Unabhängiges Magazin für Wirtschaft und Bildung

29. März 2024

Search form

Search form

Digital magic caps

Digital magic capsWilhelm Petersmann © Fujitsu

In view of increasing networking, the safeguarding of data, applications and IT infrastructures has become indispensable.

An expert comment by Wilhelm Petersmann, Country Manager of Fujitsu Austria. Many businesses and organisations underestimate the dangers that threaten from the inside and outside. Depending on which level of protection is needed, the implementation of a modular security concept is recommended. This should cover computer centres, data transmissions and end devices, as well as sensors which play a central role in the Internet of Things. After all, the most valuable asset of a business is its knowledge. And this must be protected from attacks as best as possible. In addition to data losses and financial losses, firms must expect a damage of their image with cyber attacks or unauthorised accesses, which can only be remedied with difficulty.

Fight against Cybercrime
The fight against cyber crime demands a constant further development using (also) the latest technologies. For safeguarding computer centre infrastructures, biometric authentication methods are also used in the meantime, as for example infrared hand vein scans. Depending on the protection needs, the access can be combined with a multi-eye principle, so that security racks can only be opened by a defined group of persons. End devices can be safeguarded by applications creating an encapsulated environment. Applications and data processing thus run in a completely separated manner from the hardware such as the operating system and are protected effectively in a corresponding manner.

Man in the middle attacks
Technological innovations such as an inherent “Stealth Data Centre“ protect the businesses from the increasing diversity as well as the combination of dangers. These offer protection not only for physical accesses, they are also a type of modern shield against electronic attacks. Here, the computer centre is made virtually invisible for hackers. Authorised users log in via a secure VPN connection, the corresponding port of the server process is blocked and the attacker does not receive an answer to his port scans and thus no information where a point of attack could be found. The exploitation of short-term security gaps or attacks directly into the communication connection of two partners (”Man in the middle attacks“) are severely hampered by such “digital magic caps “.

Links

Wilhelm Petersmann, translation by economy; red/czaak, Economy Ausgabe Webartikel, 09.11.2016