29.01.2015 Views

Download as PDF - Secunet

Download as PDF - Secunet

Download as PDF - Secunet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The IT Security Report by<br />

Issue 1 | 2013<br />

Partnership for Security<br />

in Cyberspace<br />

Alliance for Cyber Security<br />

<strong>as</strong> a central information platform<br />

Incre<strong>as</strong>ed Security for<br />

P<strong>as</strong>sengers – including<br />

online<br />

Nicol<strong>as</strong> Hunloh, Team Leader<br />

Internet, Düsseldorf Int. Airport<br />

Automation is the Way<br />

Forward for Border Control<br />

secunet eGates securely manage<br />

incre<strong>as</strong>ing p<strong>as</strong>senger numbers at<br />

national borders<br />

Electronic management<br />

of cl<strong>as</strong>sified items without<br />

discontinuity of media<br />

SINA Workflow for security and<br />

compliance with regulations


The IT Security Report by<br />

Content<br />

National<br />

03 Local High-Quality IT Products<br />

for Local Users<br />

04 Partnership for Security in Cyberspace –<br />

Alliance for Cyber Security <strong>as</strong> a central<br />

information platform<br />

06 German Justice Plays it Safe<br />

08 Incre<strong>as</strong>ed Security for P<strong>as</strong>sengers –<br />

including online<br />

10 Challenges for PKI Systems<br />

in Vehicles<br />

International<br />

14 Automation is the Way Forward for<br />

Border Control<br />

Technologies & Solutions<br />

16 Electronic management of<br />

cl<strong>as</strong>sifi ed items without discontinuity<br />

of media<br />

09 Hackerstory #2<br />

Budget and Production Pressures<br />

<strong>as</strong> Risk Factors<br />

12 Preventive security #1<br />

FIFA World Cup Shoots Holes in IT System<br />

17 News in Brief<br />

secunet on Twitter, Xing and LinkedIn /<br />

New Agreement with National Government<br />

on IT Security Services / New Appointment<br />

at the BSI<br />

18 Events<br />

Dear Readers,<br />

irrespective of whether we operate in the public or private sector, we are<br />

all doing business more and more in cyber space; we are thus incre<strong>as</strong>ingly<br />

dependent on the secure and uninterrupted functioning of digital information<br />

and communication technologies. If we are to maintain security of information,<br />

data and processes on a permanent b<strong>as</strong>is, we must continuously adapt to<br />

the shifting level and nature of the threat posed by hackers and the methods<br />

they employ. The detailed exchange of information and experiences between<br />

industry, government agencies and experts not only facilitates a high degree<br />

of transparency but also makes the job of prevention e<strong>as</strong>ier for us all. One<br />

of the platforms for such exchanges is the Allianz für Cyber-Sicherheit (Alliance<br />

for Cyber Security) founded by the German Federal Offi ce for Information<br />

Security (BSI) and the Federal Association for Information Technology,<br />

Telecommunications and New Media (BITKOM). We spoke with Dr Hartmut<br />

Isselhorst from BSI about the aims and objectives of the Alliance.<br />

Here at secunet, we also intend to place the exchange of ide<strong>as</strong> with our<br />

customers on a more direct footing; consequently, we have undertaken an<br />

internal restructuring designed to make us more fl exible in the way we cater<br />

for your needs, <strong>as</strong>pirations and demands. We will thus be able to respond<br />

more effi ciently and quickly to current developments in the cyber world and to<br />

offer you, our customers, optimum proactive and innovative support <strong>as</strong> you<br />

rise to future challenges and implement new projects.<br />

- Our Public Sector (formerly High Security and Government Division) advises<br />

clients from the public sector and the defence industry both here in<br />

Germany and abroad, proposing current products and services that can<br />

be combined for specifi c circumstances <strong>as</strong> well <strong>as</strong> customised security<br />

solutions. These are fully compatible with any modern administration, they<br />

are capable of handling jobs at the highest level and they comply with highsecurity<br />

specifi cations for the protection of cl<strong>as</strong>sifi ed information.<br />

- Our Business Sector (formerly Business Security and Automotive Security<br />

Division) helps private business clients to fully exploit the potential of incre<strong>as</strong>ed<br />

digitisation and the <strong>as</strong>sociated electronic mapping of business processes,<br />

and also to securely map intelligent networks, mobile applications,<br />

IT-b<strong>as</strong>ed control of production/logistics operations and the digitisation<br />

of transport and traffi c systems.<br />

The are<strong>as</strong> in which we excel and our achievements to date are a matter of<br />

record. We now present some of the latest developments in this edition of<br />

secuview.<br />

I hope you enjoy reading our magazine.<br />

Best wishes<br />

19 Dates<br />

Dr Rainer Baumgart<br />

02 » 1 | 2013


National<br />

Local High-Quality<br />

IT Products for Local Users<br />

IT security technology ‘Made in Germany’ is being supplied<br />

direct to government agencies around the country<br />

Following the successful piloting of the federal government<br />

IT investment programme in 2010, the German Federal Office<br />

for Information Security (BSI) launched a follow-up project –<br />

‘Sondertatbestand’ – in 2012. The purpose of this is to support<br />

government agencies by simplifying the procurement process<br />

for IT security solutions, including the SINA range of products.<br />

This ensures not only that all data is optimally protected<br />

but also that cryptographic systems approved for the NfD<br />

(RESTRICTED) cl<strong>as</strong>sification become more widely established.<br />

cl<strong>as</strong>sified<br />

information<br />

Within the framework of the Sondertatbestand project, participating<br />

agencies received products at no extra expense for<br />

- interface control<br />

- hard disk encryption<br />

- encryption of mobile storage media<br />

- encrypted USB fl<strong>as</strong>h devices<br />

- securing mobile scenarios<br />

The use of a SINA workstation makes it e<strong>as</strong>y for authorities to<br />

securely access both uncl<strong>as</strong>sified and RESTRICTED data at<br />

any time and from any location, whether the operator is away<br />

on business or ‘teleworking’ from home.<br />

RESTRICTED<br />

Support close at hand<br />

SINA experts from secunet provided support to the various<br />

government IT departments in implementation, installation<br />

and on-site training. secunet support is then on call around<br />

the clock, seven days a week. It is a tremendous advantage<br />

when the experts are just a phone call away.<br />

When there is a total loss of IT service, it is important that<br />

response times are short and the correct action is taken. For<br />

this re<strong>as</strong>on, the Sondertatbestand project also includes a<br />

security consultancy element. secunet supports the participating<br />

agencies in complying with the criteria of the federal<br />

government action plan known <strong>as</strong> ‘UP-Bund’. This includes<br />

in particular me<strong>as</strong>ures to improve information security and the<br />

development of a continuity management plan.<br />

The BSI h<strong>as</strong> conceived the Sondertatbestand project <strong>as</strong> a way<br />

of making IT expertise available to individual authorities conveniently<br />

and without impacting on their budget. In this way,<br />

applicants procure internationally competitive products from<br />

national suppliers. And in any c<strong>as</strong>e, the German encryption<br />

