IT Security. Workshop Hot-Spots der Software-Entwicklung. 19. Februar Technische Universität München Institut für Informatik

Größe: px
Ab Seite anzeigen:

Download "IT Security. Workshop Hot-Spots der Software-Entwicklung. 19. Februar 2013. Technische Universität München Institut für Informatik"

Transkript

1 Workshop Hot-Spots der Software-Entwicklung IT Security 19. Februar 2013 Technische Universität München Institut für Informatik Software & Systems Engineering Prof. Dr. Dr. h.c. Manfred Broy BICC-NET Bavarian Information and Communication Technology Cluster Florian Deißenböck Daniel Méndez Fernández

2 Inhaltsverzeichnis 1 Einleitung 3 2 Teilnehmerliste 4 3 Programm 5 4 Das Sicherheitsnetzwerk München Peter Möhring 6 5 Sicherer Browser Schutz des Einfallstors Reto Weber 21 6 Einsatz von Zertifikatssystemen im Internet Jamshid Shokrollahi 42 7 Chipkartenbetriebssysteme Gefahrenpotentiale und Gegenmaßnahmen Helmut Scherzer 51 8 Cybersecurity-as-a-Service: strategische und technische Herausforderungen Philipp Müller, PeterRehäusser 66 2

3 1 Einleitung Durch die fortschreitende Digitalisierung und Vernetzung von Software-intensiven Systemen und Diensten sowie die daraus resultierende Bedrohung durch Angriffe nimmt das Thema IT Security eine immer zentralere Rolle ein. Ein besonderes Augenmerk gilt dabei der Sicherstellung der Verfügbarkeit, Integrität und Vertraulichkeit von Software-Systemen und deren Infrastruktur. Diese Aspekte müssen in allen Phasen des Software-Entwicklungsprozesses unter Einsatz geeigneter Methoden und Verfahren berücksichtigt werden. Betroffen hiervon sind nicht nur klassische betriebliche Informationssysteme, wie sie beispielsweise im Finanzdienstleistungssektor vorzufinden sind, sondern auch eingebettete Systeme, z.b. in den Bereichen Automobil und Avionik. Ziel dieses Workshops ist es, zum besseren grundsätzlichen Verständnis des Themas IT Security beizutragen und konkrete Erfahrungen aus der Praxis bzgl. des erfolgreichen Einsatzes unterschiedlicher Verfahren auszutauschen, aber auch über Erfahrungen mit dem Einsatz von Verfahren, die sich als weniger geeignet erwiesen. Themen sind unter anderem: Strategische und technische Herausforderungen der IT Security Überblick über Konzepte und Methoden zur Lösung derselben Einsatz von Zertifikatssystemen Cybersecurity & Zugangskontrolle 3

4 2 Teilnehmerliste Josef Wernke, Eurocopter Deutschland GmbH Stefan Finkenzeller, BLB Thomas Mey, Münchner Rück Dr. Florian Deißenböck, Technische Universität München Thomas Schön, Software Tomography Dr. Claudia Salazar Dorn, NTT Data Deutschland GmbH Helga Stephan-Dreinhoff, IBM Stefan Prechtl, ESG GmbH Alexander Bluhm, Gesellschaft fÿr Netzwerk- und Unix-Administration mbh Olaf Kaudelka, EADS Gabriele Käsberger-Hoschek, EADS Dr. Heinrich Hördegen Ingenieurbüro Guttenberg & Hördegen Dr. Martin Wechs, BMW Group Jan Philipps, Validas AG Manuel Then, Technische Universität München Bertram Janositz, CIBOteam esolutions AG Michael Schulz, EADS Michael Greulich, Interface AG Dr. Oscar Slotosch, Validas AG Klaus Lochmann, Technische Universität München Nils Oppermann, Audi Electronics Venture GmbH Dr. Daniel Méndez, Technische Universität München Christopher Schulz, SYRACOM Consulting AG Helmut Scherzer, Giesecke & Devrient GmbH Dr. Jamshid Shokrollahi, Bosch GmbH Peter Möhring, BICCNET-Clusterbüro I&K Dr. Philipp Müller, CSC Reto Weber, Consecom AG Martin Luy, ESG GmbH Roman Kochanek, Audi Stefan Kassal, MaibornWolff et al GmbH Jakob Tewes, MaibornWolff et al GmbH Kurt Meindl, Lorenz Software GmbH Norman Thomson, ATOSS Ovidiu Stan, ATOSS Dr. Philipp Guttenberg, Ingenieurbüro Guttenberg & Hördegen Bernhard Weber, msg systems ag Carsten Genth, ASM Assembly Systems Michael Spreng, Arcor AG & Co. KG Prof. Dr. Reiner Hüttl, Fachhochschule Rosenheim Walter Trapa, BMW Group Rainer Bitzer, Bosch GmbH Ümit Kusdogan, ABSC GmbH Carsten Tauss, ABSC GmbH Peter Rehäusser, CSC Christine Rittinger, Münchner Rück Tomas Benes, OSD Open Systems Design GmbH 4

5 3 Programm 13:30 Begrüßung Manfred Broy, Technische Universität München 13:45 Das Sicherheitsnetzwerk München Peter Möhrung, Sichernetzwerk München 14:30 Sicherer Browser Schutz des Einfallstors Reto Weber, Consecom AG 15:15 Kaffee-Pause 15:30 Einsatz von Zertifikatssystemen im Internet Jamshid Shokrollahi, Robert Bosch GmbH 16:15 Chipkartenbetriebssysteme Gefahrenpotentiale und Gegenmaßnahmen Helmut Scherzer, Giesecke & Devrient 17:00 Kaffee-Pause 17:15 Cybersecurity-as-a-Service: strategische und technische Herausforderungen Philipp Müller, PeterRehäusser, CSC 18:00 Abschlussdiskussion 18:30 Empfang 5

6 4 Das Sicherheitsnetzwerk München Peter Möhring Sicherheitsnetzwerk München Peter Möhring 19. Februar 2013, TU München, Garching 6

7 Vorgeschichte BMBF Spitzenclusterwettbewerb 2011 AISEC & G&D initiieren Netzwerk Skizze und Strategie Nominierung scheitert Januar 2012 Positive Netzwerkeffekte, Relevanz der Thematik Fortsetzung des Clusters Unterstützung durch Bay. Wirtschaftsministerium Einrichtung einer Geschäftsstelle am 1. Oktober 2012 Sicherheitsnetzwerk München, 19. Februar 2013 Forschung Sicherheitsnetzwerk München, 19. Februar

8 Forschung Industrie Sicherheitsnetzwerk München, 19. Februar 2013 Forschung Industrie Anwender Sicherheitsnetzwerk München, 19. Februar

9 Bündelung von Innovationskompetenzen Sicherheitsnetzwerk München, 19. Februar 2013 Warum dieses Netzwerk? IKT als Innovationstreiber IT-Sicherheit ist ein Wirtschaftsfaktor und schafft neue Märkte IT-Sicherheit unterstützt relevante Exportindustrien Vertrauenswürdigkeit, Manipulationsschutz, Wahrung der Privatsphäre, Verläßlichkeit in den Anwendungen notwendig München hat höchstes Wirtschafts- und Forschungsniveau in Deutschland und Europa im Bereich IT-Sicherheit Sicherheitstechnologien Made in Germany als langfristiger Wettbewerbsvorteil deutscher Anbieter Sicherheitsnetzwerk München, 19. Februar

10 Sicherheitsnetzwerk München, 19. Februar 2013 Warum dieses Netzwerk? IKT als Innovationstreiber IT-Sicherheit ist ein Wirtschaftsfaktor und schafft neue Märkte IT-Sicherheit unterstützt relevante Exportindustrien Vertrauenswürdigkeit, Manipulationsschutz, Wahrung der Privatsphäre, Verläßlichkeit in den Anwendungen notwendig München hat höchstes Wirtschafts- und Forschungsniveau in Deutschland und Europa im Bereich IT-Sicherheit Sicherheitstechnologien Made in Germany als langfristiger Wettbewerbsvorteil deutscher Anbieter Sicherheitsnetzwerk München, 19. Februar

11 Sicherheitsnetzwerk München, 19. Februar 2013 Industriegetrieben mit wirtschaftlichem Fokus Integrierte Erforschung, Entwicklung und schnelle Vermarktung innovativer Sicherheitstechnologien und Produkte Made in Germany Ausbau von Weltmarktstellung der beteiligten Unternehmen Deutschland mit München zum weltweit führenden Standort im Bereich IT-Sicherheit entwickeln Sicherheitsnetzwerk München, 19. Februar

12 Sicherheitsnetzwerk München, 19. Februar 2013 Umfeld des Clusters Politik IT Gipfel Underground economy Digitale Gesellschaft Mobilgeräte und Vernetzung Neue Geschäftsmodelle Sicherheitskonferenz Sicherheitsnetzwerk München, 19. Februar

13 Geschäftsstelle: Schwerpunktziele Aufstellung und Koordinierung von F&E Kooperationsprojekten Standort- und Branchenstärkung Netzwerkarbeit Übergreifende Themen: Forschung, Fachkräfte, Trends, Sicherheitsnetzwerk München, 19. Februar 2013 Maßnahmen 2013 Clusterkonferenz: Ermittlung neuer Kooperationspotenziale Kompetenzübersicht aller Mitglieder Anbahnung von Fördervorhaben, Konsortienbildung Platzieren von Themen in Förderprogrammen Bildung von Arbeitskreisen Schaffung einer Kommunikationsplattform Neue Partnerschaften (auch international) Schaffung informeller Austauschmöglichkeiten Beeinflussung politischer Gestaltungsaufgaben Gewinnung neuer Mitglieder Sicherheitsnetzwerk München, 19. Februar

14 Projektvorhaben Sicherheitsnetzwerk München, 19. Februar 2013 Verbundprojekte 1. SIBASE 2. ICEMAN 3. SIKOMFAN 4. Ambient security (neu) 5. Trust ME 6. Secure Appstore (neu) 7. Lagebild (neu) Sicherheitsnetzwerk München, 19. Februar

15 Schwerpunkt Mobile Endgeräte Sicherheitsnetzwerk München, 19. Februar 2013 Mobile werthaltige Dienste Sicherheitsnetzwerk München, 19. Februar

