Page 20 - AeM_June_2019
P. 20

BEST PRACTICES & STRATEGIES











































             Cyber Security Management protects

             holistically by mastering all vulnerability gaps


            Today,  companies  are  more  worried  than  ever  about  well  as  in  the  connection  with  Smart  Cities,  further
            how  they  can  reliably  secure  their  entire  organization  gateways  will  arise.  Consequently,  the  risk  for
            against cyber-attacks. Their main focus is on ensuring to  companies  to  become  the  target  of  cyber-attacks  will
            put holistically secure products on the market, as well as  increase massively.
            to protect expertise stored in databases and private data
            of employees, suppliers and customers.               Products and services must also be safe

            Growing number of cyber gateways                     Nowadays,  companies  are  no  longer  safe  when  they
                                                                 just  protect  their  typical  IT  and  infrastructure.  The
            Due  to  the  increasing  digitization  and  more  and  more  example of the automotive industry clearly shows that
            Internet  of  Things  (IoT)  applications,  the  number  of  for  years the focus had to be on the holistic safety  of
            enterprise  vulnerabilities  that  can  be  spied  on  by  the  end  products  (in  this  case  vehicles).  Connectivity,
            malicious  attackers  is  growing  and  will  increase  the  the  ability  to  connect  to  the  Internet,  significantly
            incidents  of  cyberattacks,  including,  for  instance,  the  expands the overall vehicle system which is inextricably
            cloud, servers, networks, the wireless Internet, individual  linked  to  a  backend,  to  content  and  service  partners,
            computers  and  laptops  as  well  as  mobile  devices  and  and  interfaces  with  charging  stations,  diagnostic
            their software applications.                         devices, and mobile devices.

            However,  attack  vectors,  which  means  gateways  for  In  addition,  radiocommunication  transfers  important
            penetrating  into  the  company's  interior,  are  not  only  information from the vehicle to the backend, and this in
            found  in  'classic'  IT,  as  companies  are  also  vulnerable  turn to mobile devices. All these interfaces need to be
            due  to  their  IoT  infrastructure:  be  it  via  networked  secured to minimize cyber threats, since all interfaces
            building  technology,  unprotected  data  buses,  systems,  together  form  gateways  for  cyber-attacks  that  can
            machines  and  equipment  as  well  as  controls,  for  influence  safety-critical  functions  in  the  individual
            example, from production plants.                     vehicle or in entire fleets.
            Through  additional  networked  technologies,  which  will  In a second step, the company  itself can  become the
            be  used  in  the  future  in  the  context  of  Industry  4.0  as  victim  of  cyber  threats.  Both  networked  products  and

      20            June 2019 - Cyber-security & Data Protection
   15   16   17   18   19   20   21   22   23   24   25