industry enjoys a high reputation around the world. The evidence<br />

for this is in the many national and international projects<br />

that make use of encryption products from Germany.<br />

More information:<br />

Dirk Mangelmann<br />

dirk.mangelmann@secunet.com<br />

1 | 2013 « 03


National<br />

Partnership for Security in<br />

Cyberspace – Alliance for<br />

Cyber Security <strong>as</strong> a central<br />

information platform<br />

An Interview with Dr Hartmut Isselhorst of the BSI<br />

on the Alliance for Cyber Security<br />

secuview: The new Alliance for Cyber<br />

Security w<strong>as</strong> founded by the BSI (German<br />

Federal Office for Information<br />

Security) and BITKOM at the annual<br />

CeBIT trade show in March 2012. What<br />

w<strong>as</strong> the re<strong>as</strong>on for setting up such an<br />

organisation<br />

Dr Hartmut Isselhorst: Internet technologies<br />

in recent years have led to<br />

major advances in the IT and telecommunications<br />

industry. Indeed, information<br />

technology h<strong>as</strong> penetrated virtually<br />

all are<strong>as</strong> of our lives and every sector of<br />

the economy, making them an integral<br />

part of cyberspace today. As a result,<br />

value-added processes in the ‘real<br />

world’ are inextricably linked to the virtual<br />

world and are barely conceivable<br />

today without it. The challenge of<br />

making cyberspace more secure can<br />

now only be met through the combined<br />

efforts of business and industry, academia<br />

and the government. The Alliance<br />

for Cyber Security reflects this need for<br />

cooperation and serves <strong>as</strong> a platform<br />

for the exchange of knowledge and<br />

expertise in the field. Indeed, l<strong>as</strong>ting<br />

security can only be achieved if we<br />

continually revise our strategies for<br />

preventing, recognising and responding<br />

to security threats and the evolving<br />

methods of cyber criminals.<br />

secuview: The Alliance’s members include<br />

partners and members. How<br />

many companies joined the Alliance in<br />

2012, and what are the main re<strong>as</strong>ons for<br />

which individuals and business partners<br />

seek membership<br />

Dr Hartmut Isselhorst: We received<br />

an overwhelmingly positive response<br />

to the Alliance for Cyber Security, even<br />

„The Alliance offers a variety of<br />

services, including issuing warnings<br />

about current cyber threats,<br />

identifying best practices, unifying<br />

industry standards and providing<br />

security solutions for systems<br />

currently in use.“<br />

during the pilot ph<strong>as</strong>e. Since then, other<br />

noteworthy cyber security experts have<br />

joined our ranks, meaning that more<br />

than 200 companies and organisations –<br />

including 50 of partners – were active<br />

members of the Alliance for Cyber Security<br />

at the beginning of 2013.<br />

The Alliance offers a variety of services,<br />

including issuing warnings about current<br />

cyber threats, identifying best practices,<br />

unifying industry standards and<br />

providing security solutions for systems<br />

currently in use, <strong>as</strong> well <strong>as</strong> providing<br />

general recommendations on the se-<br />

Dr Hartmut Isselhorst,<br />

man in charge at the<br />

Department of Cyber<br />

Security of the BSI<br />

cure use of IT components. In addition<br />

to the above, the BSI publishes up-todate<br />

information regarding the ongoing<br />

security situation in cyberspace, thus<br />

enabling institutions to modify their<br />

activities accordingly. In order for this<br />

information to be <strong>as</strong> complete <strong>as</strong> possible,<br />

partners and individual members<br />

in the Alliance are also encouraged to<br />

report their own knowledge and findings<br />

regarding cyber attacks to the BSI.<br />

Finally, alongside acting <strong>as</strong> a central hub<br />

for information distribution, the Alliance<br />

seeks to promote direct knowledge<br />

exchanges in smaller groups such <strong>as</strong> in<br />

regional and industrial working groups<br />

or informal meetings.<br />

secuview: What security threats do you<br />

expect to emerge over the next few<br />

years, and what me<strong>as</strong>ures will the Alliance<br />

be implementing to counter them<br />

Dr Hartmut Isselhorst: The growing<br />

trend of using information services on<br />

the move is going to have a knock-on<br />

04 » 1 | 2013


National<br />

effect on cyberspace security threats.<br />

Smartphones and tablets are now established<br />

internet terminals, and their<br />

position in the market h<strong>as</strong> been<br />

strengthened by their integration into<br />

corporate IT systems – both formally<br />

and through BYOD policies. This h<strong>as</strong> incre<strong>as</strong>ed<br />

the attraction of these devices<br />

to cyber criminals and malware developers.<br />

The topic of ‘mobile malware’ will<br />

therefore remain on the agenda for the<br />

foreseeable future.<br />

Other<br />

organisations<br />

The Alliance for Cyber Security w<strong>as</strong> established in March 2012 by the<br />

Federal Office for Information Security (BSI) and BITKOM. This joint<br />

initiative acts <strong>as</strong> a platform for the sharing of information and experiences<br />

