITALER
STRUKTUREN......................................................................
441
29.2 STRATEGIE DIGITALER PROZESSFORMEN
..............................................................
443
29.3 DIGITALER
KOOPERATIONSRAUM........................................................................
444
29.3.1 A. KONZEPT VERTRAUENSWUERDIGER KOOPERATION
................................
446
29.3.2 B. KONZEPT VERTRAULICHER KOOPERATION
..........................................
447
29.4 SCHUTZ DER
E-AKTEN....................................................................................
449
29.5
AUSBLICK......................................................................................................
451
LITERATUR................................................................................................................
452
30 MEHR CYBER-SICHERHEIT GEHT UNS ALLE AN
............................................................
453
WOLFGANG SCHWABL
30.1 DIE CYBER-HERAUSFORDERUNG
........................................................................
453
30.2 CYBER-SICHERHEIT BEI A L
..............................................................................
455
30.3 CYBER-SICHERHEIT FUER KONSUMENTEN
............................................................
460
30.3.1 WIE KANN DIGITALISIERUNG ZU MEHR CYBER-SICHERHEIT FUEHREN? .. .
461
30.4 ABSCHLIESSENDE W ORTE
................................................................................
462
LITERATUR...................................................................................................................462
31 CYBER-SICHERHEITS-CHECK
....................................................................................
463
TOBIAS GLEMSER
31.1
EINLEITUNG....................................................................................................
464
31.2
ENTSTEHUNGSGESCHICHTE.................................................................................464
31.3 UEBLICHER ABLAUF
..........................................................................................
464
31.4 M
ETHODIK....................................................................................................
465
31.4.1 VERTEIDIGUNGSLINIEN
......................................................................
465
31.4.2 DIE PHASEN DES CYBER-SICHERHEITS-CHECKS
..................................
466
31.4.3
ERGEBNIS........................................................................................
468
31.5 PRAXIS UND
FAZIT..........................................................................................
470
32 IT-SICHERHEIT IN INDUSTRIENETZEN - IOT UND IIOT
..............................................
471
SASCHA HERZOG
32.1 WIE GEHEN ANGREIFER UND AUCH UNSERE ANALYSTEN
(ALS ERLAUBTE ANGREIFER) V O R?
......................................................................
472
32.2 MOEGLICHE SCHUTZMASSNAHMEN
......................................................................
476
33 CYBER GOVERNANCE: KNOWING AND DOING WHAT*S IMPORTANT FOR
MAKING SMART CITIES RESILIENT
............................................................................
477
LARS MINTH
33.1 DARING TO GIVE ADVICE?
..............................................................................
477
33.2 SETTING THE
FOUNDATION................................................................................
479
33.3 LET*S
START....................................................................................................
479
33.3.1 DEFINITIONS: INCLUDING SERVAL EMBEDDINGS
..................................
480
33.3.2 FRAMEWORK FOR THE GOVERNANCE OF CYBER SECURITY
......................
482
33.3.3 CIRCLE OF CYBER GOVERNANCE
..............................................
484
33.3.4 CIRCLE OF CYBER
MANAGEMENT.......................................... 487
33.3.5 CIRCLE OF CYBER ARCHITECTURE
......................................................
488
33.3.6 CIRCLE OF OPERATIONAL SECURITY COUNTERMEASURES
..........................
489
33.3.7 BRINGING TOGETHER THE DISTINCT CYBER FRAGMENTS
......................
489
33.3.8 BRINGING TOGETHER: SECOND T RY
....................................................
490
33.3.9 THE OTHER INGREDIENTS
..................................................................
492
REFERENCES..............................................................................................................
492
34 HOW BLOCKCHAIN WILL CHANGE CYBERSECURITY PRACTICES
................................
493
CLAUDIO DI SALVO
34.1 A NEW APPROACH TO CYBERSECURITY IS REQUIRED
..........................................
494
34.2 THE ECONOMICS OF CYBERSECURITY FAVORS THE ATTACKERS
..............................
