Anomaly Detection and Cyber Threat Intelligence
Every day organizations are exposed to cyber attacks. Information security teams do their best, but it is very difficult to monitor the current situation, pinpoint leading indicators, respond to issues, and stay informed about latest attack vectors, methods and threats – and it is overwhelming to do all of this at the same time.
Critical infrastructures, such as those for energy supply, emergency services and critical manufacturing, are being increasingly digitalized. This digitalization brings many benefits but introduces the potential for cyber-attacks that could affect the operation of the critical infrastructure. To address this issue, new approaches are required that go beyond what is typically required for information security.
Cyber Range & Training
The AIT Cyber Range CaSTLE (Cyber Security Training and Learning Environment) serves as a virtual environment for the flexible simulation of critical digital IT systems. It provides a secure and realistic environment for analyzing and testing incidents in different, scalable scenarios without the use of the genuine production systems of stakeholders.
Cryptography is a key enabler of emerging applications from Industry 4.0 over autonomous driving to smart wearables. However, currently deployed cryptographic techniques (often dating back to the 80s and 90s) were not designed with today's heterogeneous challenges in mind.
Ein Penetrationstest, kurz Pentest, ist ein empirischer Sicherheitscheck unter definierten Rahmenbedingungen. Dabei werden reale bzw. gängige Mittel und Techniken eingesetzt, die auch von potenziellen Angreifern verwendet werden. Penetrationstests zeigen eine Momentaufnahme der getesteten Komponenten aus einer bestimmten Perspektive. Generell erhöht sich die Anzahl der gefundenen Schwachstellen mit dem eingesetzten Aufwand und den verfügbaren Informationen über das zu testende System.
Today, organizations – in particular critical infrastructures – need to be prepared against various threats originating from multiple domains. Hence, these organizations need to implement a structured and comprehensive approach for risk management to tackle such threats. In particular, the interdependencies among critical assets need to be taken into account when a risk analysis for an infrastructure is performed. However, it is difficult to describe the cascading effects an incident could have on the entire network of critical infrastructures.