{"id":2629,"date":"2021-10-21T16:25:10","date_gmt":"2021-10-21T14:25:10","guid":{"rendered":"https:\/\/ur4-tia.com\/cyber-security\/"},"modified":"2022-03-02T15:53:52","modified_gmt":"2022-03-02T14:53:52","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/","title":{"rendered":"Cyber security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2629\" class=\"elementor elementor-2629 elementor-366\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7c81eb7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7c81eb7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;b9a1679&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fa6c69f\" data-id=\"fa6c69f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-68a8f1d elementor-widget elementor-widget-heading\" data-id=\"68a8f1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Cyber Security?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f52629 elementor-widget elementor-widget-heading\" data-id=\"0f52629\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Definition of Cyber Security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3b80fa elementor-widget elementor-widget-text-editor\" data-id=\"f3b80fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>Cyber \u200b\u200bsecurity<\/strong>\u00a0(also known as\u00a0<strong>cybersecurity<\/strong>) is a discipline of\u00a0<strong>IT security<\/strong>\u00a0that has become increasingly important in recent years, both internally and regarding the public.\r\n\r\nIt deals with protection against all kinds of risks and threats from cyberspace.\u00a0The focus is on all elements of communication and information technology that are connected to the intranet or internet via corresponding online components and are therefore vulnerable per se.\u00a0In terms of IT systems, cyber security primarily considers their technical components (communication components, applications, processed data and information), but also the processes whose work steps affect online components.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9de7476 elementor-widget elementor-widget-heading\" data-id=\"9de7476\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber security relevance<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5dbbf65 elementor-widget elementor-widget-text-editor\" data-id=\"5dbbf65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe rise in relevant incidents year after year shows what is in store for businesses and individuals in an increasingly connected world. The pandemic years of 2020 and 2021, in which distributed working has led to a multiplication of potential points of attack between companies, private households with home or mobile office workplaces, and the communication links in between, foreshadows interesting statistical material. But the fact remains: In the complexity and dynamics of modern infrastructures, especially with regard to Industry 4.0 and IoT, this becomes an undertaking that, if it goes awry, can quickly attack the economic viability of the company.\r\n\r\nIn the clinical or infrastructure environment, critical incidents can actually endanger life and limb. For this reason, governments define special requirements for these critical infrastructures, exemplified by CRITIS in Germany, the ISO 27000 journey and the BSI 200 standards.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-dc80cc4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dc80cc4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;4f06d10&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a48d33f\" data-id=\"a48d33f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fd55837 elementor-widget elementor-widget-image\" data-id=\"fd55837\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"602\" height=\"867\" src=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/11\/cyberbedrohung-deutschland_1.png\" class=\"attachment-large size-large wp-image-2502\" alt=\"Cyber threats in Germany as a reason for cyber security\" srcset=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/11\/cyberbedrohung-deutschland_1.png 602w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/11\/cyberbedrohung-deutschland_1-208x300.png 208w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e7671d3\" data-id=\"e7671d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5cacf17 elementor-widget elementor-widget-image\" data-id=\"5cacf17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"602\" height=\"898\" src=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/11\/cyberbedrohung-deutschland_2.png\" class=\"attachment-large size-large wp-image-2503\" alt=\"Cyber threats in Germany as a reason for cyber security\" srcset=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/11\/cyberbedrohung-deutschland_2.png 602w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/11\/cyberbedrohung-deutschland_2-201x300.png 201w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7e6248 elementor-widget elementor-widget-text-editor\" data-id=\"d7e6248\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFigure 1: IT security in Germany 2020\r\n\r\nSource: BSI-LB20\/509: Die Lage der IT-Sicherheit in Deutschland 2020, Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), S. 36\/37\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b61e710 elementor-widget elementor-widget-heading\" data-id=\"b61e710\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber threats as a challenge for organizations and companies: Cyber security is more than virus protection and DMZ<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8ab179 elementor-widget elementor-widget-text-editor\" data-id=\"a8ab179\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>The discipline of cyber security<\/strong>\u00a0is characterized by complexity and dynamism.\u00a0It combines aspects from a wide variety of perspectives, but also has interfaces and overlaps with other disciplines.\r\n\r\nThe need for cyber security is no longer science fiction, but hard reality: whether it is an unintentional or targeted virus attack, internally or externally driven data theft, ransomware attacks on end devices as well as central systems for the purpose of blackmail, or simply trials of strength with scripts -Kiddies, experience-oriented zero-day exploitists through to real hackers with specific assignments from the broad field of economic and industrial espionage, or pure destructiveness and the desire for chaos and\/or attention: cyber security deals with all of these scenarios .