in the general area of cyber threats. At the international level,<br />

it promotes cross-border collaboration with other Alliance partners.<br />

BSI<br />

Government<br />

agencies<br />

Multipliers<br />

Businesses<br />

We are also preparing for attacks and<br />

attempted attacks against specific companies<br />

or institutions. Cyberspace is an<br />

attractive point of attack for criminals because<br />

it provides e<strong>as</strong>y access to potential<br />

targets and a myriad of opportunities<br />

for deception, <strong>as</strong> well <strong>as</strong> an incredibly<br />

diverse range of vulnerabilities which<br />

can be exploited. We expect hackers<br />

to draw on their experiences of launching<br />

targeted attacks in recent years to<br />

further improve their methods and carry<br />

out incre<strong>as</strong>ingly sophisticated attacks.<br />

We are also anticipating some positive<br />

developments, however. Indeed, whilst<br />

companies are still very reticent to disclose<br />

information about cyber attacks<br />

on their own systems, the BSI is incre<strong>as</strong>ingly<br />

hearing from companies willing to<br />

share their experiences in small groups.<br />

If this trend continues, it will most certainly<br />

help to raise user awareness and<br />

provide a more complete picture of the<br />

current security situation, thus serving<br />

to boost cyberspace’s ‘immune system’<br />

over the long term.<br />

secuview: Nowadays, the entire world<br />

is connected via the internet, and so attacks<br />

can be carried out from far beyond<br />

our national borders. Will the BSI also be<br />

working with the Alliance to contact and<br />

exchange information with other groups<br />

internationally<br />

Dr Hartmut Isselhorst: The international<br />

exchange of knowledge and expertise<br />

is indispensable when it comes to cyber<br />

security. Within the Alliance for Cyber<br />

Operators<br />

of critical<br />

infr<strong>as</strong>tructures<br />

Partners<br />

Security, this is achieved not only<br />

through the BSI’s various international<br />

partnerships, but also through the crossborder<br />

activities of the Alliance’s partner<br />

companies. The knowledge and expertise<br />

gained through this international cooperation<br />

contributes a great deal to the<br />

„In light of the overwhelmingly<br />

positive feedback received from<br />

companies involved in the Alliance<br />

for Cyber Security in 2012, we<br />

intend to continue implementing<br />

and building upon the organisation’s<br />

activities in 2013.“<br />

Alliance’s work and is always analysed<br />

and shared in such a way that it benefits<br />

all members <strong>as</strong> much <strong>as</strong> possible.<br />

In practical terms, the Alliance for Cyber<br />

Security’s partners and key communicators<br />

can also contribute by upholding<br />

knowledge exchange between the Alliance<br />

and international groups or initiatives<br />

abroad.<br />

secuview: One final question: What’s<br />

next for the Alliance in 2013<br />

Dr Hartmut Isselhorst: In light of the<br />

overwhelmingly positive feedback received<br />

from companies involved in the<br />

Alliance for Cyber Security in 2012, we<br />

Other<br />

institutions of<br />

particular interest to<br />

the state (INSI)<br />

intend to continue implementing and<br />

building upon the organisation’s activities<br />

in 2013. In my view, it is important<br />

to always keep in mind the expectations<br />

that are communicated to the BSI in the<br />

course of major events and private discussions.<br />

This is why we will be organising<br />

more industry-specific events for<br />

various target groups in 2013 – to raise<br />

awareness of cyber security issues on<br />

the one hand, and to maintain a direct<br />

dialogue with and between companies<br />

on the other. We have started the ball<br />

rolling this year with the first ever Cyber<br />

Security Day for members of the Alliance<br />

in January. In February, this event h<strong>as</strong><br />

been followed by a major conference<br />

in partnership with the logistics industry<br />

and knowledge exchange across<br />

different sector. We also have several<br />

other events in the pipeline. In addition<br />

to the above, I am very much looking<br />

forward to the numerous contributions<br />

recently announced by our partners<br />

which will create significant added value<br />

for all of the Alliance for Cyber Security’s<br />

members.<br />

secunet is a partner company in<br />

the Alliance for Cyber Security<br />

and draws on the extensive<br />

knowledge and expertise of its<br />

IT security specialists to support<br />

the organisation’s members.<br />

1 | 2013 « 05


National<br />

German Justice<br />

Plays it Safe<br />

secunet connects Bavaria to S.A.F.E.<br />

central registry<br />

The introduction of mandatory electronic commercial<br />

registration in 2007 coincided with the launch of a new communication<br />

infr<strong>as</strong>tructure in the German judicial system. The<br />

opportunity of having direct access to courts and authorities<br />

via EGVP proved hugely popular right from the start; in fact,<br />

projected user numbers were far exceeded after only three<br />

months in operation. Because everyone registering <strong>as</strong> an<br />

EGVP user is <strong>as</strong>signed a unique mailbox address by the identity<br />

management system and this data must be constantly<br />

replicated to all other active EGVPs in the system, the registration<br />

service is of paramount importance.<br />

What is EGVP<br />

The electronic legal and administrative mailbox, in Germany known <strong>as</strong><br />

EGVP (Elektronisches Gerichts- und Verwaltungspostfach), can be used<br />

by courts and government authorities in communication with each other<br />

<strong>as</strong> well <strong>as</strong> with other parties to certain judicial proceedings (e. g. lawyers,<br />

notaries, businesses and private citizens) for the safe, legal and effi cient<br />

transmission of messages, documents and pleadings in the OSCI format<br />

(Online Services Computer Interface). EGVP automatically encrypts the<br />

entire data exchange. Messages can also have fi les attached and, if<br />

necessary, bear an electronic signature. This speeds up legal processes,<br />

and all parties benefi t from the incre<strong>as</strong>ed effi ciency. No wonder then that<br />

more than 40,000 parties to proceedings in all 16 federal states and in<br />

most federal courts in Germany are making use of the EGVP, a trend that<br />

is even expected to grow further.<br />

Separation of registration process<br />

from EGVP: S.A.F.E.<br />

In order to be optimally positioned in the future in terms of<br />

performance and interfaces, the Bund-Länder-Kommission<br />

für Datenverarbeitung und Rationalisierung in der Justiz (Joint<br />

Federal and State Commission for Data Processing and Rationalisation<br />

in Judicial Processes) h<strong>as</strong> prescribed the architecture<br />

of a federated identity management system for the<br />

German judiciary. This goes by the name of ‘Secure Access<br />

to Federated E Justice / E Government’, or S.A.F.E. for short.<br />

The underlying idea is essentially straightforward: the ‘Identity<br />

Providers’ which are spread out over a number of different<br />

domains are combined on a single platform and are addressed<br />

via standard interfaces. The so-called ‘Trust Domain’ (TD) is<br />

the central structuring element. This consists of a set of services<br />

and service users that co-exist in a mutual trust relationship.<br />

It ensures a unified communications infr<strong>as</strong>tructure<br />

within the justice system that operates across federal state<br />

boundaries.<br />

06 » 1 | 2013


National<br />

Bavaria creates own Trust Domain<br />

Up to now, there h<strong>as</strong> been a centralised S.A.F.E. identity<br />

management system operating from the data centre in North<br />

Rhine-Westphalia, which is responsible for<br />

the mailboxes of user parties in all the<br />

federal states. Bavaria h<strong>as</strong> now become<br />

the first German federal state to set up<br />

its own trust domain which is operated<br />

in its own data centre. This means that<br />

the management of Bavarian identities<br />

takes place regionally, thus<br />

restoring data sovereignty.<br />

sources that store information about the digital identities<br />

of users and their operational role. secunet also took on the<br />

t<strong>as</strong>k of integrating the technical b<strong>as</strong>is – the Oracle Identity<br />

Management Suite – into the existing infr<strong>as</strong>tructure.<br />

Flexible and fit for the future<br />

The Bavarian justice system is already in a position to communicate<br />

confidentially via S.A.F.E. in such administrative<br />

are<strong>as</strong> <strong>as</strong> the central register of wills or the electronic land<br />

registry. Thanks to its open and highly scalable architecture,<br />

many more administrative procedures, citizen portals and<br />

e-government services will follow in the near future.<br />

In this matter the Bavarian justice<br />

relied on comprehensive <strong>as</strong>sistance<br />

from secunet, the IT security<br />

experts have provided<br />

organisational and technical<br />

support to the IT officers of<br />

the Bavarian judiciary who<br />

are b<strong>as</strong>ed at the Munich<br />

Higher Regional Court<br />

in the planning, design<br />

and implementation of<br />

the S.A.F.E. compliant<br />

trust domain ‘Justiz<br />

Bayern’. This involved<br />

the analysis of the<br />

administrative procedures<br />

and of the<br />

user groups that are<br />

to be integrated in<br />

the preliminary stage<br />

<strong>as</strong> well <strong>as</strong> the analysis<br />

and evaluation of the data<br />

More information:<br />

Norbert Müller<br />

norbert.mueller@secunet.com<br />

1 | 2013 « 07


National<br />

Incre<strong>as</strong>ed Security<br />

for P<strong>as</strong>sengers –<br />

including online<br />

Nicol<strong>as</strong> Hunloh, Team Leader Internet,<br />

Düsseldorf International Airport<br />

The air transport hub of Flughafen Düsseldorf handles over<br />

20 million p<strong>as</strong>sengers per year, making it the largest airport<br />

