{"id":952,"date":"2025-02-11T10:00:37","date_gmt":"2025-02-11T09:00:37","guid":{"rendered":"https:\/\/www.hsu-hh.de\/dataeng\/?page_id=952"},"modified":"2025-02-11T14:07:40","modified_gmt":"2025-02-11T13:07:40","slug":"information-security-of-connected-logistic-systems","status":"publish","type":"page","link":"https:\/\/www.hsu-hh.de\/dataeng\/en\/lectures\/information-security-of-connected-logistic-systems\/","title":{"rendered":"Information security of connected logistic Systems"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Responsible for the module<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/www.hsu-hh.de\/dataeng\/en\/team\/maria-maleshkova\/\" data-type=\"page\" data-id=\"327\"><abbr title=\"Professor\">Prof.<\/abbr> <abbr title=\"Doktor\">Dr.<\/abbr> Maria Maleshkova<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Qualification goal<\/strong><\/h2>\n\n\n\n<p>The module teaches basic concepts in the field of security of information technology systems with a particular focus on the areas of networked logistics systems. Networked logistics systems include source logistics, processing logistics, distribution logistics and disposal logistics. A state-of-the-art feature of modern logistics is the support of such systems by objects and methods of automation technology. Due to the inherent mobility of the goods moved in the system, information technology in the logistics environment offers an enormous target for cyber attacks and therefore a high risk.<\/p>\n\n\n\n<p>Students acquire the qualification to<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>assess the <abbr title=\"Informationstechnologie\">IT<\/abbr> security of the components used in logistics systems<\/li>\n\n\n\n<li>to identify the vulnerabilities of logistics systems to common attack techniques<\/li>\n\n\n\n<li>to select automated mechanisms for attack detection appropriately<\/li>\n\n\n\n<li>to specify hardened logistics systems and to accompany them during construction and operation<\/li>\n\n\n\n<li>to assess the <abbr title=\"Informationstechnologie\">IT<\/abbr> security of the components used in logistics systems<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contents<\/strong><\/h2>\n\n\n\n<p>The subject-specific professional qualification and key skills are to be taught in the following areas in particular:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Basics of attack techniques on logistical systems<\/li>\n\n\n\n<li>Basics of automated attack detection (e.g., intrusion detection, AI, bots, ants)<\/li>\n\n\n\n<li>Basics of risk minimization through the design of hardened logistical systems in the areas of:\n<ul class=\"wp-block-list\">\n<li>Vehicles on land, air, and sea (LLS)<\/li>\n\n\n\n<li>Infrastructure: sources, sinks, processing, transportation (vehicles LLS, pipe systems, lines), classes of goods: general cargo, liquid cargo, suction and bulk cargo, and data<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Local and distributed logistics accompanying <abbr title=\"Informationstechnologie\">IT<\/abbr><\/li>\n\n\n\n<li>Security-related evaluation and hardening of local and distributed logistics information systems using case studies<\/li>\n\n\n\n<li><abbr title=\"Informationstechnologie\">IT<\/abbr> security of embedded systems in logistics networks<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Module components<\/h2>\n\n\n\n<p>The scope of the course is 2 TWS lecture, 1 TWS exercise for 6 CP.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Recommended literature<\/h2>\n\n\n\n<p>Pohlmann: Cyber-Sicherheit: Das Lehrbuch fu2r Konzepte, Prinzipien, Mechanismen, Architekturen und Eigenschaften von Cyber-Sicherheitssystemen in der Digitalisierung<\/p>\n\n\n\n<p>M\u00f6ller, Haas: Guide to Automotive Connectivity and Cybersecurity: Trends, Technologies, Innovations and Applications<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Responsible for the module Prof. Dr. Maria Maleshkova Qualification goal The module teaches basic concepts in the field of security of information technology systems with a particular focus on the [&hellip;]<\/p>\n","protected":false},"author":4068,"featured_media":0,"parent":118,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-952","page","type-page","status-publish","hentry","category-research"],"_links":{"self":[{"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/pages\/952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/users\/4068"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/comments?post=952"}],"version-history":[{"count":8,"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/pages\/952\/revisions"}],"predecessor-version":[{"id":996,"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/pages\/952\/revisions\/996"}],"up":[{"embeddable":true,"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/pages\/118"}],"wp:attachment":[{"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/media?parent=952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/categories?post=952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hsu-hh.de\/dataeng\/wp-json\/wp\/v2\/tags?post=952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}