\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5ddc3c4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5ddc3c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;b95b209&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e269ca2\" data-id=\"e269ca2\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aee5a4f elementor-widget elementor-widget-text-editor\" data-id=\"aee5a4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOur reading and subscription tip: the BSI&#8217;s annual report &#8220;The situation of IT security in Germany&#8221; is published annually and is available free of charge online and as a print edition.\r\n\r\nAn absolute must-read for anyone interested in the subject.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3d3ba8 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"e3d3ba8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/www.bsi.bund.de\/DE\/Themen\/Unternehmen-und-Organisationen\/Cyber-Sicherheitslage\/Lageberichte\/Jahreslageberichte\/jahreslageberichte_node.html\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">To the annual report<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb9ae28 elementor-widget elementor-widget-heading\" data-id=\"bb9ae28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber threats as a challenge for organizations and companies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-516c7cd elementor-widget elementor-widget-text-editor\" data-id=\"516c7cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCyber \u200b\u200bsecurity is largely to be understood as risk management.\u00a0Whether financially oriented cybercrime (e.g. in the form of the increasing number of phishing and ransomware attacks, including subsequent attempts at blackmail), politically motivated cyberattacks (e.g. to disclose genuine or disseminate falsified critical information to discredit public officials), or genuine cyberterrorism (e.g. attacks on control units of critical infrastructure elements) to create widespread chaos, panic and instability:\r\n\r\nIn the context of cyber security, it is always necessary to foresee new and ever more innovative attack variants, to harden infrastructures and organizations and to react appropriately to experienced digital attack situations.\r\n\r\nOn the attacker side, there are always completely new \u201cprofessions\u201d for which cyber security has to prepare.\u00a0A few years ago, many of the current threats were only theoretically conceivable, but could hardly be implemented in practice.\r\n\r\nWith the increasing networking of all areas of life in the different economic sectors, it is apparently more and more &#8220;worthwhile&#8221; for criminal elements of different weight classes and different target orientations to become active. Especially in the context of Industry 4.0 and the Internet of Things (IOT), completely new threat scenarios are emerging: the more components of daily life have direct contact with the Internet, the greater the potential for damage and the associated attractiveness for disruptors.\r\n\r\nOn the side of those affected, there are not only &#8220;small, overwhelmed medium-sized companies&#8221; who do not have sufficient resources and skills to protect themselves effectively or at least to be able to react appropriately.\u00a0Large companies and increasingly also state organizations, which at least theoretically have legions of capable architects, hardware and software experts at their disposal, are struggling with the situation.\u00a0In some cases, the potential image damage is much higher than the direct economic damage caused by data loss or corrupt data, for example.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5693f27 elementor-widget elementor-widget-heading\" data-id=\"5693f27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Goals of cyber security - not just processes and measures, but (also) a state<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9acc2ae elementor-widget elementor-widget-text-editor\" data-id=\"9acc2ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tVery similar to how information security describes both processes and a state, cyber security also has\u00a0<strong>a defined target image<\/strong>: the state of a security situation in cyberspace in which risks from this for one&#8217;s own organization are reduced to at least an appropriate level.\r\n\r\nThere is no such thing as absolute security, especially not in cyberspace.\u00a0Even if a lot of hope is placed, for example, in future support from artificial intelligence, with the dynamics and complexity of the virtual world, the almost infinite number of interfaces and the bringing together of potentially very different interests worldwide:\r\n\r\nOn a permanent virtual construction site, where every little screw can represent a potential weak point, perfect risk prevention is simply not possible by human standards.\u00a0It will always be a game of cat and mouse.\r\n\r\nThe aim must therefore be that in a management system, points of attack and risks with the probability of occurrence and potential damage are clearly analyzed, evaluated and ideally neutralized in advance using suitable means.\r\n\r\nAnd on the other hand, on the measures side, if a cyber security incident occurs, the effects are reduced as far as possible &#8211; through clear responsibilities, unambiguous process, and information channels as well as dynamically adaptable or even self-regulating emergency plans.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ecbd338 elementor-widget elementor-widget-heading\" data-id=\"ecbd338\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">framework of cyber security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4023e5 elementor-widget elementor-widget-text-editor\" data-id=\"e4023e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>Cyber \u200b\u200bsecurity as a discipline<\/strong>\u00a0is critical, but there is discussion about where its limits are and what requirements must be met.\r\n\r\nOn closer inspection, there are hardly any detailed guidelines on cyber security, which is of course also due to the dynamic nature of the topic.\u00a0Many specifications are generally and technology-independently defined in the form of guiding principles or basic rules and can therefore be adapted relatively easily to new developments.\r\n\r\nThe requirements, which are formulated, can be found within the company in explicit or implicit company descriptions and procedural instructions, rules of conduct and the like.