16 Eisattacke (cold boot) Sicherheitsnetzwerk München, 19. Februar 2013 TEE Sicherheitsnetzwerk München, 19. Februar

17 Sichere eingebettete Systeme Sicherheitsnetzwerk München, 19. Februar 2013 Schutz kritischer Infrastrukturen Sicherheitsnetzwerk München, 19. Februar

18 Sicheres Cloud Computing Sicherheitsnetzwerk München, 19. Februar 2013 Anwendungsorientierte Technologien Sicherheitsnetzwerk München, 19. Februar

19 Verbundprojekte: Zukünftige Fördermöglichkeiten LANDESEBENE Hoher Freiheitsgrad, Direktbeantragung auch ohne calls Kleine, effiziente Konsortien, geringeres Projektvolumen Industrieorientiert (wenn von Bay. WiMi gefördert) BUNDESEBENE Geringerer Freiheitsgrad durch vorgebene calls Größere Konsortien mit höherem Projektvolumen möglich Eher forschungsorientiert (speziell BMBF) EU-EBENE Horizon 2020 Internationale Konsortien, hohes Projektvolumen möglich Sicherheitsnetzwerk München, 19. Februar 2013 Verbundprojekte: Organisation, Rolle der Geschäftsstelle ORGANISATION Konsortien mit eigener Projektkoordination Konsortien sind für Beantragung und Durchführung der Verbundprojekte selbst verantwortlich ROLLE DER GESCHÄFTSSTELLE Unterstützung in Anbahnung, Beantragung und Durchführung Schaffung von Projekttransparenz für alle Mitglieder Plattform und Drehscheibe für Mitgliederkoordination, sowohl inhaltlich als auch organisatorisch Sicherheitsnetzwerk München, 19. Februar

20 Fragen Sicherheitsnetzwerk München, 19. Februar

21 5 Sicherer Browser Schutz des Einfallstors Reto Weber Bleicherweg 64a, CH-8002 Zürich,

22 Experienced IT Risk/Security Professional Consecom AG Senior Security Consultant Reto Weber Employment History IT Risk Officer, Credit Suisse AG CERT Analyst, Credit Suisse AG IT Security Engineer, UBS AG Education CAS in Risk Management, University of Zürich emba in International Management, Kalaidos Zürich Master in Information Technology, Bond University Australia Consecom AG -- We Secure Your Solutions Slide 2 Consecom your partner for securing technology Clients Main clients: SME, and major Swiss/international enterprises and organization of all sectors. Location of work: primarily in Switzerland and neighboring countries. Services Design Build Review concepts, strategies, policies, organization, processes, secure solutions programming, integration, special engineering audits, security reviews, risk assessments, penetration tests, technology assessments, organizational and process reviews History Founded in 2007 as a management buy out. Privately owned, substantial growth to seven employees today Consecom AG -- We Secure Your Solutions Slide 3 22

23 Agenda Problem Method Analysis Solution Experience Objectives Present lesson learned from a joining development with a University Exchange of experience of product development lifecycle Show result: a secure browser solution Consecom AG -- We Secure Your Solutions Slide 4 Global news about virus infections Earlier this month, security researchers discovered a new piece of malware had infected more than half a million Apple computers in what was the largest-scale attack on Apple s Mac OS X operating system to date. Nytimes, 04/2012 Unbekannte haben einem Bericht von Amorize zufolge zahlreiche Onlineshops mit einer veralteten Version von oscommerce zur Verbreitung von Schadcode missbraucht. Die Angreifer nutzten mindestens drei bekannte Schwachstellen in der Version 2.2. heise.de 08/2011 A serious flaw in the Java software found on most personal computers could expose the machines to being taken over by malicious attacks over the internet, the US agency responsible for policing such vulnerabilities warned on Thursday. ft, 01/2013 It s a scenario security researchers have long worried about, a man-in-the-middle attack that allows someone to impersonate Microsoft Update to deliver malware disguised as legitimate Microsoft code to unsuspecting users. wired.com 06/2012 A new piece of Mac malware has been discovered on a Web site linked to the Dalai Lama, using a well-documented Java exploit to install a Trojan on visitors' computers and steal personal information. cnet.com 12/2012 Hackers are increasingly targeting childfocused gaming websites, according to a leading anti-virus firm. Avast says it detected malware threats at more than 60 sites that contained "game" or "arcade" in their title, in the 30 days running up to 12 January. 01/2012 bbc.co.uk Consecom AG -- We Secure Your Solutions Slide 5 23

24 Malware is today one of the major threats and frequently used to attack Threat Agent: No clear pictures of attacking agents. Educated guesses possible e.g. profit driven, organized crime. Threat Facts: Malware shows an exponential growth since years. Various method of infection vectors: mail, USB, social engineering, remote exploit, web-browsing. Impact: Massive infection rate on end-user desktop environments. Key question, are you at risk or not (large unreported cases)? Results: Breaches in Confidentiality, Integrity and Availability Multiple second order effects Consecom AG -- We Secure Your Solutions Slide 6 Most infections come through the browser channel Infected systems: Web technologies are mostly used to place malware. Source Microsft.com Consecom AG -- We Secure Your Solutions Slide 7 24

25 Drive By Infection is a common issue 1 Open page 2 Send Exploit 3. Compromise Consecom AG -- We Secure Your Solutions Slide 8 25

26 Problem Methods Analysis Solution Experience Consecom AG -- We Secure Your Solutions Slide 10 Multiple areas with limited influence Measure Reduce complexity in web-pages Improve security with web-pages Extend to cloud-av solutions Change user-behavior Reduce EuP flexibility and usability Myth: Keyboard encryption Feasibility / Applicability No governance; not applicability No governance; limited reach Partial success; confidentiality breach Only partially applicable Change in working model; limited reach There is no keyboard encryption! EuP: End-user Platform Consecom AG -- We Secure Your Solutions Slide 11 26

27 Where can we start Conclusion: Start with the web-browser Browsers, an integral part of the operating system. Provide a platform based on international standards/languages (HTML, http, CSS, JavaScript, ). Having a super secure browser would reduce the risk of infection dramatically Consecom AG -- We Secure Your Solutions Slide 12 EuP: End-user Platform 27

28 Problem Methods Analysis Solution Experience Consecom AG -- We Secure Your Solutions Slide 14 The security product has multiple dimentions Dimensions Criteria Trust Administrator and manufacturer trust (prerequisite) Life-cycle trust (deployment and update) Threat Coverage On-line (in-bound): Vulnerabilities in applications Off-line threats: Malicious host At run-time At rest Protection Methods to protect from infected hosts Isolation Methods to isolate applications from infected hosts Integration Capabilities to integrate into standard work process Deployment Method and scalability Maintenance Patch and update capabilities, and scalability Usability Technological user support Weaknesses Limitations and weaknesses Consecom AG -- We Secure Your Solutions Slide 15 EuP: End-user Platform 28

29 Overview Secure Browser Browser on USB Stick, Hardened Web-browsers Browser Sandbox, Hardened Web-browsers Browser on Native Boot-Platform VM Browser in VM Consecom AG -- We Secure Your Solutions Slide 16 A USB stick or «wrapper» approaches Design Paradigm Run on shared commodity platform Hardened Web-Browser Application Application Share of central operating system tables Commodity Operating System Interrupt Vectors Memory Map Exemplary implementation variants Hardened Web-Browser Application Application USB-stick based web-browser Windows Hardened web-browser by platform extension, e.g. Trusteer Rapport Consecom AG -- We Secure Your Solutions Slide 17 29

30 Main weakness is a shared platform Dimensions Criteria Details Trust Life-cycle trust High trust for stick rollout, common otherwise Threat Coverage On-line (in-bound) Off-line threats: Malicious host At run-time At rest Gradual improvement against known threads (Low) gradual improvement Only if stored on read-only medium Protection Capabilities Application internal only Isolation Method None Integration Capabilities Stick: limited; Platform: full Deployment Method and scalability Stick: shipment; Platform: software Maintenance Method and scalability Stick: replacement, both: incremental updates Usability Support by technology Stick: non-ie; browser independent Weaknesses Limitations Shared platform Web-browser only protection Consecom AG -- We Secure Your Solutions Slide 18 A USB stick or CD boot systems Design Paradigm Boot-off clean OS from dedicated media Requires respective interface Provides conceptual improvement only with trusted read-only media Exemplary implementation variants Controlled Application 1 Isolation LPS Controlled Application 2 Isolation Hardened OS User Space SELinux Mandatory Access Control Minimal Linux Kernel Controlled Application 3 stateful firewall c t bankix: Linux Knoppix (Debian)-based boot-cd Lightweight Portable Solution (LPS) by US DoD: Hardened Linux for remote access Consecom AG -- We Secure Your Solutions Slide 19 30

31 Usability and mobile technology makes it harder to use Dimensions Criteria Details Trust Life-cycle trust No protection of image at download Threat Coverage On-line (in-bound) Off-line threats: Malicious host At run-time At rest Platform hardening No exposure. If stored on read-only medium Protection Capabilities Hardened Linux platform Firewall Isolation Method Native boot Integration Capabilities None (remote access only) Deployment Method and scalability CD image download Maintenance Method and scalability None, full image deployment Usability Support by technology Base-installation too complicated Weaknesses Limitations No integration, no incremental maintenance no image-protection Consecom AG -- We Secure Your Solutions Slide 20 A VM system to browse resolves a lot problems. Design Paradigm Run web-browser in a VM Application 1 (Browser) Application 2 (PDF-Reader) Application 3 (Flashplayer) Isolate web-browser from host Virtualization layer Separate OS constrained disk access Debian Linux Virtual Machine Isolation Windows Exemplary implementation BitBox Browser in the Box by German BSI/Sirrix AG Consecom AG -- We Secure Your Solutions Slide 21 31

32 Generally OS independent Dimensions Criteria Details Trust Life-cycle trust Update-only Threat Coverage On-line (in-bound) Off-line threats: Malicious host At run-time At rest Technical improvement (Standard Linux) Gradual improvement Only if stored on read-only medium Protection Capabilities Isolation by VM, controlled read-write Isolation Method Platform virtualization by VMs Integration Capabilities Integrated for default-browser launch Constrained data exchange Deployment Method and scalability Full image deployment Maintenance Method and scalability Standard Debian update mechanisms Usability Support by technology Base-installation too complicated Weaknesses Limitations Protection by standard Linux combined with Oracle VirtualBox abstraction Consecom AG -- We Secure Your Solutions Slide 22 32

