@book{OPUS4-1738, title = {Anwendungsorientierte Forschung f{\"u}r die digitale Transformation von KMU : Schriften des Forschungsclusters Industrie 4.0}, editor = {Niemann, Karl-Heinz and Lierse, Tjark}, organization = {Hochschule Hannover}, doi = {10.25968/opus-1738}, url = {http://nbn-resolving.de/urn:nbn:de:bsz:960-opus4-17380}, publisher = {Hochschule Hannover}, pages = {127}, year = {2020}, abstract = {Das Forschungscluster Industrie 4.0 stellt in acht Beitr{\"a}gen aktuelle Ergebnisse aus seinen vielf{\"a}ltigen Forschungsprojekten vor. Es werden virtuelle Techniken in der Produktentwicklung, Lehrkonzepte f{\"u}r Industrie 4.0, Energy Harvesting bei Antennen, Energiemanagement in Produktionsanlagen, firmen{\"u}bergreifende IT-Security Anforderungen, dezentral gesteuerte Produktionsprozesse und Spracherkennung mit Mikrocontrollern behandelt.}, subject = {Industrie 4.0}, language = {de} } @article{AhlersHellmann2020, author = {Ahlers, Volker and Hellmann, Bastian}, title = {Usability Testing of Visual Policy Evaluation for Network Security Event Detection}, series = {Smart Data Analytics: Schriften des Forschungsclusters Smart Data Analytics 2020}, journal = {Smart Data Analytics: Schriften des Forschungsclusters Smart Data Analytics 2020}, doi = {10.25968/opus-1831}, url = {http://nbn-resolving.de/urn:nbn:de:bsz:960-opus4-18311}, pages = {94 -- 101}, year = {2020}, abstract = {The network security framework VisITMeta allows the visual evaluation and management of security event detection policies. By means of a "what-if" simulation the sensitivity of policies to specific events can be tested and adjusted. This paper presents the results of a user study for testing the usability of the approach by measuring the correct completion of given tasks as well as the user satisfaction by means of the system usability scale.}, subject = {Rechnernetz}, language = {en} } @article{Disterer2019, author = {Disterer, Georg}, title = {Systematizing IT Risks}, series = {Journal of Information Security}, journal = {Journal of Information Security}, number = {10}, issn = {2153-1242}, url = {http://nbn-resolving.de/urn:nbn:de:bsz:960-opus4-15547}, pages = {237 -- 249}, year = {2019}, abstract = {IT risks — risks associated with the operation or use of information technology — have taken on great importance in business, and IT risk management is accordingly important in the science and practice of information management. Therefore, it is necessary to systematize IT risks in order to plan, manage and control for different risk-specific measures. In order to choose and implement suitable measures for managing IT risks, effect-based and causebased procedures are necessary. These procedures are explained in detail for IT security risks because of their special importance.}, subject = {Computersicherheit}, language = {en} } @techreport{Merz2016, type = {Working Paper}, author = {Merz, Peter}, title = {Studie zur Web-Server-Sicherheit von Unternehmen aus Hannover und Umgebung}, doi = {10.25968/opus-1006}, url = {http://nbn-resolving.de/urn:nbn:de:bsz:960-opus4-10069}, year = {2016}, abstract = {Der vorliegende Artikel beschreibt die Ergebnisse einer Studie zur Sicherheit von Web-Servern nieders{\"a}chsischer Unternehmen aus dem Raum Hannover. Untersucht wurden vier Unternehmensgruppen, die sich aus Mitgliedern von Unternehmensverb{\"a}nden und berufsst{\"a}ndischen K{\"o}rperschaften zusammensetzen. Insgesamt werden mehr als 1800 Unternehmen betrachtet. Als Indikator f{\"u}r die IT-Sicherheit wurden vier Sicherheitsl{\"u}cken herangezogen, die leicht {\"u}berpr{\"u}ft werden k{\"o}nnen, ohne die Web-Server in ihrem Betrieb zu beeintr{\"a}chtigen. Die Ergebnisse sind ern{\"u}chternd: Viele Unternehmen setzen keine Verschl{\"u}sselung ein oder die Web-Server-Software ist nicht auf dem neusten Stand. Bei ungef{\"a}hr jedem dritten Unternehmen, welches Verschl{\"u}sselung einsetzt, enth{\"a}lt die Software seit mehr als einem Jahr bekannte Schwachstellen und sollte umgehend aktualisiert werden. Dies zeigt, dass das IT-Sicherheitsmanagement in vielen Unternehmen mangelhaft ist.}, subject = {Computersicherheit}, language = {de} } @techreport{Wohlfeil2006, type = {Working Paper}, author = {Wohlfeil, Stefan}, title = {Security Management with Open Source Tools}, url = {http://nbn-resolving.de/urn:nbn:de:bsz:960-opus-2745}, year = {2006}, abstract = {This document describes the work done during the Research Semester in Summer 2006 of Prof. Dr. Stefan Wohlfeil. It is about Security Management tasks and how these tasks might be supported by Open Source software tools. I begin with a short discussion of general management tasks and describe some additional, security related management tasks. These security related tasks should then be added to a software tool which already provides the general tasks. Nagios is such a tool. It is extended to also perform some of the security related management tasks, too. I describe the new checking scripts and how Nagios needs to be configured to use these scripts. The work has been done in cooperation with colleagues from the Polytech- nic of Namibia in Windhoek, Namibia. This opportunity was used to also establish a partnership between the Department of Computer Science at FH Hannover and the Department of Information Technology at the Polytechnic. A first Memorandum of Agreement lays the groundwork for future staff or student exchange.}, subject = {Computersicherheit}, language = {en} }