\r\n\r\n<strong>There are also legal requirements and specifications<\/strong>, in Germany for example\r\n<ul>\r\n \t<li>in the IT-SiG<\/li>\r\n \t<li>by the BSI<\/li>\r\n \t<li>in the KRITIS specifications<\/li>\r\n \t<li>in the GDPR<\/li>\r\n \t<li>in the ISO\/IEC-27000 series<\/li>\r\n \t<li>with increasing relevance in IEC 62443 in the industrial environment<\/li>\r\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6de4b86 elementor-widget elementor-widget-heading\" data-id=\"6de4b86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Security Benefits and Issues: Security vs. Productivity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17c0e91 elementor-widget elementor-widget-text-editor\" data-id=\"17c0e91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIT, in its self-image as an enabler of modern corporate strategies, must also be aware of the simultaneous role as a security risk.\u00a0As much as the requirements and models of cyber security can be adapted to new realities, and as good as the target image of a stable security situation is (or seems) achieved in a moment, it is still a snapshot of a dynamic situation:\r\n\r\nIn addition to technological leaps and increasingly creative attack tools from the other side, every new or changed infrastructure element (process step, hardware component, software update, configuration change, employee, or service provider, &#8230;) also harbors the potential for a security risk internally, which, strictly speaking, must be checked for itself and in the overall operational context.\r\n\r\nHowever, the much-cited\u00a0<strong>&#8220;Security by Design&#8221; approach<\/strong>, which propagates the holistic consideration of security aspects from the very first moment of planning, often falls by the wayside in favor of an operative efficiency target &#8211; especially in the case of components that are not directly obviously critical.\r\n\r\nAbove all, large companies with complex processes and architectures find themselves in a quandary again: They are almost forced to restrict themselves and their employees in dealing with IT, going far beyond authorization concepts, software guidelines and BYOD regulations.\u00a0The central desire for a stable and long-lasting technical basis, reduced proliferation and lower, i.e., better manageable, complexity is absolutely understandable.\r\n\r\nIn doing so, they slow down organizational and IT-technical work processes in day-to-day operations, so to speak, with the announcement, felt or real.\r\n\r\nThe role of (IT) management in the highly dynamic field of tension between risk tolerance and work efficiency in day-to-day operations is not enviable, especially since many tools are found at levels other than the technical IT level and are therefore not easy to automate.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9342af0 elementor-widget elementor-widget-heading\" data-id=\"9342af0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Future trends and challenges of cyber security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d73107 elementor-widget elementor-widget-text-editor\" data-id=\"8d73107\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCyber \u200b\u200bsecurity is the constant struggle at the border between organizations and cybercriminals or cyberterrorist attackers.\u00a0It is a matter of constant arming on both sides, both at the state level in the fight against criminally induced cyberterrorism or other states, at the private sector level with industrial and economic espionage, or at the personal level in the protection of private data or against concrete risks to life and limb Life, for example against the background of emerging autonomous driving on public roads.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6947fad elementor-widget elementor-widget-image\" data-id=\"6947fad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/cybersecurity-1024x1024.png\" class=\"attachment-large size-large wp-image-2504\" alt=\"Cybersecurity at the crossroads of organizations and cyberattackers\" srcset=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/cybersecurity-1024x1024.png 1024w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/cybersecurity-300x300.png 300w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/cybersecurity-150x150.png 150w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/cybersecurity-768x768.png 768w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/cybersecurity-1536x1536.png 1536w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/cybersecurity-2048x2048.png 2048w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/cybersecurity-1320x1320.png 1320w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bbbeb3b elementor-widget elementor-widget-text-editor\" data-id=\"bbbeb3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFigure 2: Cyber \u200b\u200bsecurity is the constant struggle at the border between organizations and cybercriminals or cyberterrorist attackers\r\n\r\nSource:\u00a0<a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=en&amp;client=webapp&amp;u=https:\/\/www.iaew.rwth-aachen.de\/cms\/IAEW\/Wirtschaft\/Energiesystemstudien\/Digitalisierung\/~jalau\/Cyber-Security\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.iaew.rwth-aachen.de\/cms\/IAEW\/Wirtschaft\/Energiesystemstudien\/Digitalisierung\/~jalau\/Cyber-Security\/<\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6e1d4e elementor-widget elementor-widget-text-editor\" data-id=\"f6e1d4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhat happens when arms competition leads to leaps in technology?\u00a0When previously secure communication protocols between individual technical components are severely compromised?\u00a0When individual attackers become cloud-based attacker cohorts that are controlled decentral or act completely autonomously and put infrastructures at different weak points under stress?\u00a0When artificial intelligence finally appears on the field, which independently checks attack scenarios for known vulnerabilities &#8211; or even worse: starts to think about them independently?\r\n\r\nAssuming that the social and economic framework conditions remain largely stable and that the interests of cybercriminal elements do not disappear into thin air:\r\n\r\nWork remains to be done so that\u2026\r\n<ul>\r\n \t<li>Critical technical and organizational structures have already been hardened in advance in such a way that they no longer offer a relevant target for attack &#8211; which is probably more of a utopia,<\/li>\r\n \t<li>future technologies follow the security by design approach in such a way that their management becomes more manageable,<\/li>\r\n \t<li>Or the cyber security AI can be used at all levels and is also faster and better.