33 Problem Methods Analysis Solution Experience Consecom AG -- We Secure Your Solutions Slide 24 Security Enhanced Linux the answer to the web-infection problem Objective Protect a system against unauthorized access/execution Function A technical policy enforcement framework. Any operation executed is validated by a security filter prior to execution. Implementation A kernel module is compiled into the machine with predefined rules. The kernel s security filter preforms the checks. No one can overwrite the rules at run-time (since denied by the security filter) and compiled into the system. History Ref SELinux was originally a development project by the National Security Agency (NSA). It is an implementation of the Flask operating system security architecture. The Flask architecture defines MAC with focus on providing an administratively-defined security policy that can control all subjects and objects, basing decisions on all security-relevant information. Flask was then renamed to SELinux Consecom AG -- We Secure Your Solutions Slide 25 33

34 A combination of methods into a browsing platform SEBPS Controlled Application 1 (Firefox) Isolation SEBPS Controlled Application 2 (Acroread) Isolation SEBPS Controlled Application 3 (Flashplayer) Trusted Update Server Scalable Trusted Maintenance Hardened OS User Space SELinux Mandatory Access Control constrained disk access Minimal Linux Kernel Virtual Machine Isolation stateful firewall Commodity Operating System Consecom AG -- We Secure Your Solutions Slide 26 Multiple benefits and usability for end users are important Deployment Web-Installer abstracts installation complexity Prepare the platform: pre-required tools Reduce the installation to the minimally needed steps: Two Clicks to securebrowse Use Support the user Launch the Web-browser Support system hibernate and standby Logout shuts down securebrowse Administration Relieve the user from interfering with administrative tasks Consecom AG -- We Secure Your Solutions Slide 27 34

35 securebrowse -- the answer to the web-infection problem Dimensions Criteria Details Trust Life-cycle trust Full trust: Deployment, Maintenance Threat Coverage On-line (in-bound) Off-line threats: Malicious host At run-time At rest Platform hardening (MAC) Separate OS-addr- space, separate IVT If stored on read-only medium Protection Capabilities Hardened Linux platform (MAC) Isolation Method Virtualized platform Integration Capabilities Cut-and-Paste between host and platform Deployment Method and scalability Trusted web-based Installer Maintenance Method and scalability Trusted incremental updates Usability Support by technology Straightforward web-supported installer Standard applications Weaknesses Limitations Limited integration Consecom AG -- We Secure Your Solutions Slide 28 35

36 36

37 37

38 Problem is reality, solution is around. Companies are daily in the news because of incidents with malware. Moreover, old browsers are still used. The main entry gate, the Web-Browser, can be secured. Where and when infections happen really, remains undiscovered. Non of the frequently used standard products proves complete protection. A VM with Mandatory Access Control Browser is very secure approach. A solution is around and free to use Consecom AG -- We Secure Your Solutions Slide 35 38

39 Problem Methods Analysis Solution Experience Consecom AG -- We Secure Your Solutions Slide 36 Solving a problem doesn't make you millionaire but the knowledge brings you forward Product never reached the mass market (by now) Generally users and companies still accept the risk by drive-by infections. Windows / ios look and feel is absolutely essential. Usability change require a large investment and are not accepted. Nish market Forensic Investigators, Fraud Analyzers (Analyze Dangerous Websites). Selective usage for untrusted web-pages (i.e. all). Highly secured areas (Nuclear Power Plants, Military). New business by knowledge gain Expert in secure platforms. Providers of secure platform for Web Entry Systems. Provider of secure appliances for major financial institutes Consecom AG -- We Secure Your Solutions Slide 37 39

40 40

41 41

42 6 Einsatz von Zertifikatssystemen im Internet Jamshid Shokrollahi Certificates: How to Build Trust in the Internet Jamshid Shokrollahi, hi Corporate Research (CR/AEA) Robert Bosch GmbH 1 Jamshid Shokrollahi, CR/AEA3 2/19/2013 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. 42

43 Certificates: How to Build Trust in the Internet Overview Solved problem (Public Key Infrastructure and Certificates) Symmetric Key Cryptography Public key Cryptography Man in the Middle attack X.509 Certificate Not Completely solved problem (Secure Deployment) Different levels of realization Potential Vulnerabilities 2 Department 2/19/2013 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. Certificates: How to Build Trust in the Internet Mission Alice and Bob want to securely communicate in the presence of Eve and Mally! Eve: eavesdropping Mally: read, write, and modify the messages 3 Jamshid Shokrollahi, CR/AEA3 2/19/2013 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. 43

44 Certificates: How to Build Trust in the Internet Bob shops in the Internet! What can go wrong? 4 Jamshid Shokrollahi, CR/AEA3 2/19/2013 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. Certificates: How to Build Trust in the Internet Eavesdropping Eve sees Bob s credit card number and uses it next time for shopping! What is the solution? 5 Jamshid Shokrollahi, CR/AEA3 2/19/2013 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. 44

45 Certificates: How to Build Trust in the Internet Symmetric Encryption is a solution Enc. / Dec Enc /Dec. Communication partners have the secret common key 6 Jamshid Shokrollahi, CR/AEA3 2/19/2013 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. Certificates: How to Build Trust in the Internet Public Key Cryptography (PKC) Bob and the Server can establish the secret Key using asymmetric Encryption Bob can encrypt its symmetric key using Server s public key, but only the server has the private key to decrypt it. In practical realizations there are more details which are ignored here 7 Jamshid Shokrollahi, CR/AEA3 2/19/2013 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. 45

46 Certificates: How to Build Trust in the Internet Verifying Public Keys How can Bob be sure that Mally is not performing man in the middle attack? Mally s public key Server s public key 8 Jamshid Shokrollahi, CR/AEA3 2/19/2013 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. Certificates: How to Build Trust in the Internet Public Key Infrastructure CA(Certification Authority) CA s public key is embedded into most of browsers Secure Connection User s browser Server s identity Server s public key: Signed by CA Certificate, e.g., X.509 Server s private ke ey 9 Jamshid Shokrollahi, CR/AEA3 2/19/2013 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. 46

47 Certificates: How to Build Trust in the Internet Example: X.509 Certificate Structure (1) Version... Serial Number Certificate Signature Algorithm Algorithm ID Certificate t Signature Issuer (E.g. Certificate Authority) Validity Not Before Not After Subject (E.g., server) Subject Public Key Info Public Key Algorithm Subject Public Key Issuer Unique Identifier (optional) Subject Unique Identifier (optional) Extensions (optional) 10 1) Source: Wikipedia Jamshid Shokrollahi, CR/AEA3 2/19/2013 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. Certificates: How to Build Trust in the Internet Server Authentication and Key Exchange (simplified) 3) Verifies the signature of the certificate, and if the subject matches the server 2) Provides the certificate 1) https: request a secure connection Browser 4) Generates a random 128 bit key, 8) encrypts using the public key in the Ensures certificate and send to the server the security 5) Generates a random 128 bit key 7) XORes the two by and sends to the browser (client) in sequences to seeing plain generate the https symmetric key 6) De XOR gene ecrypts the Res the two erate the sy e received o sequenc ymmetric packet, es to key 11 Jamshid Shokrollahi, CR/AEA3 2/19/2013 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. 47

48 Certificates: How to Build Trust in the Internet Realization Aspects Issuer s Infrastructure API Level Digital Signatures 12 Jamshid Shokrollahi, CR/AEA3 2/19/2013 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. Certificates: How to Build Trust in the Internet Digital Signature Hash Function Padding m d mod N Nonlinear mapping Adding The to compress large messages Must be collision resistant specific patterns to the compressed message fundamental and most time consuming operation Nonlinearity cancels the multiplicative property of the exponentiation 13 Jamshid Shokrollahi, CR/AEA3 2/19/2013 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. 48

49 Certificates: How to Build Trust in the Internet Digital Signatures, lessons learned Do not use hash functions like MD4 with known collisions Always use large modulo numbers N which are generated according to the standards d The parameters and functions get obsolete. Never issue the certificate for very long time Always choose the functions and parameters according to the most recent standards, e.g., BSI Technische Richtlinie, BSI TR-02102, Version https://www.bsi.bund.de/shareddocs/downloads/de/bsi/publikationen/te chnischerichtlinien/tr02102/bsi-tr _pdf.pdf? blob=publicationfile 14 Jamshid Shokrollahi, CR/AEA3 2/19/2013 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. Certificates: How to Build Trust in the Internet Vulnerabilities in using API Always verify if the certificate matches the identity of the provider (server)? Even consider the possibility of having '\0' in the identity of the provider of certificate t who wants to impersonate a famous identity SSL and several other software also provide the PKI verification as functions. Always read the documentation carefully to enable the verification of the signatures Several examples of to dos and not to dos can be found in Georgiev et al., The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software, In proceedings of ACM CCS '12, pp , Jamshid Shokrollahi, CR/AEA3 2/19/2013 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. 49

50 Certificates: How to Build Trust in the Internet Issuer's s Infrastructure Certificates are your identity and their security depends on the private key of the issuer If the private key is not stored, or used, in the right way, attackers can impersonate you Revocating certificates and the lost reputation can cause high costs! Always think about the reputation of the issuer and if possible ensure that they have enough security in the processes 16 Jamshid Shokrollahi, CR/AEA3 2/19/2013 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. Certificates: How to Build Trust in the Internet Conclusion For the selection and the realization of digital signatures always use the most recent standards and follow them carefully When verifying i signatures, always be careful about the identities, and also variables and flags if you use verification functions from others' libraries When buying the certificates think about the reputation and history of the provider! 17 Jamshid Shokrollahi, CR/AEA3 2/19/2013 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. 50

51 7 Chipkartenbetriebssysteme Gefahrenpotentiale und Gegenmaßnahmen Helmut Scherzer SmartCard Operating Systems Potential Risks and Security Measures Helmut Scherzer Giesecke & Devrient 51

52 SmartCard Operating Systems P Standards < ISO 7816/1..9 < CEN TC224/EN726 < GSM 11.xx < ETSI < JAVA 2.x P Specifications < JAVA < EMV < Mondex < Multos < SECCOS(ZKA) <...and others Standards and Specifications PPlatform < ST Microelectornics < Infenion < Philips < Samsung < Sharp < Renesas < Atmel <... and others P Hidden Agenda < Security Features < Attacks < Countermeasures < Programming Tricks < Performance Optimization < Memory Optimization < Algorithms PIN Attack Attack PCut Off Power before updating the PIN error counter Correct PIN- Entry Wrong PIN-Entry PIN - Check Update of PIN error counter Attack: Detection and interruption 52

53 PIN Attack Countermeasures PUpdate PIN error counter prior to PIN verification Cnt = 2 PIN - Check Cnt = 3 Power Break Attack or Accident... PPower Drop in the SmartCard < Unintentionally (Accident) Withdraw SmartCard Functional misbehaviour in Terminal Bad Contacts Environmental Factors (Vibration in Car etc...) < Intentionally (Attack) Data manipulation 53

54 Power Break Intention of the attack EEPROM Write Cycle EEPROM ) Delete EEPROM cell EEPROM ) Write new value EEPROM Best possible moment of power cut Power Break EEPROM Random No. Pseudo Random Attack 35 BC 01 A7 48 D5 3B 1C DES Old Random No. New Random No. is written to EEPROM EEPROM EEPROM Random No New Random No. EEPROM Random No. AB 33 2F 8E 46 7A 29 FD New Random No. 54

55 Power Break Countermeasures PLimited Transaction Protection < Recognition and Indication of Power Breaks < Protection of sensitive data < Card Blocking PFull Transaction Protection < Backtrace / Write Ahead Buffer < Atomized Transaktionens < Data Committment PCountermeasures : Absolutely MANDATORY Power Break Command Message Full Transaction Protection Target Data Backtrace Buffer ????