in North Rhine-Westphalia. 70 airlines operate here, serving<br />

more than 190 destinations. Located in one of Europe’s<br />

strongest-performing economic regions, with 18 million<br />

people living within a radius of 100 kilometres, Düsseldorf<br />

International plays a key role in fulfilling the mobility needs of<br />

private individuals and businesses in the federal state of North<br />

Rhine-Westphalia and the south-e<strong>as</strong>t of the Netherlands.<br />

Furthermore, <strong>as</strong> the largest single employer in Düsseldorf<br />

with a workforce of around 19,700, the airport h<strong>as</strong> a major<br />

impact on the jobs market in NRW.<br />

As traffic h<strong>as</strong> incre<strong>as</strong>ed over recent years, the corporate<br />

website h<strong>as</strong> had to adapt and grow to meet the demands<br />

of p<strong>as</strong>sengers <strong>as</strong> well <strong>as</strong><br />

those who are picking<br />

them up from the airport<br />

and other target groups.<br />

These users visit the site to<br />

check flight times,<br />

to find out about<br />

local conditions,<br />

to reserve parking<br />

spaces, to retrieve<br />

general information<br />

about the airport,<br />

and much more<br />

besides. The website<br />

is thus a main<br />

point of contact for<br />

By undertaking regular<br />

security checks, including<br />

around 11 million<br />

its online platforms,<br />

users per year.<br />

Düsseldorf airport<br />

upholds consistently high<br />

security standards.<br />

Various extranets<br />

provide B2B partners<br />

and customers<br />

with helpful<br />

tools. Data that is<br />

stored there requires<br />

secure protection.<br />

Flughafen<br />

Düsseldorf GmbH<br />

therefore took the<br />

decision in 2012<br />

to submit its main<br />

corporate website<br />

<strong>as</strong> well <strong>as</strong> those<br />

of its subsidiaries<br />

to an extensive security check. Their<br />

search for a professional, flexible and<br />

reliable service provider quickly brought<br />

them to secunet.<br />

For the operator, it is particularly important<br />

that the standards which are<br />

rigorously adhered to in the everyday<br />

working environment of the airport’s offline sector (where<br />

security is at a premium) apply equally to its website. Because<br />

even data on p<strong>as</strong>sengers and partners requires the protection<br />

of a highly secure and efficient infr<strong>as</strong>tructure against<br />

externally launched attempts to gain unauthorised access.<br />

The secunet team therefore set about identifying potential<br />

vulnerabilities using a detailed penetration test and applying<br />

recognised standards with particular reference to OWASP<br />

Top 10 2012. In order to avoid overloading the server infr<strong>as</strong>tructure<br />

during the procedure, the tests were conducted<br />

during the low-traffic period between 11pm and 6am.<br />

08 » 1 | 2013


News in Brief<br />

HACKERSTORY #2<br />

Budget and<br />

Production Pressures<br />

<strong>as</strong> Risk Factors<br />

In many companies, security h<strong>as</strong> become an integral part<br />

of the production process. In the course of penetration tests,<br />

secunet nonetheless continues to identify critical vulnerabilities<br />

in internal systems that threaten the organisation’s<br />

security and, in the worst-c<strong>as</strong>e scenario, its most vital<br />

functions.<br />

In subsequent discussions with the relevant system administrators,<br />

it will usually transpire that the vulnerabilities<br />

have already been recognised, though not necessarily their<br />

potential impact. These vulnerabilities are consciously<br />

accepted, since the affected system is directly involved in<br />

critical business processes and not every company h<strong>as</strong> a<br />

sophisticated staging process whereby changes can be<br />

tested on multiple pre-production systems. The decisionmakers<br />

are confronted with a dilemma: in order to incre<strong>as</strong>e<br />

system security, a temporary reduction in functionality h<strong>as</strong><br />

to be accepted. Subsequent corrective me<strong>as</strong>ures – if at all<br />

fe<strong>as</strong>ible – result in correspondingly high costs. Yet failure to<br />

take the necessary action could ultimately lead to substantially<br />

higher costs.<br />

The results were then presented in the form of a detailed<br />

report, with me<strong>as</strong>ures identified for optimisation then being<br />

implemented within a short time by the specialist departments<br />

of Flughafen Düsseldorf GmbH and its service providers.<br />

At the same time, the company used the project to<br />

introduce new mandatory security standards at all levels.<br />

Flughafen Düsseldorf GmbH h<strong>as</strong> expressed its intention to<br />

call on secunet’s anti-hacking expertise in future.<br />

However, if IT security teams are involved at the planning<br />

ph<strong>as</strong>e of a new application, these problems can at le<strong>as</strong>t be<br />

minimised. If, at an early stage, IT security is considered<br />

of equal importance to functionality, this can obviate the<br />

need for complex re-designs or bug fixing in the finished<br />

product.<br />

More information:<br />

Dirk Reimers<br />

dirk.reimers@secunet.com<br />

More information:<br />

Christian Reichardt<br />

christian.reichardt@secunet.com<br />

IN THE NEXT ISSUE:<br />

The Trojan Mouse<br />

1 | 2013 « 09


National<br />

Challenges for PKI Systems<br />

in Vehicles<br />

Conventional solutions are not enough<br />

Because of the special nature of the clients<br />

(vehicles, charging infr<strong>as</strong>tructure, traffic<br />

signals etc) which – unlike the computers in<br />

the company network – are not constantly<br />

reachable and which to some extent have<br />

much longer life cycles, they make specific<br />

requirements of their PKI systems that do<br />

not apply to most company PKIs. Similarly,<br />

specifications for Car2Car communication or<br />

Plug&Charge in the c<strong>as</strong>e of e-mobility define<br />

precisely what a PKI is expected to do.<br />

PKI systems have long been an established feature of inhouse<br />

networks and the internet. B<strong>as</strong>ed on <strong>as</strong>ymmetric cryptography,<br />

authentication mechanisms have been created with<br />

which more people work than you might imagine. Whether for<br />

online banking, remote login to the corporate network from a<br />

home office or even the new German national identity card, a<br />

PKI working away in the background is generally responsible<br />

for secure communication.<br />

More recently, various applications requiring a PKI have been<br />

introduced in vehicles:<br />

- digital tachographs<br />

- securing diagnostic access and information consistent<br />

with Euro 5 and Euro 6<br />

- securing onboard fl<strong>as</strong>hware for vehicle programming<br />

- securing TeleX services such <strong>as</strong> remote diagnostics and<br />

programming<br />

- internet in the vehicle<br />

- Car2Car communication<br />

- Plug&Charge for e-mobility<br />

For example, procedures and processes<br />

must be introduced to take into account<br />

the fact that parts of the PKI system may<br />

be available for online communication only<br />

on an intermittent b<strong>as</strong>is. The distribution of<br />

revocation information is just one example of<br />

this problem. In a PKI for Car2Car or Car2X<br />

communication, the number of subscribers can rise exponentially.<br />

There will be hundreds of CA systems and millions of<br />

vehicles all around the world that have to be supplied with key<br />

material and certificates, and at the same time, data privacy<br />

protection legislation will require that each vehicle is equipped<br />

with several hundreds or even thousands of certificates.<br />

Car manufacturers may already be aware of some of these<br />

problems <strong>as</strong> a result of similar issues with their own company<br />