<\/li>\r\n<\/ul>\r\nIn any case, the path of forgoing comfort, isolating systems again or taking them completely offline seems to be becoming increasingly unrealistic.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0f28a6 elementor-widget elementor-widget-heading\" data-id=\"e0f28a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Implementation of cyber security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f57176f elementor-widget elementor-widget-text-editor\" data-id=\"f57176f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAbove all, as is so often the case, is a\u00a0<strong>management<\/strong>\u00a0system that forms a framework for strategic and operational implementation measures, constantly questions itself and develops further.\u00a0In addition to these &#8220;internal&#8221; processes of the management system, the findings of cyber security usually also have a very concrete effect on the following measures:\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d55f75 elementor-widget elementor-widget-heading\" data-id=\"6d55f75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Building Expert and Rapid Response Forces:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdf989c elementor-widget elementor-widget-text-editor\" data-id=\"fdf989c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIt is not without reason that \u201cdigital first responders\u201d and \u201cBSI incident experts\u201d are being trained and certified in a very up-to-date and highly effective manner, and rapid response teams for cyber security are being formed.\r\n\r\nCyber \u200b\u200bsecurity must\u00a0<strong>act as proactively<\/strong>\u00a0as possible.\u00a0Expert and rapid reaction teams as separate organizational units \u2013 or at least put together as virtual teams via \u201cdotted lines\u201d \u2013 are central tools here.\u00a0Important for such teams is the right mix of\u2026\r\n<ul>\r\n \t<li>Experts from a wide variety of IT disciplines with in-depth technical know-how &#8211; in addition to infrastructure experts, experienced professionals from the field of critical application environments are the top priority here &#8211; such as SAP basis and security specialists,<\/li>\r\n \t<li>Experienced IT generalists with openness to unconventional ideas,<\/li>\r\n \t<li>nerds and hackers with technology faith and creativity,<\/li>\r\n \t<li>Already affected professionals with a touch of technical disillusionment,<\/li>\r\n \t<li>Social engineers for the human part of a system<\/li>\r\n<\/ul>\r\nInter-company alliances have also proven their worth, as has the use of external consultants.\u00a0These are often certified security experts, hardware and software architects, or ethical \/ white hat hackers and penetration testers.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-664d06b elementor-widget elementor-widget-heading\" data-id=\"664d06b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Further technical and organizational measures:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c8eae0 elementor-widget elementor-widget-text-editor\" data-id=\"4c8eae0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tReacting in this cat-and-mouse game is far from enough to achieve the goal of cyber security as stably as possible.\u00a0Different sub-areas have been established, which, in addition to their actual objectives, must also make an operational contribution to and in coordination with cyber security in advance:\r\n<ul>\r\n \t<li><strong>Network security<\/strong>: It is primarily responsible for protecting against internal and external attackers and malware with technical measures &#8211; network structures with hardware and software elements, technical and organizational security protocols: secure server and network configurations, defined IP segments, VPNs, firewalls, DMZ, &#8230;\r\ngoal are hardened network components that together provide a risk-safe technical network<\/li>\r\n \t<li><strong>Program<\/strong>\u00a0security: It defines procedures and catalogs in order to release only such software for operation that poses as little security risk as possible.\u00a0It includes technical tests of the software components and their interfaces, specifications for authorization concepts, minimum versions and updates, etc.\r\nThe main focus is on infrastructure applications and business applications with great complexity, such as SAP systems with their entire transport routes across a wide variety of infrastructure and application nodes.<\/li>\r\n \t<li><strong>Information security<\/strong>: It provides regulations for handling data: recording, storage, processing, and distribution.\u00a0The GDPR, the ITSiG and, depending on the industry, different DIN\/EN standards form the basis here.<\/li>\r\n \t<li><strong>Disaster recovery and business continuity<\/strong>: if the attack could not be prevented and real damage has occurred, the processes of damage reduction and restoration of orderly business operations come into play.\u00a0Depending on the nature and severity of the incident, this includes\u2026\r\n<ul>\r\n \t<li>Measures of a technical nature (e.g. server and data recoveries, restarting complex application environments),<\/li>\r\n \t<li>Measures of an organizational nature (running through emergency plans, but also operational provision of emergency jobs, also parallel to the restoration of operations also extended analysis and definition of further preventive measures) as well as<\/li>\r\n \t<li>Measures of a communicative nature (information of the specified state institutions and affected persons in the event of data leakage or other serious governance or DSGVO violations).<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li>Last but not least, user education and sensitization is a central part of the implementation of a cyber security strategy: a toe behind the limit of technically and organizationally sensible or feasible security concepts are people as the greatest and in some cases incalculable risk.\u00a0Companies must never forget to include this in the form of information, transparency and training in the overall cyber security process.<\/li>\r\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e25d83a elementor-widget elementor-widget-heading\" data-id=\"e25d83a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The important role of external advice<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa82970 elementor-widget elementor-widget-text-editor\" data-id=\"fa82970\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>Cybersecurity is a field<\/strong>\u00a0that has to constantly prove itself on the test bench of the daily news.