494
34.2.1 MISALIGNED INCENTIVES
..................................................................
495
34.2.2 INFORMATION ASYMMETRIES
..............................................................
495
34.2.3
EXTERNALITIES..................................................................................
496
34.3 THE CYBERSECURITY PROBLEM IN THE CLOUD
....................................................
497
34.4 WHAT SHOULD A BUSINESS DO THEN?
............................................................
499
34.5 BLOCKCHAIN CAN REENGINEER CYBERSECURITY
................................................
500
34.5.1 WHAT IS A BLOCKCHAIN?
..................................................................
501
34.6 RETHINKING CLOUD SECURITY WITH A ZERO TRUST SECURITY M ODEL
..................
502
34.6.1 THE BEYONDCORP STORY FROM
GOOGLE..............................................502
34.6.2 SOFTWARE DEFINED PERIMETER
..........................................................
506
34.7 PUTTING ALL TOGETHER: A NEW-GEN CYBERSECURITY MODEL
WITH ZERO TRUST, SDP, AND THE BLOCKCHAIN
..................................................
507
REFERENCES............................................................................................................
510
35 WORST CASE CYBERKRISE: ES IST KEINE FRAGE OB, SONDERN WANN
........................
511
AXEL ALLERKAMP
36 BEING MORE EFFECTIVE THROUGH INFORMATION SHARING AND COOPERATION ....
517
MICHAEL WEATHERSEED
36.1 WHAT SHOULD BE SHARED?
............................................................................
518
36.1.1 CHALLENGES TO SHARING INFORMATION: CHOOSE WHAT YOU SHARE . . .
518
36.1.2 SUPPORT FROM THE TOP
...................................................................
518
36.1.3 CHOOSE WITH WHOM YOU SHARE
.....................................................
519
36.2 WHAT ARE THE
OPTIONS?................................................................................
519
36.2.1 CISO
ASSOCIATIONS........................................................................
519
36.2.2
EXHIBITIONS....................................................................................
519
36.2.3
CONFERENCES..................................................................................
520
36.2.4 *BUSINESS MEETINGS*
....................................................................
520
36.2.5 *THINK-TANK MEETINGS*
................................................................
521
36.3
CONCLUSION..................................................................................................
521
TEIL V FORSCHUNG UND LEHRE
RESEARCH AND EDUCATION
37 CYBERSECURITY CAPACITY BUILDING: A SWISS APPROACH
......................................
525
LAURA CRESPO, BASTIEN WANNER AND SOLANGE GHEMAOUTI
37.1
INTRODUCTION................................................................................................
526
37.2 CONTEXT, APPROACHES, AND DEFINITIONS
........................................................
527
37.3 THE SWISS APPROACH TO CYBERSECURITY CAPACITY BUILDING
..........................
531
37.4
RECOMMENDATIONS......................................................................................
534
REFERENCES..............................................................................................................
536
38 RESEARCH AND EDUCATION AS KEY SUCCESS FACTORS FOR DEVELOPING
A CYBERSECURITY CULTURE
......................................................................................
539
SOLANGE GHERNAOUTI AND BASTIEN WANNER
38.1 NEEDS AND
CONTEXT.......................................................................................539
38.2 SOME STAKES AND RECOMMENDATIONS FOR DEVELOPING
A CYBERSECURITY
CULTURE...............................................................................541
38.3 AN INNOVATIVE MASTER PROGRAMME
..............................................................
543
38.4 LESSONS LEARNED FROM THE EUROPEAN RESEARCH PROJECT E-CRIME
................
543
38.5 CONSTRAINTS AND CHALLENGES ENCOUNTERED IN RESEARCHING
CYBERSECURITY AND THE FIGHT AGAINST CYBERCRIME
......................................