56 Memory Defragmentation Defragmentation by multiple file deletion PCreation of files by < Additional Applications < JAVA - Applets < Version Control/Update < Application Deletion < Application Buy and Run < Temporary Files EF EF EF EF EF EF EF EEPROM EF EF EF EF EF EF Free Memory EEPROM EF EF EF EF EF EF EF EF 1.) Initialization 2.) Erase EF Free Memory EF EEPROM 3.) New layout EF EF EF EF Memory Full! EF EF EF EF EF EF Memory Defragmentation Defragmentation Process EEPROM EEPROM EF EF EF EF EF EF EF EF Defrag... EF EF EF EF EF EF EF EF EF EF EF EF P Difficulties < References must be recorded < Defragmentation (up to 10 Sec.) must be 100 % Power Break resistant P Solution < Atomic operations with wear-leveling mechanism Defragmentation possible very effectively New Application Perspectives for SmartCards Smart Card Development PAuto-Defrag < 100 % Power brk.prot. < High Performance! < on Auto-Demand only P100 % Fail resistant < Theoretically proovable 56

57 EEPROM Errors Few Bits dropping P Chip Mfg.Guaranty : 10 Years Data retension < Credible and proven value < Very seldom, accidential drops have been reported P Bit Drop Situation < Most embarassing situation as no obvious reason available < Murphy s Law: Always the most crucial bit drops" P Countermeasures < CheckSum on any EEPROM boundary < Update of Checksum must also be power break resistant EEPROM Timing Attack PTime pattern of current samples PIN/Key Verification // Compare PIN for (i = 0; i<length(pin); i++) { if (PIN[i]!= Correct_PIN[i]) return(1); } return(0); Reference Point ) t Difference Measurement 57

58 Timing Attack The Square-Multiply 'always' problem PNew programming styles rlc r2 jnc NoSwap xchg r0,r1 NoSwap: ret ; r2 = exponent SmartCard StoneAge 2013 Coding // evaluate exponent bit if (ExpBit == 1) Swap(Source,Target); else Keep(Source,Target); return(0); push r0 push r1 push r0 ; <- bp mov bp,sp ; rlc r2 ; r2 = exponent addc bp,#0 mov r0,[bp] inc bp mov r1,[bp] add sp,#3 ret ; remove '3 x push' Differential Fault Analysis The DES Bellcore Attack P Assumption: < Bits in RAM may be altered intentionally PAttack by comparison of output 0 Key: ) Xy202 01aM b201 2.) Xy202 01aM b201 DES Alice is pretty a839 x15k b7fm 58

59 Reaction of the market Decrease of Orders since June 1998!!! DPA-Attack! January March May July September November SmartCard Orders Single Power Analysis Direct Evaluation of Current Samples P Direct evaluation of Current Samples < Insider knowledge required < Program Code must be locally known P Countermeasures < No bit operation with sensitive data < Source Code CONFIDENTIAL < Support by Chip Hardware 59

60 Differential Power Analysis Attack Scenario P Statistical Attack < Many DES Calculations required! < No Source Code Knowledge required! Key Shift S-Box Output Perm. DES Round # n The Final Attack Correlate Signed Samples P If the hypothized key was correct, each calculation will contribute a deterministic part to the final signal P If the hypothized key was wrong, only 'noise' will be added and no singularity will be found Signal + Signal Noise + Noise P For each n of 64 possible subkeys a particular hypothesis on the signal signs exist. P For each n of 64 possible subkeys the addition (correlation) of the N samples will be performed + Signal = - + Noise = = N 3 /N 60

61 Differential Power Analysis Attack Scenario Key Shift S-Box Output Perm. DES Round # n High number of samples required! Key : 48 bits Subkey Subkey Subkey Subkey Subkey Subkey Subkey Subkey Data 0110 S-Box S-Box S-Box S-Box S-Box S-Box S-Box S-Box S-Box being attacked Attacked bit Finding the Key... Maximum Evaluation PIn one of 64 correlation signals we will find a significant maximum PThis maximum confirms our 'guess' for the subkey. PWe may confirm the guess by evaluation of the other three bits on the same S-Box Subkey 17/64 : wrong hypothesis Subkey 18/64 : wrong hypothesis Subkey 19/64 : wrong hypothesis Subkey 20 : CORRECT HYPOTHESIS! 61

62 Differential Power Analysis Countermeasures PSystem Level < Limited Usage of Error Counters < Logging of Error Counters in Host System PHardware Level < Bus Scrambling < Power Noise < Redundant Clock Cycles PSoftware Level < Relative Protection Make the Alignment 'impossible' Nonsens Statements < Absolute Protection Theoretical Proove of Effectiveness ITSEC Evaluation possible! IBM DPADES9 : Excellent Protection! PCritical Factor: PERFORMANCE Table compression Partitioning attack CPU ROM 256 Bytes page 256 Bytes page 256 Bytes page... ; 512 byte table db 01,45,62,F3, 8F,7B,2A,3F, db... db... PAddress and value of a (EEP)ROM table may leak DPA information PAddressing another (EEP)ROM page may leak SPA information PCountermeasures (srambled RAM table) requires too much memory (here 512 bytes) 62

63 Table compression Partitioning attack CPU 256 Bytes page ROM 256 Bytes page 256 Bytes page... PAddress and value of a (EEP)ROM table may leak DPA information PAddressing another (EEP)ROM page may leak SPA information PCountermeasures (srambled RAM table) requires too much memory (here 512 bytes) Table compression Large Table attack countermeasures ROM 128 Bytes page 128 Bytes page 128 Bytes page... data + index masking RAM 128 Bytes POverlay ROM table entries in RAM Pindex/value mask 'on the fly' PDecoding can only be done with help of the original ROM table, but this can be achieved in a well protected way. 63

64 ROM 256 Bytes page 256 Bytes page 256 Bytes page... Table compression Large Table attack countermeasures Encode Generate rand1..rand4 [each ] for (i = 1 to 128) { RAM[i] = ROM[i r rand1] r ROM[i r rand ] r ROM[i r rand ] r ROM[i r rand ] } RAM 128 Bytes Decode (e.g. value from ) j = i r rand1 ROM[i] = RAM[j] r ROM[j r rand ] r ROM[j r rand ] r ROM[j r rand ] Decode (e.g. value from ) j = (i-128) r rand2 ROM[i] = RAM[j] r ROM[j r rand1] r ROM[j r rand ] r ROM[j r rand ] End SmartCard Operating Systems Potential Risk and Security Measures 64

65 65

66 8 Cybersecurity-as-a-Service: strategische und technische Herausforderungen Philipp Müller, PeterRehäusser Cybersecurity-as-a-Service Dr. Philipp Müller Peter Rehäußer CSC Proprietary and Confidential 66

67 Hackerangriffe sind allgegenwärtig. Was nun? CSC Proprietary and Confidential March 25, Unsere Welt heute Zunehmende Digitalisierung von Geschäftsprozessen Die neue Art von Bedrohungen: Gezielter, strukturierter und mit uneingeschränkten Ressourcen für Angriffe Private und geschäftliche IT verschmelzen: Cloud, ByoD, Social Media, Wachsende Anzahl an Regularien und Compliance-Vorschriften CSC Proprietary and Confidential March 25,

68 Wie denken wir Sicherheit auf der Vorstandsebene? Wie denken wir Sicherheit gesamtgesellschaftlich? CSC Proprietary and Confidential March 25, Sicherheit ganzheitlich angehen: der Cybersecurity Stack Ebene 4: Nationale Sicherheitsstrategie Bedrohungsalarm Nation/Staat Ebene 3: Situationsbewusstsein Event- Korrelation Organisation Ebene 2: Sicherheitsschicht Perimeter & Gateway Ebene 1: Sichere Infrastruktur Klassisches Vorgehen: Vorbeugen-Aufdecken- Reagieren LAN-WAN- Applikationen und -Daten Einzelne Systeme CSC Proprietary and Confidential March 25,

69 Den Security-Live-Cycle komplett abdecken Awareness Trainings Methodology Coaching IT Security Concepts IT Risk Management Cyberconfidence Check Compliance with Security Policies Comprehensive Audits Penetration Test IdM Prequalification Checks Controlling Coordination Communication IT Security Principles Security Policy IT Security Organisation Implementation Standards Business Continuity Planning Identity Management IT Security for Outsourcing Managed Security Services Common Criteria Evaluations CSC Proprietary and Confidential March 25, Warum Cybersecurity-as-a-Service? Cost CSC Proprietary and Confidential March 25,

70 The CSC Cybersecurity Demonstration Center CSC Proprietary and Confidential March 25, Storyline der Live-Demo Der Feind beauftragt einen Hacker, die Daten eines Großprojektes zu löschen und dem Unternehmen damit Schaden zuzufügen und fortwährend zu überprüfen, ob die Organisation am Ende des Projektes in der Lage war, die Informationen wieder herzustellen. CSC Proprietary and Confidential March 25,