PKIs for employee badges or SSL certificates for web<br />

services. Nevertheless, these new special c<strong>as</strong>es present them<br />

with unprecedented challenges in the management of cryptographic<br />

keys and certificates that cannot be resolved with the<br />

already established processes of introduced PKI systems and<br />

therefore require new approaches to the issue of PKI.<br />

More information:<br />

Andre<strong>as</strong> Ziska<br />

andre<strong>as</strong>.ziska@secunet.com<br />

10 » 1 | 2013


National<br />

What a PKI does<br />

PKI involves more than just technology; it is also a question of infr<strong>as</strong>tructure and<br />

processes. At the heart of the matter is key management, with the complete lifecycle<br />

of cryptographic keys and/or certifi cates. The main t<strong>as</strong>ks to be performed<br />

by a PKI are:<br />

Key generation – determination of algorithms, the type of key generation<br />

(central <strong>as</strong> opposed to decentralised) and the processes for certifi cation of the<br />

public key <strong>as</strong> well <strong>as</strong> the identifi cation data of the certifi cate holder.<br />

Key distribution / Directory – the distribution of public keys and/or certifi -<br />

cates takes place via directory services such <strong>as</strong> LDAP. For the <strong>as</strong>signment of<br />

private keys, secure distribution paths or media are used.<br />

Blocking management / Revocation – for revoking a certifi cate (in c<strong>as</strong>e of<br />

a lost key or loss of confi dence), technical mechanisms such <strong>as</strong> revocation<br />

lists (CRLs) or online services (OCSP) are used. The CA operator receives the<br />

revocation requests, reviews and authorises them, revokes the certifi cate and<br />

publishes the revocation information.<br />

Key recovery / Destruction – by means of key recovery, data can be read and<br />

verifi ed even if key material h<strong>as</strong> been lost. In addition, old or invalid key material<br />

is securely deleted.<br />

Key exchange (root, CA, client) – appropriate processes (e. g. online provisioning,<br />

the replacement of a secure element or mobile with NFC technology)<br />

specifi cally ensure the secure exchange of the public root and CA keys. There<br />

must be safeguards against a hacker insinuating his own root keys.<br />

Blocking management /<br />

Revocation (CRL / OCSP)<br />

Key recovery /<br />

Destruction<br />

Key generation<br />

Key distribution /<br />

Directory<br />

Key exchange<br />

(root, CA, client)<br />

Example of an eMob PKI complying with ISO 15118<br />

eMob Root CA<br />

Already established because of<br />

the applicable standardisation<br />

regulations for smart metering<br />

in Germany<br />

optional<br />

optional<br />

EV OEM<br />

Root CA<br />

Energy supplier<br />

Root CA<br />

Charging supplier<br />

Root CA<br />

Meter<br />

Root CA<br />

Daimler<br />

BMW<br />

AUDI RWE EnBW e.on A B<br />

C<br />

A<br />

B<br />

C<br />

Vehicle certificates Contract certificates Charging station certificates SmartMeter certificates<br />

The companies named here have been chosen <strong>as</strong> examples only. This should not<br />

be taken <strong>as</strong> an indication of which ones will eventually appear under eMob Root CA.<br />

1 | 2013 « 11


National<br />

PREVENTIVE SECURITY #1<br />

Preventive security is in this respect a key concept: specific organisational, infr<strong>as</strong>tructural, technical and<br />

staffing strategies that are tailored to individual circumstances and to constructing a defence that kicks<br />

in before something bad happens. In subsequent issues of secuview, you can read interesting and sometimes<br />

even amusing c<strong>as</strong>e studies (anonymised, of course) compiled by our secunet experts.<br />

FIFA World Cup<br />

Shoots Holes in<br />

IT System<br />

Directives from above defeat even the best<br />

technical defences<br />

There are many IT systems that, technically speaking, are well<br />

protected. But unfortunately, these too fall victim to elementary<br />

attacks because individually appropriate organisational<br />

processes have not been implemented or upheld.<br />

“How could they overcome the formidable barriers that we<br />

now have in place The way they were byp<strong>as</strong>sed makes us<br />

look like amateurs!” Unfortunately, this quote is genuine and<br />

the circumstances that permitted this successful IT attack are<br />

by no means exceptional. The technology and the administrators<br />

really were high calibre. The problem lay entirely elsewhere.<br />

The vulnerability w<strong>as</strong> caused by the instruction issued<br />

by a senior executive to allow certain IT services during the<br />

World Cup so that he could follow games live on his PC.<br />

Although the administrators expressly advised of the <strong>as</strong>sociated<br />

security risks, the desire of this senior person to watch<br />

the matches live at work obviously outweighed the concerns<br />

of the lower-ranking technical staff. The expert in this c<strong>as</strong>e –<br />

i. e. the system administrator – had no recourse against the<br />

decision.<br />

This real-life scenario is by no means exceptional. secunet<br />

is often called out to deal with emergencies that have been<br />

caused by the absence of organisational security me<strong>as</strong>ures.<br />

In the c<strong>as</strong>e cited above, a clearly defined and auditable documented<br />

process that gave the administrator suitable veto<br />

rights would have helped to uphold the high level of security<br />

afforded by the systems in place. It would then have been<br />

possible to take secure and responsible action, overriding the<br />

personal preferences of the boss.<br />

Security must be integral to<br />

corporate culture<br />

Experience h<strong>as</strong> shown that, although many government agencies<br />

and private businesses have put appropriate security<br />

me<strong>as</strong>ures in place, these are not upheld rigorously due to the<br />

organisational <strong>as</strong>pects of information security. At the same<br />

time, however, there is no shortage of standards and best<br />

practices to provide support here. For example, the IT security<br />

management standards typified by the ISO 27000 family and<br />

those implemented in accordance with BSI b<strong>as</strong>eline protection<br />

or the recommendations of ITIL (IT Infr<strong>as</strong>tructure Library) and<br />

COBIT (Control Objectives for Information and Related Technology).<br />

secunet experts with many years of experience are<br />

available to support any appropriate customisation or tailored<br />

implementation.<br />

More information:<br />

René Seydel<br />

rene.seydel@secunet.com<br />

IN THE NEXT ISSUE:<br />

Well confi gured – one click for enhanced security<br />

12 » 1 | 2013


Neben dem Beruf zum<br />

Bachelor & M<strong>as</strong>ter<br />

Bachelor-Abschlüsse:<br />

Europäische BWL (B.A.)<br />

Wirtschaftspsychologie (B.A.)<br />

Finance & Mangement (B.Sc.)<br />

Logistikmanagement (B.Sc.)<br />

Wirtschaftsrecht (LL.B.)<br />

M<strong>as</strong>ter-Abschlüsse:<br />

Wirtschaftspsychologie (M.Sc.)<br />

Business Coaching &<br />

Change Management (M.A.)<br />

MBA<br />

Hochschulkurse mit Zertifikat<br />

Jetzt<br />

4 Wochen<br />

kostenlos<br />

testen!<br />

Jederzeit starten<br />

Freie Zeiteinteilung<br />

Ortsunabhängig per Fernstudium<br />

Jetzt informieren:<br />

www.Euro-FH.de 0800 / 33 44 377<br />

(gebührenfrei)<br />

Infos anfordern:<br />

600 AA


International<br />

Automation is the Way<br />

Forward for Border Control<br />

secunet eGates securely manage incre<strong>as</strong>ing p<strong>as</strong>senger numbers at national borders<br />

