\input{configpres} % ---------------------------- \title{Security} \maketitle % ---------------------------- \begin{frame} \frametitle{Overview} \tableofcontents \end{frame} % ---------------------------- \subsection{Terminology} \begin{frame} \frametitle{Safety / Security} Separate Issues \begin{itemize} \item Safety: Betriebssicherheit \item Security: Datensicherheit / Sicherung \end{itemize} \end{frame} % ---------------------------- \begin{frame} \frametitle{Safety vs. Security?} After Delivery \begin{itemize} \item Safety: No Changes allowed \item Security: Continuous Service required (pro-active) \end{itemize} \end{frame} % ---------------------------- \begin{frame} \frametitle{Safety and Security} Safe and Secure (Realtime) Systems? \begin{itemize} \item Combined Systems \item Virtual Concept \item Realtime in VM? \end{itemize} \end{frame} % ---------------------------- \subsection{Problem Statement} \begin{frame} \frametitle{Why is System Security important?} \begin{itemize} \item Communication \item Worldwide connected \item Interfaces: \begin{itemize} \item Data Retrieval \item Management \item Maintenance \end{itemize} \end{itemize} \end{frame} % ---------------------------- \begin{frame} \frametitle{Protection} How to protect: \begin{itemize} \item (Production-)Data \item Functionality \item Integrity \item Communication Content \item Communication Authenticity \end{itemize} \end{frame} % ---------------------------- \subsection{Design Concepts} \begin{frame} \frametitle{Access Control} \begin{itemize} \item Least-required Privilege \item Role-based Access to Data \item Role-based Access to Functionality \item Role-based Access to Resources \end{itemize} \end{frame} % ---------------------------- \begin{frame} \frametitle{Communication} \begin{itemize} \item Reduce Communication \item Secure affected Channels \item Authenticate where needed \end{itemize} \end{frame} % ---------------------------- \begin{frame} \frametitle{System Design} \begin{itemize} \item Security Aspects first! \item Clear and Simple Design \item Workflows for Update and Maintenance \end{itemize} \end{frame} % ---------------------------- \subsection{Conclusion} \begin{frame} \frametitle{Conclusion} \begin{itemize} \item KISS - Keep it small and \textbf{simple} \item ''A chain is only as strong as its weakest link'' \item Security is NOT a one-time effort \end{itemize} \end{frame} % ---------------------------- \subsection{} \input{tailpres}