71 Wie gehen Hacker vor? Analysieren von Netzwerken 1 Potentielle Opfer? Beobachtung der potenziellen Opfer 2 Wo kann man am einfachsten eindringen? Angriff 3 Ausnutzen von Unachtsamkeit 4 Illegale Tätigkeit Löschen von Projektdaten Installation eines maßgeschneiderten Trojanischen Pferdes, das alle neu erstellten Dokumente sofort an den Hacker sendet Escape 5 Der Remote-Zugriff wird unterbrochen CSC Proprietary and Confidential March 25, The CSC Cybersecurity Demonstration Center Global Learning Threat Alerting Nation / States Situational Awareness Event Correlation Organization Real-time Detect and Respond Data-loss prevention End-point security Classical Prevent- Detect-Respond Perimeter & Gateway Ongoing Vulnerability Analysis Identity Management LAN-WAN-Applications and Data Single Systems CSC Proprietary and Confidential March 25,

Introducing PAThWay. Structured and methodical performance engineering. Isaías A. Comprés Ureña Ventsislav Petkov Michael Firbach Michael Gerndt

Introducing PAThWay. Structured and methodical performance engineering. Isaías A. Comprés Ureña Ventsislav Petkov Michael Firbach Michael Gerndt Introducing PAThWay Structured and methodical performance engineering Isaías A. Comprés Ureña Ventsislav Petkov Michael Firbach Michael Gerndt Technical University of Munich Overview Tuning Challenges

Mehr

p^db=`oj===pìééçêíáåñçêã~íáçå=

p^db=`oj===pìééçêíáåñçêã~íáçå= p^db=`oj===pìééçêíáåñçêã~íáçå= Error: "Could not connect to the SQL Server Instance" or "Failed to open a connection to the database." When you attempt to launch ACT! by Sage or ACT by Sage Premium for

Mehr

Lehrstuhl für Allgemeine BWL Strategisches und Internationales Management Prof. Dr. Mike Geppert Carl-Zeiß-Str. 3 07743 Jena

Lehrstuhl für Allgemeine BWL Strategisches und Internationales Management Prof. Dr. Mike Geppert Carl-Zeiß-Str. 3 07743 Jena Lehrstuhl für Allgemeine BWL Strategisches und Internationales Management Prof. Dr. Mike Geppert Carl-Zeiß-Str. 3 07743 Jena http://www.im.uni-jena.de Contents I. Learning Objectives II. III. IV. Recap

Mehr

Titelbild1 ANSYS. Customer Portal LogIn

Titelbild1 ANSYS. Customer Portal LogIn Titelbild1 ANSYS Customer Portal LogIn 1 Neuanmeldung Neuanmeldung: Bitte Not yet a member anklicken Adressen-Check Adressdaten eintragen Customer No. ist hier bereits erforderlich HERE - Button Hier nochmal

Mehr

Software development with continuous integration

Software development with continuous integration Software development with continuous integration (FESG/MPIfR) ettl@fs.wettzell.de (FESG) neidhardt@fs.wettzell.de 1 A critical view on scientific software Tendency to become complex and unstructured Highly

Mehr

Einsatz einer Dokumentenverwaltungslösung zur Optimierung der unternehmensübergreifenden Kommunikation

Einsatz einer Dokumentenverwaltungslösung zur Optimierung der unternehmensübergreifenden Kommunikation Einsatz einer Dokumentenverwaltungslösung zur Optimierung der unternehmensübergreifenden Kommunikation Eine Betrachtung im Kontext der Ausgliederung von Chrysler Daniel Rheinbay Abstract Betriebliche Informationssysteme

Mehr

ISO 15504 Reference Model

ISO 15504 Reference Model Prozess Dimension von SPICE/ISO 15504 Process flow Remarks Role Documents, data, tools input, output Start Define purpose and scope Define process overview Define process details Define roles no Define

Mehr

Instruktionen Mozilla Thunderbird Seite 1

Instruktionen Mozilla Thunderbird Seite 1 Instruktionen Mozilla Thunderbird Seite 1 Instruktionen Mozilla Thunderbird Dieses Handbuch wird für Benutzer geschrieben, die bereits ein E-Mail-Konto zusammenbauen lassen im Mozilla Thunderbird und wird

Mehr

Customer-specific software for autonomous driving and driver assistance (ADAS)

Customer-specific software for autonomous driving and driver assistance (ADAS) This press release is approved for publication. Press Release Chemnitz, February 6 th, 2014 Customer-specific software for autonomous driving and driver assistance (ADAS) With the new product line Baselabs

Mehr

IBM Security Lab Services für QRadar

IBM Security Lab Services für QRadar IBM Security Lab Services für QRadar Serviceangebote für ein QRadar SIEM Deployment in 10 bzw. 15 Tagen 28.01.2015 12015 IBM Corporation Agenda 1 Inhalt der angebotenen Leistungen Allgemeines Erbrachte

Mehr

Praktikum Entwicklung Mediensysteme (für Master)

Praktikum Entwicklung Mediensysteme (für Master) Praktikum Entwicklung Mediensysteme (für Master) Organisatorisches Today Schedule Organizational Stuff Introduction to Android Exercise 1 2 Schedule Phase 1 Individual Phase: Introduction to basics about

Mehr

Total Security Intelligence. Die nächste Generation von Log Management and SIEM. Markus Auer Sales Director Q1 Labs.

Total Security Intelligence. Die nächste Generation von Log Management and SIEM. Markus Auer Sales Director Q1 Labs. Total Security Intelligence Die nächste Generation von Log Management and SIEM Markus Auer Sales Director Q1 Labs IBM Deutschland 1 2012 IBM Corporation Gezielte Angriffe auf Unternehmen und Regierungen

Mehr

LOG AND SECURITY INTELLIGENCE PLATFORM

LOG AND SECURITY INTELLIGENCE PLATFORM TIBCO LOGLOGIC LOG AND SECURITY INTELLIGENCE PLATFORM Security Information Management Logmanagement Data-Analytics Matthias Maier Solution Architect Central Europe, Eastern Europe, BeNeLux MMaier@Tibco.com

Mehr

eurex rundschreiben 094/10

eurex rundschreiben 094/10 eurex rundschreiben 094/10 Datum: Frankfurt, 21. Mai 2010 Empfänger: Alle Handelsteilnehmer der Eurex Deutschland und Eurex Zürich sowie Vendoren Autorisiert von: Jürg Spillmann Weitere Informationen zur

Mehr

Infrastructure as a Service (IaaS) Solutions for Online Game Service Provision

Infrastructure as a Service (IaaS) Solutions for Online Game Service Provision Infrastructure as a Service (IaaS) Solutions for Online Game Service Provision Zielsetzung: System Verwendung von Cloud-Systemen für das Hosting von online Spielen (IaaS) Reservieren/Buchen von Resources

Mehr

1. General information... 2 2. Login... 2 3. Home... 3 4. Current applications... 3

1. General information... 2 2. Login... 2 3. Home... 3 4. Current applications... 3 User Manual for Marketing Authorisation and Lifecycle Management of Medicines Inhalt: User Manual for Marketing Authorisation and Lifecycle Management of Medicines... 1 1. General information... 2 2. Login...

Mehr

RailMaster New Version 7.00.p26.01 / 01.08.2014

RailMaster New Version 7.00.p26.01 / 01.08.2014 RailMaster New Version 7.00.p26.01 / 01.08.2014 English Version Bahnbuchungen so einfach und effizient wie noch nie! Copyright Copyright 2014 Travelport und/oder Tochtergesellschaften. Alle Rechte vorbehalten.

Mehr

Support Technologies based on Bi-Modal Network Analysis. H. Ulrich Hoppe. Virtuelles Arbeiten und Lernen in projektartigen Netzwerken

Support Technologies based on Bi-Modal Network Analysis. H. Ulrich Hoppe. Virtuelles Arbeiten und Lernen in projektartigen Netzwerken Support Technologies based on Bi-Modal Network Analysis H. Agenda 1. Network analysis short introduction 2. Supporting the development of virtual organizations 3. Supporting the development of compentences

Mehr

Exercise (Part XI) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1

Exercise (Part XI) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1 Exercise (Part XI) Notes: The exercise is based on Microsoft Dynamics CRM Online. For all screenshots: Copyright Microsoft Corporation. The sign ## is you personal number to be used in all exercises. All

Mehr

Effizienz im Vor-Ort-Service

Effizienz im Vor-Ort-Service Installation: Anleitung SatWork Integrierte Auftragsabwicklung & -Disposition Februar 2012 Disposition & Auftragsabwicklung Effizienz im Vor-Ort-Service Disclaimer Vertraulichkeit Der Inhalt dieses Dokuments

Mehr

Employment and Salary Verification in the Internet (PA-PA-US)

Employment and Salary Verification in the Internet (PA-PA-US) Employment and Salary Verification in the Internet (PA-PA-US) HELP.PYUS Release 4.6C Employment and Salary Verification in the Internet (PA-PA-US SAP AG Copyright Copyright 2001 SAP AG. Alle Rechte vorbehalten.

Mehr

Sicherheit dank Durchblick. Thomas Fleischmann Sales Engineer, Central Europe

Sicherheit dank Durchblick. Thomas Fleischmann Sales Engineer, Central Europe Sicherheit dank Durchblick Thomas Fleischmann Sales Engineer, Central Europe Threat Landscape Immer wieder neue Schlagzeilen Cybercrime ist profitabel Wachsende Branche 2013: 9 Zero Day Vulnerabilities

Mehr

Klausur Verteilte Systeme

Klausur Verteilte Systeme Klausur Verteilte Systeme SS 2005 by Prof. Walter Kriha Klausur Verteilte Systeme: SS 2005 by Prof. Walter Kriha Note Bitte ausfüllen (Fill in please): Vorname: Nachname: Matrikelnummer: Studiengang: Table

Mehr

TMF projects on IT infrastructure for clinical research

TMF projects on IT infrastructure for clinical research Welcome! TMF projects on IT infrastructure for clinical research R. Speer Telematikplattform für Medizinische Forschungsnetze (TMF) e.v. Berlin Telematikplattform für Medizinische Forschungsnetze (TMF)

Mehr

How to access licensed products from providers who are already operating productively in. General Information... 2. Shibboleth login...

