What is a criminally underrated snack
Protection for ports from attacks from the network
Blueprint for other ports
This includes, among other things, supporting the various security requirements of work processes, protecting them from sabotage and preventing third parties from spying on sensitive data. If, despite all precautionary measures, an attacker manages to break into the digital communications network of a port, the new IT security architecture should at least minimize the effects on other actors. It should then be possible to return the affected network to its normal state in a controlled manner. "When we have developed an understanding of the overall process, we will know what specific protection needs result from it," says Professor Dr. Dieter Hutter from the Cyber-Physical Systems research division at DFKI. A more intensive examination of interfaces, an exclusion of certain file types from the system or a definition of which actor is allowed to work with which information and when, are conceivable.
The end result should be a model that works as a blueprint in other ports as well. "In it we will name security mechanisms that are required to adhere to the security policy that has been developed," said Hutter. For the companies this is a concrete added value, because they are better protected against cyber attacks. This could prevent an attack like the one on the Maersk shipping company in the future.
Prof. Dr. Dieter Hutter, German Research Center for Artificial Intelligence (DFKI), research area Cyber-Physical Systems, phone: +49 (0) 421 - 218 59 83 1, email: [email protected]
Prof. Dr. Thomas Kemmerich, University of Bremen, Computer Architecture Working Group, phone: +49 421 218 63 94 0, email: [email protected]
Dr. Karsten Sohr, Technology Center for Computer Science and Information Technology (TZI) at the University of Bremen, phone: +49 421 218 63 92 2, email: [email protected]
The image material is free to reprint for topic-related reporting and with the quotation of the respective picture credits.
Photo 1: All actors involved in container transport are networked with one another in a complex port communication network. The aim of the Bremen project "SecProPort" is to understand the entire handling process in the port and to make it safer and more robust. © WFB Jens Lehmkühler
Photo 2: "The game is unfair: the attacker only needs a gap, the defender has to find every gap," says Karsten Sohr from the TZI. © pixabay
The press service from the state of Bremen has been reporting monthly on people and stories from the state of Bremen with supraregional relevance published by the WFB Wirtschaftsförderung Bremen GmbH since July 2008. The press service from the state of Bremen works in a similar way to a correspondent's office. The articles are not advertising or PR texts, but authors' pieces written by journalists for journalists.
If you have any questions, just write an email to [email protected]
- How did you find your internship abroad?
- What is the most lucrative alternative investment
- China has its own religious books
- Will the electoral college benefit Republicans?
- What are the types of office
- Why do cats bite their owners?
- What foods contain corn oil
- Will I benefit from using a humidifier?
- Why do Singaporeans eat less beef
- New Zealand has unemployment
- How can directors be removed from shareholders?
- Could lower expectations lead to happier lives
- What is fish odor syndrome
- What was the biggest scandal about CNN
- Why do companies never hire overqualified candidates?
- What did you do last semester
- Are people who feel justified, miserable
- Can men wear women's jeans 1
- Why is Kuwait rich
- Do you think museums are very important
- How can socialism be improved
- Can a merchant marine officer settle abroad
- What is the simplest AP test
- Was the two-handed sword fight effective