Page 20 - AeM_June_2019
P. 20
BEST PRACTICES & STRATEGIES
Cyber Security Management protects
holistically by mastering all vulnerability gaps
Today, companies are more worried than ever about well as in the connection with Smart Cities, further
how they can reliably secure their entire organization gateways will arise. Consequently, the risk for
against cyber-attacks. Their main focus is on ensuring to companies to become the target of cyber-attacks will
put holistically secure products on the market, as well as increase massively.
to protect expertise stored in databases and private data
of employees, suppliers and customers. Products and services must also be safe
Growing number of cyber gateways Nowadays, companies are no longer safe when they
just protect their typical IT and infrastructure. The
Due to the increasing digitization and more and more example of the automotive industry clearly shows that
Internet of Things (IoT) applications, the number of for years the focus had to be on the holistic safety of
enterprise vulnerabilities that can be spied on by the end products (in this case vehicles). Connectivity,
malicious attackers is growing and will increase the the ability to connect to the Internet, significantly
incidents of cyberattacks, including, for instance, the expands the overall vehicle system which is inextricably
cloud, servers, networks, the wireless Internet, individual linked to a backend, to content and service partners,
computers and laptops as well as mobile devices and and interfaces with charging stations, diagnostic
their software applications. devices, and mobile devices.
However, attack vectors, which means gateways for In addition, radiocommunication transfers important
penetrating into the company's interior, are not only information from the vehicle to the backend, and this in
found in 'classic' IT, as companies are also vulnerable turn to mobile devices. All these interfaces need to be
due to their IoT infrastructure: be it via networked secured to minimize cyber threats, since all interfaces
building technology, unprotected data buses, systems, together form gateways for cyber-attacks that can
machines and equipment as well as controls, for influence safety-critical functions in the individual
example, from production plants. vehicle or in entire fleets.
Through additional networked technologies, which will In a second step, the company itself can become the
be used in the future in the context of Industry 4.0 as victim of cyber threats. Both networked products and
20 June 2019 - Cyber-security & Data Protection