How to access licensed products from providers who are already operating productively in. General Information... 2. Shibboleth login... Shibboleth Tutorial How to access licensed products from providers who are already operating productively in the SWITCHaai federation. General Information... 2 Shibboleth login... 2 Separate registration

Mehr

German English Firmware translation for T-Sinus 154 Access Point

German English Firmware translation for T-Sinus 154 Access Point German English Firmware translation for T-Sinus 154 Access Point Konfigurationsprogramm Configuration program (english translation italic type) Dieses Programm ermöglicht Ihnen Einstellungen in Ihrem Wireless

Mehr

Ingenics Project Portal

Ingenics Project Portal Version: 00; Status: E Seite: 1/6 This document is drawn to show the functions of the project portal developed by Ingenics AG. To use the portal enter the following URL in your Browser: https://projectportal.ingenics.de

Mehr

Frequently asked Questions for Kaercher Citrix (apps.kaercher.com)

Frequently asked Questions for Kaercher Citrix (apps.kaercher.com) Frequently asked Questions for Kaercher Citrix (apps.kaercher.com) Inhalt Content Citrix-Anmeldung Login to Citrix Was bedeutet PIN und Token (bei Anmeldungen aus dem Internet)? What does PIN and Token

Mehr

Fujitsu Software-Tage 2013 Stefan Schenscher / Symantec

Fujitsu Software-Tage 2013 Stefan Schenscher / Symantec Fujitsu Software-Tage 2013 Stefan Schenscher / Symantec Hamburg 17. / 18. Juni 2013 2 Informationen Informationen 4 Informationen Verfügbarkeit Backup Disaster Recovery 5 Schutz vor Angriffen Abwehr Informationen

Mehr

Projektrisikomanagement im Corporate Risk Management

Projektrisikomanagement im Corporate Risk Management VERTRAULICH Projektrisikomanagement im Corporate Risk Management Stefan Friesenecker 24. März 2009 Inhaltsverzeichnis Risikokategorien Projekt-Klassifizierung Gestaltungsdimensionen des Projektrisikomanagementes

Mehr

Prediction Market, 28th July 2012 Information and Instructions. Prognosemärkte Lehrstuhl für Betriebswirtschaftslehre insbes.

Prediction Market, 28th July 2012 Information and Instructions. Prognosemärkte Lehrstuhl für Betriebswirtschaftslehre insbes. Prediction Market, 28th July 2012 Information and Instructions S. 1 Welcome, and thanks for your participation Sensational prices are waiting for you 1000 Euro in amazon vouchers: The winner has the chance

Mehr

Addressing the Location in Spontaneous Networks

Addressing the Location in Spontaneous Networks Addressing the Location in Spontaneous Networks Enabling BOTH: Privacy and E-Commerce Design by Moritz Strasser 1 Disappearing computers Trends Mobility and Spontaneous Networks (MANET = Mobile Ad hoc

Mehr

Delivering services in a user-focussed way - The new DFN-CERT Portal -

Delivering services in a user-focussed way - The new DFN-CERT Portal - Delivering services in a user-focussed way - The new DFN-CERT Portal - 29th TF-CSIRT Meeting in Hamburg 25. January 2010 Marcus Pattloch (cert@dfn.de) How do we deal with the ever growing workload? 29th

Mehr

Algorithms for graph visualization

Algorithms for graph visualization Algorithms for graph visualization Project - Orthogonal Grid Layout with Small Area W INTER SEMESTER 2013/2014 Martin No llenburg KIT Universita t des Landes Baden-Wu rttemberg und nationales Forschungszentrum

Mehr

Challenges in Systems Engineering and a Pragmatic Solution Approach

Challenges in Systems Engineering and a Pragmatic Solution Approach Pure Passion. Systems Engineering and a Pragmatic Solution Approach HELVETING Dr. Thomas Stöckli Director Business Unit Systems Engineering Dr. Daniel Hösli Member of the Executive Board 1 Agenda Different

Mehr

Bayerisches Landesamt für Statistik und Datenverarbeitung Rechenzentrum Süd. z/os Requirements 95. z/os Guide in Lahnstein 13.

Bayerisches Landesamt für Statistik und Datenverarbeitung Rechenzentrum Süd. z/os Requirements 95. z/os Guide in Lahnstein 13. z/os Requirements 95. z/os Guide in Lahnstein 13. März 2009 0 1) LOGROTATE in z/os USS 2) KERBEROS (KRB5) in DFS/SMB 3) GSE Requirements System 1 Requirement Details Description Benefit Time Limit Impact

Mehr

ReadMe zur Installation der BRICKware for Windows, Version 6.1.2. ReadMe on Installing BRICKware for Windows, Version 6.1.2

ReadMe zur Installation der BRICKware for Windows, Version 6.1.2. ReadMe on Installing BRICKware for Windows, Version 6.1.2 ReadMe zur Installation der BRICKware for Windows, Version 6.1.2 Seiten 2-4 ReadMe on Installing BRICKware for Windows, Version 6.1.2 Pages 5/6 BRICKware for Windows ReadMe 1 1 BRICKware for Windows, Version

Mehr

IDS Lizenzierung für IDS und HDR. Primärserver IDS Lizenz HDR Lizenz

IDS Lizenzierung für IDS und HDR. Primärserver IDS Lizenz HDR Lizenz IDS Lizenzierung für IDS und HDR Primärserver IDS Lizenz HDR Lizenz Workgroup V7.3x oder V9.x Required Not Available Primärserver Express V10.0 Workgroup V10.0 Enterprise V7.3x, V9.x or V10.0 IDS Lizenz

Mehr

EEX Kundeninformation 2007-09-05

EEX Kundeninformation 2007-09-05 EEX Eurex Release 10.0: Dokumentation Windows Server 2003 auf Workstations; Windows Server 2003 Service Pack 2: Information bezüglich Support Sehr geehrte Handelsteilnehmer, Im Rahmen von Eurex Release

Mehr

JONATHAN JONA WISLER WHD.global

JONATHAN JONA WISLER WHD.global JONATHAN WISLER JONATHAN WISLER WHD.global CLOUD IS THE FUTURE By 2014, the personal cloud will replace the personal computer at the center of users' digital lives Gartner CLOUD TYPES SaaS IaaS PaaS

Mehr

A central repository for gridded data in the MeteoSwiss Data Warehouse

A central repository for gridded data in the MeteoSwiss Data Warehouse A central repository for gridded data in the MeteoSwiss Data Warehouse, Zürich M2: Data Rescue management, quality and homogenization September 16th, 2010 Data Coordination, MeteoSwiss 1 Agenda Short introduction

Mehr

Isabel Arnold CICS Technical Sales Germany Isabel.arnold@de.ibm.com. z/os Explorer. 2014 IBM Corporation

Isabel Arnold CICS Technical Sales Germany Isabel.arnold@de.ibm.com. z/os Explorer. 2014 IBM Corporation Isabel Arnold CICS Technical Sales Germany Isabel.arnold@de.ibm.com z/os Explorer Agenda Introduction and Background Why do you want z/os Explorer? What does z/os Explorer do? z/os Resource Management

Mehr

Digital Customer Experience Notwendiges Übel oder überlebenswichtige Notwendigkeit? Datalympics, 2. Juli 2014

Digital Customer Experience Notwendiges Übel oder überlebenswichtige Notwendigkeit? Datalympics, 2. Juli 2014 Digital Customer Experience Notwendiges Übel oder überlebenswichtige Notwendigkeit? Datalympics, 2. Juli 2014 Digitale Realität Die Welt verändert sich in rasantem Tempo Rom, Petersplatz, März 2013 Franziskus

Mehr

Beschwerdemanagement / Complaint Management

Beschwerdemanagement / Complaint Management Beschwerdemanagement / Complaint Management Structure: 1. Basics 2. Requirements for the implementation 3. Strategic possibilities 4. Direct Complaint Management processes 5. Indirect Complaint Management

Mehr

Abteilung Internationales CampusCenter

Abteilung Internationales CampusCenter Abteilung Internationales CampusCenter Instructions for the STiNE Online Enrollment Application for Exchange Students 1. Please go to www.uni-hamburg.de/online-bewerbung and click on Bewerberaccount anlegen

Mehr

Anleitung zur Schnellinstallation TFM-560X YO.13

Anleitung zur Schnellinstallation TFM-560X YO.13 Anleitung zur Schnellinstallation TFM-560X YO.13 Table of Contents Deutsch 1 1. Bevor Sie anfangen 1 2. Installation 2 Troubleshooting 6 Version 06.08.2011 1. Bevor Sie anfangen Packungsinhalt ŸTFM-560X

Mehr

3A03 Security Löcher schnell und effizient schließen mit HP OpenView Radia

3A03 Security Löcher schnell und effizient schließen mit HP OpenView Radia 3A03 Security Löcher schnell und effizient schließen mit HP OpenView Radia Alexander Meisel HP OpenView 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change

Mehr

KURZANLEITUNG. Firmware-Upgrade: Wie geht das eigentlich?

KURZANLEITUNG. Firmware-Upgrade: Wie geht das eigentlich? KURZANLEITUNG Firmware-Upgrade: Wie geht das eigentlich? Die Firmware ist eine Software, die auf der IP-Kamera installiert ist und alle Funktionen des Gerätes steuert. Nach dem Firmware-Update stehen Ihnen

Mehr

Robotino View Kommunikation mit OPC. Communication with OPC DE/EN 04/08

Robotino View Kommunikation mit OPC. Communication with OPC DE/EN 04/08 Robotino View Kommunikation mit OPC Robotino View Communication with OPC 1 DE/EN 04/08 Stand/Status: 04/2008 Autor/Author: Markus Bellenberg Festo Didactic GmbH & Co. KG, 73770 Denkendorf, Germany, 2008

Mehr

LINUX 4 AIX Ein Überblick. 1 17.03.2014 AIX 2 LINUX Webcast

LINUX 4 AIX Ein Überblick. 1 17.03.2014 AIX 2 LINUX Webcast LINUX 4 AIX Ein Überblick 1 17.03.2014 AIX 2 LINUX Webcast Agenda 00 Voraussetzungen und Vorbereitung 01 Virtualisierung 02 HA High Availability und Cluster 03 System Management Deployment Monitoring 04

Mehr

SmartClass Firmware-Update Vorgehensweise

SmartClass Firmware-Update Vorgehensweise Benutzeranweisungen SmartClass Firmware-Update Vorgehensweise 2008.01 (V 1.x.x) Deutsch Please direct all enquiries to your local JDSU sales company. The addresses can be found at: www.jdsu.com/tm-contacts

Mehr

Exercise (Part II) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1

Exercise (Part II) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1 Exercise (Part II) Notes: The exercise is based on Microsoft Dynamics CRM Online. For all screenshots: Copyright Microsoft Corporation. The sign ## is you personal number to be used in all exercises. All

Mehr

Patentrelevante Aspekte der GPLv2/LGPLv2

Patentrelevante Aspekte der GPLv2/LGPLv2 Patentrelevante Aspekte der GPLv2/LGPLv2 von RA Dr. Till Jaeger OSADL Seminar on Software Patents and Open Source Licensing, Berlin, 6./7. November 2008 Agenda 1. Regelungen der GPLv2 zu Patenten 2. Implizite

Mehr

Check Point Software Technologies LTD.