544
38.6
CONCLUSION...................................................................................................549
REFERENCES...............................................................................................................551
39 EINE VERTRAUENSWUERDIGE ZUSAMMENARBEIT MIT HILFE DER
BLOCKCHAIN-TECHNOLOGIE.......................................................................................553
NORBERT POHLMANN
39.1
EINLEITUNG.....................................................................................................553
39.2 ELEMENTE, PRINZIPIEN UND STRUKTUR DER BLOCKCHAIN-TECHNOLOGIE
................
555
39.3 ANWENDUNGSFORMEN UND ANWENDUNGEN DER BLOCKCHAIN
..........................
562
39.4 BLOCKCHAIN-AS-A-SERVICE
............................................................................
567
39.5 SICHERHEIT UND VERTRAUENSWUERDIGKEIT VON BLOCKCHAINS
..............................
568
39.6 ZUSAMMENFASSUNG
......................................................................................
569
LITERATUR...................................................................................................................569
40 CYBERSECURITY FOR EVERYONE
................................................................................
571
JAN VAN DEN BERG
40.1
INTRODUCTION.................................................................................................571
40.2 LIMITATIONS OF EXISTING INFORMATION SECURITY APPROACHES
........................
573
40.2.1 COMPUTERS, THE INTERNET, AND INFORMATION SECURITY
......................
573
40.2.2 INFORMATION SECURITY DEVELOPMENTS
IN THE TWENTY-FIRST CENTURY
..........................................................
574
40.2.3 SUMMARIZING THE CURRENT LIMITATIONS
OF INFORMATION SECURITY
................................................................
575
40.3 CONCEPTUALIZING CYBERSPACE
......................................................................
575
40.4 4 CYBERSECURITY CHALLENGES
........................................................................
577
40.5
REFLECTIONS..................................................................................................
580
40.6 CONCLUSIONS
................................................................................................
581
REFERENCES...............................................................................................................582
41 LEARNING FROM THE PAST: DESIGNING SECURE NETWORK PROTOCOLS
.......................
585
TOBIAS FIEBIG, FRANZISKA LICHTBLAU, FLORIAN STREIBELT, THORBEN KRUEGER,
PIETER LEXIS, RANDY BUSH AND ANJA FELDMANN
41.1
INTRODUCTION................................................................................................
586
41.2 RFCS: ENGINEERING-DRIVEN STANDARDIZATION
..............................................
587
41.3 THREAT MODELING
..........................................................................................
587
41.3.1 WEAK ATTACKER: GOOD ENOUGH
......................................................
588
41.3.2 WEAK ATTACKER: PERFECT SECURITY
..................................................
588
41.3.3 STRONG ATTACKEN PERFECT SECURITY
..................................................
588
41.3.4 STRONG ATTACKER: GOOD ENOUGH
....................................................
588
41.4 PROTOCOL DESIGN IN THE EARLY INTERNET
..........................................................
589
41.4.1 EXAMPLE PROTOCOLS
........................................................................
590
41.4.2 DISCUSSION
....................................................................................
591
41.5 PROTOCOL DESIGN FACING EMERGING THREATS
................................................
592
41.5.1 EXAMPLE PROTOCOLS
........................................................................
593
41.5.2 DISCUSSION
....................................................................................
595
41.6 COMPLEX SECURITY SOLUTIONS IN PROTOCOL DESIGN
........................................
596
41.6.1 EXAMPLE PROTOCOLS
........................................................................
597
41.6.2 DISCUSSION
....................................................................................
599
41.7 A NEW SIMPLICITY IN PROTOCOL DESIGN
........................................................
600
41.7.1 EXAMPLE PROTOCOLS
........................................................................
601
41.7.2 DISCUSSION
....................................................................................
604
41.8 LESSONS
LEARNED..........................................................................................
605
41.8.1 THE EARLY INTERNET
........................................................................
605
41.8.2 EMERGING THREATS
..........................................................................
606
41.8.3 COMPLEX SECURITY
..........................................................................
606
41.8.4 A NEW SIMPLICITY
..........................................................................
606
41.9
SUMMARY....................................................................................................
607
REFERENCES..............................................................................................................