Globalisation h<strong>as</strong> led to a steady incre<strong>as</strong>e in private and professional<br />

mobility. Short-haul flights have become an attractive<br />

alternative to travelling by train or car. For airports, this means<br />

that more and more p<strong>as</strong>sengers have to be cleared on arrival.<br />

The International Air Transport Association (IATA) estimates<br />

that, in 2013, the milestone of three billion p<strong>as</strong>sengers worldwide<br />

will be exceeded. 1 This development poses multiple challenges<br />

for airports, <strong>as</strong> p<strong>as</strong>sengers should not be expected to<br />

wait in unre<strong>as</strong>onably long queues to p<strong>as</strong>s through the security<br />

gate or border control. At the same time, security considerations<br />

must under no circumstances be compromised <strong>as</strong> the<br />

threat of terrorism remains acute<br />

The solution lies in biometric data<br />

A good option for managing incre<strong>as</strong>ed p<strong>as</strong>senger volume<br />

at borders is to provide electronic control gates – so-called<br />

‘Automated Border Control Systems’ or eGates for short.<br />

Utilising the biometric data stored in electronic travel documents<br />

(e.g. the digitised facial image of the traveller),<br />

eGates allow partial automation of border control<br />

processes whilst retaining the same high level of<br />

security: When the p<strong>as</strong>sport is placed on the document<br />

reader, its electronic and optical security features<br />

are checked and the biometric data is read.<br />

P<strong>as</strong>sengers authorised to use the system can then<br />

step into the eGate. Here, a camera integrated into<br />

the exit door automatically takes a photo of the<br />

traveller’s face. This data is then compared to the<br />

p<strong>as</strong>sport-picture read before. If the biometric data<br />

matches, the p<strong>as</strong>senger is cleared to p<strong>as</strong>s, i. e. to<br />

cross the border.<br />

As the eP<strong>as</strong>sport is read and the<br />

p<strong>as</strong>senger’s face is scanned, the<br />

same data is also displayed on<br />

the immigration control officer’s<br />

monitor.<br />

The process offers significant benefits to all parties<br />

involved: on the one hand, it reduces queuing time for<br />

p<strong>as</strong>sengers and airport operators benefit from optimised<br />

p<strong>as</strong>senger flows; on the other hand, border<br />

police officers get valuable support without losing<br />

control over the process.<br />

1<br />

See http://www.iata.org/pressroom/facts_figures/Documents/<br />

economic-outlook-media-day-dec2012.pdf<br />

14 » 1 | 2013


International<br />

secunet’s face recognition<br />

technology<br />

makes use of a smart<br />

camera integrated<br />

into the exit door.<br />

Adaptive LED lights<br />

provide optimum<br />

levels of illumination.<br />

secunet eGates<br />

are already in<br />

operational use<br />

<strong>as</strong> part of the<br />

E<strong>as</strong>yPASS and<br />

E<strong>as</strong>yGO projects.<br />

Pioneering work to provide<br />

sustainable solutions<br />

As a pioneer in this field, secunet w<strong>as</strong> commissioned in late<br />

2007 by the German Federal Office for Information Security<br />

(BSI) to take on the design and implementation of the<br />

E<strong>as</strong>yPASS eGate solution at Frankfurt Airport. Following its<br />

successful operational launch, the secunet experts have made<br />

it available for use with the new German ID card. This h<strong>as</strong> not<br />

only set the benchmark for the future design of immigration<br />

control systems at German airports but h<strong>as</strong> also convinced<br />

the Czech border police: going by the name of E<strong>as</strong>yGO, the<br />

automated border control system w<strong>as</strong> implemented at Prague’s<br />

Vaclav Havel airport in late 2012, and after only a twelve-month<br />

pilot period, it h<strong>as</strong> been incorporated into day-to-day operation<br />

and h<strong>as</strong> even been extended.<br />

The evident advantages and positive experience of automated<br />

border control have won over airport operators and border<br />

police in equal me<strong>as</strong>ure. Experts agree that the trend in<br />

coming years at national and international airports will be<br />

towards further automation of border control. Years of experience<br />

coupled with the ‘Made in Germany’ label – perceived<br />

around the world <strong>as</strong> a hallmark of quality – mean that secunet<br />

eGates are set to play a crucial role.<br />

More information:<br />

Georg H<strong>as</strong>se<br />

georg.h<strong>as</strong>se@secunet.com<br />

What makes the solution from<br />

secunet so unique<br />

The decisive USP of eGate solutions from secunet is the modu-<br />

lar approach: The unique flexibility of this complex system is<br />

made possible by secunet biomiddle, a software that acts <strong>as</strong><br />

an intermediary between client applications and the various<br />

biometric technologies. Due to this original components can<br />

be updated at any time and further devices can be added.<br />

The Automated Border Control System sets standards in other<br />

ways; for example, the BSI acting <strong>as</strong> an independent body<br />

h<strong>as</strong> verified its security and reliability. Furthermore, the system<br />

is characterised by exceptional user-friendliness. The entire<br />

process is adapted to the natural flow of the p<strong>as</strong>sengers who<br />

are given clear step-by-step guidance <strong>as</strong> they p<strong>as</strong>s through<br />

the system. High acceptance and rapid, straightforward processing<br />

are thus guaranteed.<br />

The benefi ts of<br />

secunet eGates at a glance<br />

Secure<br />

- BSI-approved security and reliability of the system by means of<br />

- Testing of the optical and electronic security features<br />

- Biometric comparison at a high level of security<br />

- Monitoring by immigration control offi cers<br />

Economical<br />

- Airports are able to process a higher volume of p<strong>as</strong>sengers<br />

through the same physical area<br />

- Investment protected thanks to modular and standard<br />

architecture of the overall system<br />

F<strong>as</strong>t<br />

- Conventional immigration controls are relieved by partial<br />

automation and thereby accelerated<br />

- Travellers are guided intuitively through the gate, thus reducing<br />

the length of queues<br />

1 | 2013 « 15


Technologies & Solutions<br />

Electronic management of cl<strong>as</strong>sified<br />

information without discontinuity of media<br />

SINA Workflow for security and compliance with regulations<br />

Anyone who h<strong>as</strong> experience of working with cl<strong>as</strong>sified<br />

electronic data and processes is familiar with<br />

the dilemma of complying with VSA (the national<br />

regulations governing cl<strong>as</strong>sified information) while<br />

still coping with the job in hand. This conflict h<strong>as</strong><br />

incre<strong>as</strong>ed steadily over recent years, because<br />

the existing regulations were originally conceived<br />

for an age in which everything w<strong>as</strong> committed to<br />

paper. But rapidly incre<strong>as</strong>ing information flows<br />

have long since made electronic processing indispensable,<br />

and there are currently no software<br />

systems which have been approved and are sufficiently<br />

productive to be used for VSA-compliant<br />

processing.<br />

SINA Workflow represents a comprehensive, VSA-compliant<br />

solution to the aforementioned dilemma:<br />

- The compilation, processing and distribution of cl<strong>as</strong>sified<br />

data takes place without any discontinuity of media<br />

- Unlike other solutions, SINA workflow does not merely<br />

address individual <strong>as</strong>pects of VSA<br />

- There is a logical, cryptographically secured enforcement<br />

of the ‘Need to Know’ principle<br />

- Uncontrolled outflow of cl<strong>as</strong>sified data is prevented<br />

- Every activity that VSA requires to be verified is securely<br />

logged to legal audit standard<br />

SINA Workflow comprises central registry, control and storage<br />

systems <strong>as</strong> well <strong>as</strong> remote clients b<strong>as</strong>ed on the SINA<br />