Check Point Software Technologies LTD. Check Point Software Technologies LTD. Oct. 2013 Marc Mayer A Global Security Leader Leader Founded 1993 Global leader in firewall/vpn* and mobile data encryption More than 100,000 protected businesses

Mehr

XML Template Transfer Transfer project templates easily between systems

XML Template Transfer Transfer project templates easily between systems Transfer project templates easily between systems A PLM Consulting Solution Public The consulting solution XML Template Transfer enables you to easily reuse existing project templates in different PPM

Mehr

Netzwerke und Sicherheit auf mobilen Geräten

Netzwerke und Sicherheit auf mobilen Geräten Netzwerke und Sicherheit auf mobilen Geräten Univ.-Prof. Priv.-Doz. DI Dr. René Mayrhofer Antrittsvorlesung Johannes Kepler Universität Linz Repräsentationsräume 1. Stock (Uni-Center) 19.1.2015, 16:00

Mehr

AnyWeb AG 2008 www.anyweb.ch

AnyWeb AG 2008 www.anyweb.ch Agenda - BTO IT heute Was nützt IT dem Business? Die Lösung: HP Software BTO Q&A IT heute Kommunikation zum Business funktioniert schlecht IT denkt und arbeitet in Silos und ist auch so organisiert Kaum

Mehr

CYBERWAR CYBER FACES. Ivan Bütler. Compass Security AG www.csnc.ch. Compass Security AG. www.csnc.ch. Slide 1

CYBERWAR CYBER FACES. Ivan Bütler. Compass Security AG www.csnc.ch. Compass Security AG. www.csnc.ch. Slide 1 CYBERWAR Ivan Bütler Compass Security AG www.csnc.ch CYBER FACES Slide 1 Cyber War define it! RSA Breach Slide 2 Definition of a traditional conflict/war War is a state of organized, armed and often prolonged

Mehr

Arrow University München 03.03.2015. Thin Client Lösungen performant (auch im 3D-Umfelfd), zukunftssicher und zentral verwaltet!

Arrow University München 03.03.2015. Thin Client Lösungen performant (auch im 3D-Umfelfd), zukunftssicher und zentral verwaltet! Arrow University München 03.03.2015 Thin Client Lösungen performant (auch im 3D-Umfelfd), zukunftssicher und zentral verwaltet! Produkte & Services IGEL Produkt-Überblick Thin Client Management Thin Client

Mehr

Sichere Identitäten in Smart Grids

Sichere Identitäten in Smart Grids Informationstag "IT-Sicherheit im Smart Grid" Berlin, 23.05.2012 Sichere Identitäten in Smart Grids Dr. Thomas Störtkuhl, Agenda 1 2 Beispiele für Kommunikationen Digitale Zertifikate: Basis für Authentifizierung

Mehr

CHAMPIONS Communication and Dissemination

CHAMPIONS Communication and Dissemination CHAMPIONS Communication and Dissemination Europa Programm Center Im Freistaat Thüringen In Trägerschaft des TIAW e. V. 1 CENTRAL EUROPE PROGRAMME CENTRAL EUROPE PROGRAMME -ist als größtes Aufbauprogramm

Mehr

Preisliste für The Unscrambler X

Preisliste für The Unscrambler X Preisliste für The Unscrambler X english version Alle Preise verstehen sich netto zuzüglich gesetzlicher Mehrwertsteuer (19%). Irrtümer, Änderungen und Fehler sind vorbehalten. The Unscrambler wird mit

Mehr

THE NEW ERA. nugg.ad ist ein Unternehmen von Deutsche Post DHL

THE NEW ERA. nugg.ad ist ein Unternehmen von Deutsche Post DHL nugg.ad EUROPE S AUDIENCE EXPERTS. THE NEW ERA THE NEW ERA BIG DATA DEFINITION WHAT ABOUT MARKETING WHAT ABOUT MARKETING 91% of senior corporate marketers believe that successful brands use customer data

Mehr

Wie agil kann Business Analyse sein?

Wie agil kann Business Analyse sein? Wie agil kann Business Analyse sein? Chapter Meeting Michael Leber 2012-01-24 ANECON Software Design und Beratung G.m.b.H. Alser Str. 4/Hof 1 A-1090 Wien Tel.: +43 1 409 58 90 www.anecon.com office@anecon.com

Mehr

FOR ENGLISCH VERSION PLEASE SCROLL FORWARD SOME PAGES. THANK YOU!

FOR ENGLISCH VERSION PLEASE SCROLL FORWARD SOME PAGES. THANK YOU! FOR ENGLISCH VERSION PLEASE SCROLL FORWARD SOME PAGES. THANK YOU! HELPLINE GAMMA-SCOUT ODER : WIE BEKOMME ICH MEIN GERÄT ZUM LAUFEN? Sie haben sich für ein Strahlungsmessgerät mit PC-Anschluss entschieden.

Mehr

Product Lifecycle Manager

Product Lifecycle Manager Product Lifecycle Manager ATLAS9000 GmbH Landauer Str. - 1 D-68766 Hockenheim +49(0)6205 / 202730 Product Lifecycle Management ATLAS PLM is powerful, economical and based on standard technologies. Directory

Mehr

Cloud Computing in der öffentlichen Verwaltung

Cloud Computing in der öffentlichen Verwaltung Cloud Computing in der öffentlichen Verwaltung Willy Müller - Open Cloud Day 19.6.2012 2 Plug and Cloud? 3 The plug tower BPaaS Software SaaS Platform PaaS Storage/ Computing IaaS Internet Power grid 4

Mehr

EEX Kundeninformation 2002-08-30

EEX Kundeninformation 2002-08-30 EEX Kundeninformation 2002-08-30 Terminmarkt - Eurex Release 6.0; Versand der Simulations-Kits Kit-Versand: Am Freitag, 30. August 2002, versendet Eurex nach Handelsschluss die Simulations -Kits für Eurex

Mehr

Mehr erreichen mit der bestehenden Infrastuktur. Mathias Widler Regional Sales Manager DACH mwidler@a10networks.com

Mehr erreichen mit der bestehenden Infrastuktur. Mathias Widler Regional Sales Manager DACH mwidler@a10networks.com Mehr erreichen mit der bestehenden Infrastuktur Mathias Widler Regional Sales Manager DACH mwidler@a10networks.com 1 Das Unternehmen A10 Networks Gegründet 2004, 240 Mitarbeiter Mission: Marktführer im

Mehr

DIGICOMP OPEN TUESDAY AKTUELLE STANDARDS UND TRENDS IN DER AGILEN SOFTWARE ENTWICKLUNG. Michael Palotas 7. April 2015 1 GRIDFUSION

DIGICOMP OPEN TUESDAY AKTUELLE STANDARDS UND TRENDS IN DER AGILEN SOFTWARE ENTWICKLUNG. Michael Palotas 7. April 2015 1 GRIDFUSION DIGICOMP OPEN TUESDAY AKTUELLE STANDARDS UND TRENDS IN DER AGILEN SOFTWARE ENTWICKLUNG Michael Palotas 7. April 2015 1 GRIDFUSION IHR REFERENT Gridfusion Software Solutions Kontakt: Michael Palotas Gerbiweg

Mehr

Using TerraSAR-X data for mapping of damages in forests caused by the pine sawfly (Dprion pini) Dr. Klaus MARTIN klaus.martin@slu-web.

Using TerraSAR-X data for mapping of damages in forests caused by the pine sawfly (Dprion pini) Dr. Klaus MARTIN klaus.martin@slu-web. Using TerraSAR-X data for mapping of damages in forests caused by the pine sawfly (Dprion pini) Dr. Klaus MARTIN klaus.martin@slu-web.de Damages caused by Diprion pini Endangered Pine Regions in Germany

Mehr

Business-centric Storage How appliances make complete backup solutions simple to build and to sell

Business-centric Storage How appliances make complete backup solutions simple to build and to sell Business-centric Storage How appliances make complete backup solutions simple to build and to sell Frank Reichart Sen. Dir. Prod. Marketing Storage Solutions 0 The three horrors of data protection 50%

Mehr

Linux Anwender-Security. Dr. Markus Tauber markus.tauber@ait.ac.at 26/04/2013

Linux Anwender-Security. Dr. Markus Tauber markus.tauber@ait.ac.at 26/04/2013 Linux Anwender-Security Dr. Markus Tauber markus.tauber@ait.ac.at 26/04/2013 Inhalt Benutzer(selbst)Schutz - für den interessierten Anwender Praktische Beispiele und Hintergründe (Wie & Warum) Basierend

Mehr

Satellite 6. Next Generation System Provisioning, Configuration and Patch Management

Satellite 6. Next Generation System Provisioning, Configuration and Patch Management Peter Mumenthaler Head of System Engineering Senior Systems Architekt Andreas Zuber Senior System Engineer Philipp Gassman System Technician Satellite 6 Next Generation System Provisioning, Configuration

Mehr

Labour law and Consumer protection principles usage in non-state pension system

Labour law and Consumer protection principles usage in non-state pension system Labour law and Consumer protection principles usage in non-state pension system by Prof. Dr. Heinz-Dietrich Steinmeyer General Remarks In private non state pensions systems usually three actors Employer

Mehr

Outline. 5. A Chance for Entrepreneurs? Porter s focus strategy and the long tail concept. 6. Discussion. Prof. Dr. Anne König, Germany, 27. 08.