608
42 NATIONAL CYBERSECURITY LEGISLATION: IS THERE A MAGIC FORMULA?
..................
615
ENEKEN TIKK
42.1 THE NOTION OF *CYBER* IN NATIONAL LEGISLATIVE PROCESS
.............................
615
42.2 TRENDS AND DEVELOPMENTS IN NATIONAL CYBER LEGISLATION
..........................
617
42.3 REGULATING INFORMATION SOCIETY IN ESTONIA
................................................
618
42.4 BEST PRACTICES IN REGIONAL AND INTERNATIONAL INSTRUMENTS
..........................
621
42.5 INFORMATION SOCIETY AND CYBERSECURITY REGULATION IN ESTONIA
..................
628
42.6
CONCLUSION..................................................................................................
628
REFERENCES..............................................................................................................
629
SACHWORTVERZEICHNIS
635
|
any_adam_object | 1 |
author2 | Bartsch, Michael Frey, Stefanie |
author2_role | edt edt |
author2_variant | m b mb s f sf |
author_GND | (DE-588)1136095209 (DE-588)1136095349 |
author_facet | Bartsch, Michael Frey, Stefanie |
building | Verbundindex |
bvnumber | BV045120846 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | QP 345 ST 276 ST 277 |
ctrlnum | (OCoLC)1035269764 (DE-599)DNB1157110428 |
dewey-full | 005.8 658.478 |
dewey-hundreds | 000 - Computer science, information, general works 600 - Technology (Applied sciences) |
dewey-ones | 005 - Computer programming, programs, data, security 658 - General management |
dewey-raw | 005.8 658.478 |
dewey-search | 005.8 658.478 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03663nam a22008898c 4500</leader><controlfield tag="001">BV045120846</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20181107 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">180807s2018 gw a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">18,N19</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1157110428</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783658216542</subfield><subfield code="c">Festeinband : EUR 49.99 (DE), EUR 51.39 (AT), CHF 51.50 (freier Preis)</subfield><subfield code="9">978-3-658-21654-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3658216549</subfield><subfield code="9">3-658-21654-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783658216542</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Bestellnummer: 978-3-658-21654-2</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Bestellnummer: 86923418</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1035269764</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1157110428</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield><subfield code="a">ger</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-HE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-Aug4</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield><subfield code="2">23/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">650</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity Best Practices</subfield><subfield code="b">Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Wiesbaden</subfield><subfield code="b">Springer Vieweg</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Wiesbaden</subfield><subfield code="b">Springer Fachmedien Wiesbaden GmbH</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">LXVII, 644 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">24 cm x 16.8 cm, 13108 g</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">Text teilweise deutsch, teilweise englisch</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield><subfield code="x">Leadership</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information systems</subfield><subfield code="x">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebliches Informationssystem</subfield><subfield code="0">(DE-588)4069386-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Behörde</subfield><subfield code="0">(DE-588)4005298-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">UR</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">UR</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">KJC</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">KJQ</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">UR</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Betriebliches Informationssystem</subfield><subfield code="0">(DE-588)4069386-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Behörde</subfield><subfield code="0">(DE-588)4005298-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bartsch, Michael</subfield><subfield code="0">(DE-588)1136095209</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Frey, Stefanie</subfield><subfield code="0">(DE-588)1136095349</subfield><subfield code="4">edt</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Springer Fachmedien Wiesbaden</subfield><subfield code="0">(DE-588)1043386068</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, PDF/ePub</subfield><subfield code="z">978-3-658-21655-9</subfield><subfield code="w">(DE-604)BV045111723</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=0378dc02459c4d17bc239bbfb50980e1&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="u">http://www.springer.com/</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030510985&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030510985</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV045120846 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:09:16Z |