Workstation.<br />

The complete lifecycle of cl<strong>as</strong>sified documents and operations<br />

is mapped, so that a user is supported and guided<br />

through the system right from the start. The creation of a draft<br />

cl<strong>as</strong>sified document takes place within a SINA Workflowspecific<br />

session on a SINA Workstation. When the draft of the<br />

cl<strong>as</strong>sified item is registered, it is encrypted and saved to a<br />

Using<br />

SINA Workstation<br />

for cl<strong>as</strong>sified<br />

information<br />

central location. From that point onwards, other contributors<br />

can be allowed access to the draft cl<strong>as</strong>sified document. In this<br />

way, SINA Workflow guarantees VSA-compliant processing of<br />

cl<strong>as</strong>sified documents within a group and also offers support<br />

for addenda and co-signing processes. After the completion<br />

and registration of the finalised item, the cl<strong>as</strong>sified document<br />

itself can then be distributed. Cl<strong>as</strong>sified documents can, of<br />

course, also be printed or exported.<br />

In addition to supporting users, SINA Workflow also <strong>as</strong>sists<br />

system administrators, e.g. by automatically keeping a log, or<br />

by generating an inventory of cl<strong>as</strong>sified documents.<br />

Work is in progress with a German federal government office<br />

on the prototypical installation and integration of SINA Workflow<br />

into the existing network infr<strong>as</strong>tructure.<br />

More information:<br />

Peter Janitz<br />

peter.janitz@secunet.com<br />

SINA Workflow is able to map the entire lifecycle<br />

of cl<strong>as</strong>sified documents and processes.<br />

This now facilitates electronic, VSA-compliant<br />

processing of cl<strong>as</strong>sified information.<br />

Subscribe to secuview<br />

Would you like to receive secuview on a regular b<strong>as</strong>is, free of charge<br />

Ple<strong>as</strong>e choose between the print and electronic versions and subscribe at https://www.secunet.com/en/the-company/it-security-report-secuview.<br />

There you can also change your preference or unsubscribe.<br />

Illustrations: Cover People: plainpicture/OJO; S. 3 (Ordner), 6, 7, 12: shutterstock.com; Airport Düsseldorf S. 8 - 9: Andre<strong>as</strong> Wiese; S. 10: iStockphoto.com;<br />

S. 19: EUROFORUM Deutschland SE. Others: secunet.<br />

16 » 1 | 2013


News in Brief<br />

secunet on Twitter, Xing and LinkedIn<br />

Social media have not only changed<br />

the way we interact with each other <strong>as</strong><br />

individuals but have also become an essential<br />

means of communication in the<br />

business world. In 2012, we extended<br />

our online presence to Twitter, Xing and<br />

LinkedIn, aiming to use these media<br />

to incre<strong>as</strong>e our availability to secunet<br />

customers and partners, and to explore<br />

with them the issues of the moment surrounding<br />

IT security.<br />

Via our corporate profiles on the Xing<br />

and LinkedIn business platforms, we<br />

offer existing and future customers <strong>as</strong><br />

well <strong>as</strong> potential recruits to our ranks a<br />

quick and convenient way of getting in<br />

touch with us.<br />

Professional <strong>as</strong>sociations and the German<br />

Federal Chancellery have long had<br />

their own presence here. We are now<br />

using our Twitter page – @secunet_AG –<br />

to inform our customers and other interested<br />

users about the latest developments<br />

in the world of IT security. We go<br />

beyond relaying news from and about<br />

our own company, picking up on a wide<br />

range of IT security issues <strong>as</strong> these<br />

affect the private and public sectors. We<br />

publish up-to-the-minute alerts on current<br />

security vulnerabilities and engage<br />

in a fruitful exchange of views and opinions<br />

with the online communities.<br />

Visit our website at www.secunet.com<br />

and follow us on Twitter at @secunet_AG<br />

This QR code will<br />

take you directly to<br />

our Twitter page:<br />

http://www.twitter.com/<br />

secunet_AG<br />

New Federal Framework<br />

Agreement on IT Security<br />

Services<br />

New Appointment<br />

at the<br />

BSI<br />

Since August 2012, federal authorities<br />

have been able to call on secunet to<br />

provide IT security services under the<br />

terms of two new framework agreements<br />

with the German Federal Office<br />

for Information Security (BSI). In <strong>as</strong>sociation<br />

with HiSolutions AG, secunet w<strong>as</strong><br />

once again successful in its bid for the<br />

contract to supply IT security consulting<br />

services to the German federal government.<br />

The new agreements cover general<br />

consulting services for IT security<br />

in federal authorities, consultancy in the<br />

field of e-government t<strong>as</strong>ks and projects,<br />

the implementation of security<br />

audits and reviews, and the drafting of<br />

IT security and emergency concepts.<br />

secunet will further be supporting the<br />

federal government in the performance<br />

of security analyses designed to identify<br />

and resolve vulnerabilities in IT systems<br />

and processes. More information can<br />

be found on the federal government’s<br />

online procurement portal Kaufhaus<br />

des Bundes at https://www.kd-bund.de<br />

(NB: access only with certificate) and<br />

on the federal government intranet at<br />

http://kdb.intranet.bund.de.<br />

More information:<br />

Dirk Ossenbrüggen<br />

dirk.ossenbrueggen@secunet.com<br />

Federal Office<br />

for Information Security<br />

With effect from 1st January 2013,<br />

Andre<strong>as</strong> Könen is the new Vice-President<br />

of the BSI. His predecessor in the<br />

office, Horst Flätgen, h<strong>as</strong> moved to the<br />

Federal Ministry of Finance. Könen’s<br />

previous role w<strong>as</strong> <strong>as</strong> Director of Advice<br />

and Coordination. In previous years,<br />

he held responsibility for the are<strong>as</strong> of<br />

Coordination and Control <strong>as</strong> well <strong>as</strong><br />

Security in Applications and Critical<br />

Infr<strong>as</strong>tructures. The new man in charge<br />

at the Department of Advice and Coordination<br />

is Horst Samsel.<br />

Imprint<br />

Editor<br />

secunet Security Networks AG<br />

Kronprinzenstraße 30<br />

45128 Essen, Germany<br />

www.secunet.com<br />

Responsible in terms of the<br />

press law: Christine Skropke,<br />

christine.skropke@secunet.com<br />

Chief Editor: Claudia Roers,<br />

claudia.roers@secunet.com<br />

Chief Conception & Design<br />

Dominik Maoro,<br />

dominik.maoro@secunet.com<br />

Design<br />

www.knoerrich-marketing.de<br />

Copyright: © secunet Security Networks AG. All rights reserved. All contents and structures are copyright protected. All and any use not<br />

