Towards European Digital Sovereignty: Beyond physical borders & locations Claudia Eckert, Fraunhofer-Institute AISEC, TU Munich, Chair for IT Security Agenda 1. Internet of Things and Services 2. Towards European Digital Sovereignty 3. Take Home Message Digitization: Internet of Things not really new, but … Connected: from Sensors into the Cloud Cross-Enterprise, cross-Domain Boundaries Merging private and business Life (and Data) New Services, new business opportunities BigData: Data-driven Innovations COPYRIGHT beachten! Bilder und Grafiken nur für internen Gebrauch! 1. Connected Industrial Processes tailored, efficient, sustainable, high quality It‘s all about Data! 1. Connected Mobility: Assisted driving, traffic planning, safety It‘s all about Data! 1. Connected Health: Personalized medicine, quantified self It‘s all about Data! Data-driven Innovations Business assets: Design (IP), Production processes, Logistics, Maintenance, Customer Privacy issues: Profiling, preferences, social life Quantified self (health) Data Ownership and Data Control are essential! But …. Risks Main Vulnerabilities: • Hardware: millions of Sensors: Manipulated Data • Software: open, connected: Information Leakages • Human in the Loop: overstrained, Unauthorized Access Appropriate Technologies, Methods, Tools are still missing! Agenda 1. Internet of Things and Services 2. Towards European Digital Sovereignty 3. Take Home Message Digital Sovereignty: Requires Ability to • Judge: Requires increased Knowledge: Assess • Control: Requires enhanced Monitoring: Prevent • Decide: Requires trustworthy Alternatives: Built Judge Educate: Training Usability Labs, Simulation Application Server App Controller Java VM Modell e Event Bus Assess: Analysis/Tools Spanning whole Life-Cycle design, implementation, deployment, operation, maintenance, patching elimination, …. Application Vorlag en DSL Interpreter Complex Event Processing MONITORING FRAMEWORK Control Prevent : Anomaly-Detection Real-time, resource saving Sensor fusing (spatial, time, …) Monitor: Self-Protection New Introspection Techniques VMI, Isolation Plug & Trust Security Modules Smart Meter with HSM Decide Built: New Hardware-Architecture Attack resistant, trustworthy Built: New Software Architectures personalized contexts: BYOC: Built: Identities for „everything“ Smart materials for security Driver for international Standardization! 3. Take home Message Privacy and Digital Sovereignty requires Trustworthy & usable Technology Education European Research Agenda • Strengthen Core-Competences to • Judge: Assess: detect vulnerabilities • Control: Prevent: mitigate risks • Decide: Built: trustworthy technology Thank You for Your Attention Claudia Eckert TU München, Chair for IT Security Fraunhofer-Institut e AISEC, Munich E-Mail: [email protected] Internet: http://www.sec.in.tum.de http://www.aisec.fraunhofer.de Twitter: @FraunhoferAISEC
© Copyright 2024