institution | BVB |
institution_GND | (DE-588)1043386068 |
isbn | 9783658216542 3658216549 |
language | English German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030510985 |
oclc_num | 1035269764 |
open_access_boolean | |
owner | DE-860 DE-Aug4 |
owner_facet | DE-860 DE-Aug4 |
physical | LXVII, 644 Seiten Illustrationen, Diagramme 24 cm x 16.8 cm, 13108 g |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Springer Vieweg Springer Fachmedien Wiesbaden GmbH |
record_format | marc |
spelling | Cybersecurity Best Practices Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden Wiesbaden Springer Vieweg [2018] Wiesbaden Springer Fachmedien Wiesbaden GmbH [2018] © 2018 LXVII, 644 Seiten Illustrationen, Diagramme 24 cm x 16.8 cm, 13108 g txt rdacontent n rdamedia nc rdacarrier Text teilweise deutsch, teilweise englisch Computer science Leadership Management Information systems Computer security Unternehmen (DE-588)4061963-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Betriebliches Informationssystem (DE-588)4069386-7 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Behörde (DE-588)4005298-9 gnd rswk-swf Cyberattacke (DE-588)1075612675 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf UR KJC KJQ (DE-588)4143413-4 Aufsatzsammlung gnd-content Unternehmen (DE-588)4061963-1 s Betriebliches Informationssystem (DE-588)4069386-7 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Cyberattacke (DE-588)1075612675 s DE-604 Behörde (DE-588)4005298-9 s Datenschutz (DE-588)4011134-9 s Bartsch, Michael (DE-588)1136095209 edt Frey, Stefanie (DE-588)1136095349 edt Springer Fachmedien Wiesbaden (DE-588)1043386068 pbl Erscheint auch als Online-Ausgabe, PDF/ePub 978-3-658-21655-9 (DE-604)BV045111723 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=0378dc02459c4d17bc239bbfb50980e1&prov=M&dok_var=1&dok_ext=htm Inhaltstext X:MVB http://www.springer.com/ DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030510985&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Cybersecurity Best Practices Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden Computer science Leadership Management Information systems Computer security Unternehmen (DE-588)4061963-1 gnd Datensicherung (DE-588)4011144-1 gnd Betriebliches Informationssystem (DE-588)4069386-7 gnd Datenschutz (DE-588)4011134-9 gnd Behörde (DE-588)4005298-9 gnd Cyberattacke (DE-588)1075612675 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4061963-1 (DE-588)4011144-1 (DE-588)4069386-7 (DE-588)4011134-9 (DE-588)4005298-9 (DE-588)1075612675 (DE-588)4274324-2 (DE-588)4143413-4 |
title | Cybersecurity Best Practices Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden |
title_auth | Cybersecurity Best Practices Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden |
title_exact_search | Cybersecurity Best Practices Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden |
title_full | Cybersecurity Best Practices Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden |
title_fullStr | Cybersecurity Best Practices Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden |
title_full_unstemmed | Cybersecurity Best Practices Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden |
title_short | Cybersecurity Best Practices |
title_sort | cybersecurity best practices losungen zur erhohung der cyberresilienz fur unternehmen und behorden |
title_sub | Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden |
topic | Computer science Leadership Management Information systems Computer security Unternehmen (DE-588)4061963-1 gnd Datensicherung (DE-588)4011144-1 gnd Betriebliches Informationssystem (DE-588)4069386-7 gnd Datenschutz (DE-588)4011134-9 gnd Behörde (DE-588)4005298-9 gnd Cyberattacke (DE-588)1075612675 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer science Leadership Management Information systems Computer security Unternehmen Datensicherung Betriebliches Informationssystem Datenschutz Behörde Cyberattacke Computersicherheit Aufsatzsammlung |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=0378dc02459c4d17bc239bbfb50980e1&prov=M&dok_var=1&dok_ext=htm http://www.springer.com/ http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030510985&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT bartschmichael cybersecuritybestpracticeslosungenzurerhohungdercyberresilienzfurunternehmenundbehorden AT freystefanie cybersecuritybestpracticeslosungenzurerhohungdercyberresilienzfurunternehmenundbehorden AT springerfachmedienwiesbaden cybersecuritybestpracticeslosungenzurerhohungdercyberresilienzfurunternehmenundbehorden |