\u00a0In this highly sensitive area, it has proven useful to make use of external support.\u00a0Specialists like those from Firnkorn and Stortz advise companies on cyber security in the context of corporate architecture and with a view to processes, tools and interfaces: holistically and in the SAP environment in particular.\u00a0As consultants and experts in cyber security, they provide comprehensive support and tailor-made advice according to the needs of your company in order to develop an optimal cyber security solution.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c78560a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c78560a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;6dfe797&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}],&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a310d7d\" data-id=\"a310d7d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-806743c no-index elementor-widget elementor-widget-heading\" data-id=\"806743c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Also, read more on related topics<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42814b7 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"42814b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/information-security\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-external-link-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Information Security<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/it-security-concept\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-external-link-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">IT security concept<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/data-protection-and-data-security\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-external-link-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Data protection and data security<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/fail-safe\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-external-link-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Fail-safe<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/high-availability-definition-classes-and-implementation\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-external-link-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">High availability<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-53ab21f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53ab21f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;9316129&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1463dba\" data-id=\"1463dba\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-563fcdf elementor-widget elementor-widget-heading\" data-id=\"563fcdf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Your contact at Firnkorn &amp; Stortz on the subject of cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f555e03 elementor-widget elementor-widget-template\" data-id=\"f555e03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"2670\" class=\"elementor elementor-2670 elementor-802 elementor-802\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c315173 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c315173\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;8d63371&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d5c2653\" data-id=\"d5c2653\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2991e4e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2991e4e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c890c66&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-292ce79\" data-id=\"292ce79\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-781dd28 elementor-widget elementor-widget-image\" data-id=\"781dd28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"933\" src=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-878x1024.jpg\" class=\"attachment-large size-large wp-image-2496\" alt=\"\" srcset=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-878x1024.jpg 878w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-257x300.jpg 257w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-768x895.jpg 768w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-1318x1536.jpg 1318w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-1757x2048.jpg 1757w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a2a2ca8\" data-id=\"a2a2ca8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6fcd87a2 elementor-widget elementor-widget-heading\" data-id=\"6fcd87a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Firnkorn + Stortz GmbH<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7488ebdd elementor-widget elementor-widget-heading\" data-id=\"7488ebdd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Thomas Firnkorn<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-576c9278 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"576c9278\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"tel:+4963239819011\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-phone\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">+49 6323 9819011<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"tel:+4915146736468\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-mobile-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">+49 151 46736468<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"mailto:thomas.firnkorn@ur4-tia.com\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-at\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">thomas.firnkorn@ur4-tia.com<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is Cyber Security? Definition of Cyber Security Cyber \u200b\u200bsecurity\u00a0(also known as\u00a0cybersecurity) is a discipline of\u00a0IT security\u00a0that has become increasingly important in recent years, both internally and regarding the public. It deals with protection against all kinds of risks and threats from cyberspace.\u00a0The focus is on all elements of communication and information technology that are [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":2708,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2629","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/pages\/2629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/comments?post=2629"}],"version-history":[{"count":7,"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/pages\/2629\/revisions"}],"predecessor-version":[{"id":2734,"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/pages\/2629\/revisions\/2734"}],"up":[{"embeddable":true,"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/pages\/2708"}],"wp:attachment":[{"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/media?parent=2629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}