Outline. 5. A Chance for Entrepreneurs? Porter s focus strategy and the long tail concept. 6. Discussion. Prof. Dr. Anne König, Germany, 27. 08. Mass Customized Printed Products A Chance for Designers and Entrepreneurs? Burgdorf, 27. 08. Beuth Hochschule für Technik Berlin Prof. Dr. Anne König Outline 1. Definitions 2. E-Commerce: The Revolution

Mehr

Exkursion zu Capgemini Application Services Custom Solution Development. Ankündigung für Februar 2013 Niederlassung Stuttgart

Exkursion zu Capgemini Application Services Custom Solution Development. Ankündigung für Februar 2013 Niederlassung Stuttgart Exkursion zu Capgemini Application Services Custom Solution Development Ankündigung für Februar 2013 Niederlassung Stuttgart Ein Nachmittag bei Capgemini in Stuttgart Fachvorträge und Diskussionen rund

Mehr

Brainloop Secure Boardroom

Brainloop Secure Boardroom Brainloop Secure Boardroom Efficient and Secure Collaboration for Executives Jörg Ganz, Enterprise Sales Manager, Brainloop Switzerland AG www.brainloop.com 1 Is your company at risk of information leakage?

Mehr

Readme-USB DIGSI V 4.82

Readme-USB DIGSI V 4.82 DIGSI V 4.82 Sehr geehrter Kunde, der USB-Treiber für SIPROTEC-Geräte erlaubt Ihnen, mit den SIPROTEC Geräten 7SJ80/7SK80 über USB zu kommunizieren. Zur Installation oder Aktualisierung des USB-Treibers

Mehr

job and career at HANNOVER MESSE 2015

job and career at HANNOVER MESSE 2015 1. Überschrift 1.1 Überschrift 1.1.1 Überschrift job and career at HANNOVER MESSE 2015 Marketing Toolkit DE / EN 1 Inhalte Smart Careers engineering and technology 1 Logo Seite 3 2 Signatur Seite 4 3 Ankündigungstext

Mehr

Security Planning Basics

Security Planning Basics Einführung in die Wirtschaftsinformatik VO WS 2009/2010 Security Planning Basics Gerald.Quirchmayr@univie.ac.at Textbook used as basis for these slides and recommended as reading: Whitman, M. E. & Mattord,

Mehr

WH1 Citrix Follow-Me Data: The Enterprise Version of File Sharing. Peter Schulz, Product Manager, Citrix Joerg Vosse, Systems Engineer, Citrix

WH1 Citrix Follow-Me Data: The Enterprise Version of File Sharing. Peter Schulz, Product Manager, Citrix Joerg Vosse, Systems Engineer, Citrix WH1 Citrix Follow-Me Data: The Enterprise Version of File Sharing Peter Schulz, Product Manager, Citrix Joerg Vosse, Systems Engineer, Citrix Users Demand: Instant file access from any device File Sharing

Mehr

Security for Safety in der Industrieautomation Konzepte und Lösungsansätze des IEC 62443

Security for Safety in der Industrieautomation Konzepte und Lösungsansätze des IEC 62443 Security for Safety in der Industrieautomation Konzepte und Lösungsansätze des IEC 62443 Roadshow INDUSTRIAL IT SECURITY Dr. Thomas Störtkuhl 18. Juni 2013 Folie 1 Agenda Einführung: Standard IEC 62443

Mehr

Check Point IPS. Agenda. Check Point & AlgoSec Security-Update 24./25. September 2014. «Eine Firewall ohne IPS ist keine Firewall»

Check Point IPS. Agenda. Check Point & AlgoSec Security-Update 24./25. September 2014. «Eine Firewall ohne IPS ist keine Firewall» Check Point IPS «Eine Firewall ohne IPS ist keine Firewall» Andreas Leuthold, Security Engineer leuthold@avantec.ch Agenda Warum IPS? Wie funktioniert IPS? Ablauf eines IPS Projekts IPS Warum IPS? Source

Mehr

Group and Session Management for Collaborative Applications

Group and Session Management for Collaborative Applications Diss. ETH No. 12075 Group and Session Management for Collaborative Applications A dissertation submitted to the SWISS FEDERAL INSTITUTE OF TECHNOLOGY ZÜRICH for the degree of Doctor of Technical Seiences

Mehr

Continuous Auditing eine gut gemeinte aber schlechte Idee kommt zurück

Continuous Auditing eine gut gemeinte aber schlechte Idee kommt zurück Continuous Auditing eine gut gemeinte aber schlechte Idee kommt zurück Michel Huissoud Lic.iur, CISA, CIA 5. November 2012 - ISACA/SVIR-Fachtagung - Zürich Überwachung Continuous Monitoring Continuous

Mehr

Business Activity Monitoring Overall, Real Time Monitoring Daniel Jobst, TietoEnator Michael Herr, Deutsche Post SOPSOLUTIONS

Business Activity Monitoring Overall, Real Time Monitoring Daniel Jobst, TietoEnator Michael Herr, Deutsche Post SOPSOLUTIONS Business Activity Monitoring Overall, Real Time Monitoring Daniel Jobst, TietoEnator Michael Herr, Deutsche Post SOPSOLUTIONS CITT Expertengespräch TietoEnator 2006 Page 1 Data Freshness and Overall, Real

Mehr

Parameter-Updatesoftware PF-12 Plus

Parameter-Updatesoftware PF-12 Plus Parameter-Updatesoftware PF-12 Plus Mai / May 2015 Inhalt 1. Durchführung des Parameter-Updates... 2 2. Kontakt... 6 Content 1. Performance of the parameter-update... 4 2. Contact... 6 1. Durchführung

Mehr

Markus BöhmB Account Technology Architect Microsoft Schweiz GmbH

Markus BöhmB Account Technology Architect Microsoft Schweiz GmbH Markus BöhmB Account Technology Architect Microsoft Schweiz GmbH What is a GEVER??? Office Strategy OXBA How we used SharePoint Geschäft Verwaltung Case Management Manage Dossiers Create and Manage Activities

Mehr

Prof. Dr. Margit Scholl, Mr. RD Guldner Mr. Coskun, Mr. Yigitbas. Mr. Niemczik, Mr. Koppatz (SuDiLe GbR)

Prof. Dr. Margit Scholl, Mr. RD Guldner Mr. Coskun, Mr. Yigitbas. Mr. Niemczik, Mr. Koppatz (SuDiLe GbR) Prof. Dr. Margit Scholl, Mr. RD Guldner Mr. Coskun, Mr. Yigitbas in cooperation with Mr. Niemczik, Mr. Koppatz (SuDiLe GbR) Our idea: Fachbereich Wirtschaft, Verwaltung und Recht Simple strategies of lifelong

Mehr

Titelmasterformat durch Klicken bearbeiten

Titelmasterformat durch Klicken bearbeiten Titelmasterformat durch Klicken Titelmasterformat durch Klicken Die neue HDS Panama Serie Enterprise Plattform für den gehobenen Mittelstand Andreas Kustura, Silvio Weber Kramer & Crew GmbH & Co. KG Titelmasterformat

Mehr

(Prüfungs-)Aufgaben zum Thema Scheduling

(Prüfungs-)Aufgaben zum Thema Scheduling (Prüfungs-)Aufgaben zum Thema Scheduling 1) Geben Sie die beiden wichtigsten Kriterien bei der Wahl der Größe des Quantums beim Round-Robin-Scheduling an. 2) In welchen Situationen und von welchen (Betriebssystem-)Routinen

Mehr

3D City Model Berlin Spatial Data Infrastructure Berlin: The 3D City Model ERDF Project Strategic Goal 3D City Model Berlin Strategic Goal Use of 3D City Model for: City and Urban Planning, Political Issues

Mehr

Documentation TYC. Registration manual. Registration and Login. issued 1. April 2013 by EN changed 11. June 2015 by EN version 1 status finished

Documentation TYC. Registration manual. Registration and Login. issued 1. April 2013 by EN changed 11. June 2015 by EN version 1 status finished Documentation TYC Registration manual Registration and Login issued 1. April 2013 by EN changed 11. June 2015 by EN version 1 status finished Content 1 Registration... 3 2 Login... 4 2.1 First login...

Mehr

Mash-Up Personal Learning Environments. Dr. Hendrik Drachsler

Mash-Up Personal Learning Environments. Dr. Hendrik Drachsler Decision Support for Learners in Mash-Up Personal Learning Environments Dr. Hendrik Drachsler Personal Nowadays Environments Blog Reader More Information Providers Social Bookmarking Various Communities

Mehr

Matthias Schorer 14 Mai 2013

Matthias Schorer 14 Mai 2013 Die Cloud ist hier was nun? Matthias Schorer 14 Mai 2013 EuroCloud Deutschland Conference 2013 Matthias Schorer Accelerate Advisory Services Leader, CEMEA 29.05.13 2 29.05.13 3 The 1960s Source: http://www.kaeferblog.com/vw-bus-t2-flower-power-hippie-in-esprit-werbung

Mehr

Your Partner for Luxury and Lifestyle Estates Ihr Partner für Luxus- und Lifestyle-Immobilien

Your Partner for Luxury and Lifestyle Estates Ihr Partner für Luxus- und Lifestyle-Immobilien Your Partner for Luxury and Lifestyle Estates Ihr Partner für Luxus- und Lifestyle-Immobilien Welcome to Premier Suisse Estates Willkommen bei Premier Suisse Estates Dr. Peter Moertl, CEO Premier Suisse

Mehr

Prozesse als strategischer Treiber einer SOA - Ein Bericht aus der Praxis

Prozesse als strategischer Treiber einer SOA - Ein Bericht aus der Praxis E-Gov Fokus Geschäftsprozesse und SOA 31. August 2007 Prozesse als strategischer Treiber einer SOA - Ein Bericht aus der Praxis Der Vortrag zeigt anhand von Fallbeispielen auf, wie sich SOA durch die Kombination

Mehr

Betrugserkennung mittels Big Data Analyse Beispiel aus der Praxis TDWI München, Juni 2014

Betrugserkennung mittels Big Data Analyse Beispiel aus der Praxis TDWI München, Juni 2014 Betrugserkennung mittels Big Data Analyse Beispiel aus der Praxis TDWI München, Juni 2014 Beratung Business Analytics Software Entwicklung Datenmanagement AGENDA Der Kreislauf für die Betrugserkennung

Mehr