expressly permitted by copyright law requires prior written permission.<br />

1 | 2013 « 17


Events<br />

Lively exchange of views at it-sa<br />

Cornelia Rogall-Grothe (Federal Government Commissioner<br />

for Information Technology and Secretary of State in the Ministry<br />

of the Interior) joined Franz Josef Pschierer (Bavarian State<br />

Government Commissioner for Information Technology and<br />

State Secretary of the Bavarian Ministry of Finance) in a visit to<br />

the secunet stand at the it-sa trade fair held in October 2012.<br />

Cornelia Rogall-Grothe<br />

deep in discussion<br />

with secunet CEO<br />

Dr Rainer Baumgart<br />

(second from left)<br />

IT Summit Working Group 4 visits secunet<br />

Dr Karsten Ottenberg, Federal Interior Minister Dr Hans-Peter Friedrich,<br />

Dr Rainer Baumgart and Prof Dr Claudia Eckert (l to r)<br />

In the context of the IT Summit in Essen, German Interior Minister<br />

Hans-Peter Friedrich visited secunet on 12th November<br />

2012. Together with Dr Karsten Ottenberg (G&D), he chaired<br />

the meeting of the Working Group 4 on ‘Trust, Privacy and<br />

Security on the Internet’. The title of event at the company’s<br />

premises in Kronprinzenstr<strong>as</strong>se w<strong>as</strong> ‘Cybersicherheit in<br />

Deutschland gestalten’ (Shaping Cyber Security in Germany).<br />

More than 100 participants and members of the press were<br />

in attendance to discuss the topic with the Minister of the<br />

Interior, BSI President Michael Hange, Professor Claudia<br />

Eckert (TU Munich and Fraunhofer AISEC), Reinhard Clemens<br />

(Deutsche Telekom), Dr Rainer Baumgart and Dr Karsten<br />

Ottenberg.<br />

Always online – always secure<br />

The IT Security on Board workshop in Munich l<strong>as</strong>t October<br />

w<strong>as</strong> an opportunity for experts to compare notes on recent<br />

developments and implications for the future in e-mobility<br />

and Car-2-Car technology. Standards and methods by which<br />

vehicle IT security can be evaluated and the need for protection<br />

can be determined were also major themes of the<br />

presentations and of the lively conversations and discussions<br />

that followed. The secunet live hacking demo met with particular<br />

interest; some of the participants immediately took a<br />

critical look at their own phones when they learned about the<br />

sophistication of attacks currently being made on iPhones and<br />

Android devices.<br />

Experts swap ide<strong>as</strong> at biometrics conference<br />

secunet in London:<br />

The biometrics trade<br />

fair w<strong>as</strong> characterised<br />

by interesting discussions<br />

and new ide<strong>as</strong>.<br />

From 29th to 31st October, biometrics experts from around<br />

the world attended the aptly named ‘biometrics’ trade fair<br />

in London. In the context of the conference and exhibition,<br />

there w<strong>as</strong> a lively exchange of views on hot topics, the latest<br />

developments and current biometric practice. In a series of<br />

interesting discussions, secunet experts set various balls<br />

rolling and also returned to b<strong>as</strong>e with new ide<strong>as</strong> and issues<br />

to resolve.<br />

secunet ACU in Tokyo<br />

L<strong>as</strong>t October, representatives from secunet attended the<br />

FTF Freescale conference in Tokyo. They joined our partners<br />

from OpenSynergy at their stand to show off a demo unit of<br />

the secunet Application Control Unit (ACU), which is almost<br />

ready to go into series production. Where communication<br />

from external networks does not comply with the rules specified,<br />

the ACU prevents this from reaching the on-board electrical<br />

system. In this way, the ACU enables open networked<br />

infotainment applications. At the same time, valuable <strong>as</strong>sets<br />

such <strong>as</strong> operational security are safeguarded.<br />

18 » 1 | 2013


Dates<br />

SINA meets the Secretary of Defence<br />

February until<br />

June 2013<br />

Participants at the Handelsblatt conference on ‘Security<br />

Policy and the Defence Industry’ had a chance to hear<br />

the views of Defence Minister de Maizière on the dialogue<br />

between society, politics, military and economy. As one of<br />

the conference sponsors, secunet w<strong>as</strong> invited to present its<br />

SINA product portfolio.<br />

SINA presentation at NATO Symposium<br />

SINA made its debut appearance on our own exhibition<br />

stand at the NIAS symposium held in the Belgian city of Mons<br />

l<strong>as</strong>t September.<br />

SINA in Rome<br />

12 - 14 Feb 2013<br />

» Security Document World /<br />

Prague, Czech Republic<br />

17 - 21 Feb 2013 » IDEX / Abu Dhabi, UAE<br />

25 Feb -<br />

1 March 2013<br />

» RSA Conference /<br />

San Francisco, USA<br />

5 - 9 March 2013 » CeBIT / Hannover<br />

12 April 2013<br />

» Workshop<br />

‚IT Security on Board‘ /<br />

Munich<br />

23 - 25 April 2013 » Infosecurity Europe / London, UK<br />

24 - 25 April 2013<br />

» AFCEA exhibition /<br />

Bonn-Bad Godesberg<br />

7 May 2013 » SINA User Day / Berlin<br />

SINA on tour in Warsaw<br />

Johan Hesse<br />

of secunet<br />

presenting SINA<br />

solutions to the<br />

international<br />

audience.<br />

AFCEA TechNet International took place in Rome l<strong>as</strong>t October<br />

under the patronage of Italian Defence Minister Giampaolo<br />

Di Paola. The event w<strong>as</strong> well attended by representatives<br />

from various NATO countries and from the NCIA (NATO Communications<br />

and Information Agency) who were f<strong>as</strong>cinated by<br />

the demonstrations of SINA solutions at the secunet stand.<br />

In October 2012, all of the international SINA reseller partners<br />

gathered in Warsaw to exchange information and experiences,<br />

to listen to a series of presentations and to engage<br />

in some general networking.<br />

14 - 16 May 2013<br />

» 13 th Deutscher IT-Sicherheitskongress<br />

/ Bonn-Bad Godesberg<br />

21 - 23 May 2013 » Security Document World /<br />

London, UK<br />

15 May 2013 » General Annual Meeting<br />

secunet /<br />

Essen, C<strong>as</strong>tle of Borbeck<br />

15 - 16 May 2013 » Datenschutzkongress /<br />

Berlin<br />

5 and » SINA User Day /<br />

6 June 2013 Bonn<br />

Would you like to arrange an appointment with us<br />

Then send an e-mail to events@secunet.com.<br />

1 | 2013 « 19


Caution! Insecure Structure!<br />

Customized IT security provides a solid foundation for your success.<br />

Protect your most important <strong>as</strong>sets. IT security is essential for a stable<br />

IT infr<strong>as</strong>tructure and for all processes. secunet is your trump card: Our<br />

vision and expertise will help you achieve even the most demanding IT<br />

security solutions.<br />

www.secunet.com<br />

IT security partner of the<br />

Federal Republic of Germany

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!