Industrial Network Security

Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

Author: Eric D. Knapp,Joel Thomas Langill

Publisher: Syngress

ISBN: 0124201849

Category: Computers

Page: 460

View: 1136

As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation. All-new real-world examples of attacks against control systems, and more diagrams of systems Expanded coverage of protocols such as 61850, Ethernet/IP, CIP, ISA-99, and the evolution to IEC62443 Expanded coverage of Smart Grid security New coverage of signature-based detection, exploit-based vs. vulnerability-based detection, and signature reverse engineering

Industrial Network Security

Author: David J. Teumim

Publisher: ISA

ISBN: 193600707X

Category: Computers

Page: 130

View: 9342

Nowadays one only needs to read the newspaper headlines to appreciate the importance of Industrial Network Security. Almost daily an article comes out describing the threat to our critical infrastructure, from spies in our electrical grid to the looming threat of cyberwar. Whether we talk about process control systems that run chemical plants and refineries, supervisory control and data acquisition (SCADA) systems for utilities, or factory automation systems for discrete manufacturing, the backbone of our nationA's critical infrastructure consists of these industrial networks and is dependent on their continued operation. This easy-to-read book introduces managers, engineers, technicians, and operators on how to keep our industrial networks secure amid rising threats from hackers, disgruntled employees, and even cyberterrorists.

Network Security and Communication Engineering

Proceedings of the 2014 International Conference on Network Security and Communication Engineering (NSCE 2014), Hong Kong, December 25–26, 2014

Author: Kennis Chan

Publisher: CRC Press

ISBN: 1315683555

Category: Computers

Page: 672

View: 3194

The conference on network security and communication engineering is meant to serve as a forum for exchanging new developments and research progresss between scholars, scientists and engineers all over the world and providing a unique opportunity to exchange information, to present the latest results as well as to review the relevant issues on contemporary research in network security and communication engineering. Young scientists were especially encouraged to attend the conference and to establish an international network between each other and with senior scientists attending the meeting. In recent years, network security has become more important in all aspects of life and society; from business to politics, the essential value of network security is shown everywhere. The appearance of Internet marked the beginning of the age of communication engineering. The growing influence of communication engineering has become more and more apparent in people’s work and life. More than 180 scientists and researchers from more than 15 countries attended the meeting. Articles were divided into sessions: network and system security; grid and cloud computing; networking algorithms and performance evaluation; multimedia, signal and image processing; wireless communications and sensor networks.

Cybersecurity for Industrial Control Systems

SCADA, DCS, PLC, HMI, and SIS

Author: Tyson Macaulay,Bryan L. Singer

Publisher: CRC Press

ISBN: 1439801983

Category: Business & Economics

Page: 203

View: 5020

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS. Highlighting the key issues that need to be addressed, the book begins with a thorough introduction to ICS. It discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. Next, it explains why security requirements differ from IT to ICS. It differentiates when standard IT security solutions can be used and where SCADA-specific practices are required. The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.

Automating with PROFINET

Industrial Communication Based on Industrial Ethernet

Author: Raimond Pigan,Mark Metter

Publisher: John Wiley & Sons

ISBN: 389578950X

Category: Science

Page: 462

View: 1230

PROFINET is the first integrated Industrial Ethernet Standard for automation, and utilizes the advantages of Ethernet and TCP/IP for open communication from the corporate management level to the process itself. PROFINET CBA divides distributed, complex applications into autonomous units of manageable size. Existing fieldbuses such as PROFIBUS and AS-Interface can be integrated using so-called proxies. This permits separate and cross-vendor development, testing and commissioning of individual plant sections prior to the integration of the solution as a whole. PROFINET IO, with its particularly fast real-time communication, fulfills all demands currently placed on the transmission of process data and enables easy integration of existing fieldbus systems. Isochronous real-time (IRT) is used for isochronous communication in motion control applications. PROFINET depends on established IT standards for network management and teleservice. Particulary to automation control engineering it offers a special security concept. Special industrial network technology consisting of active network components, cables and connection systems, together with recommendations for installation, complete the concept. This book serves as an introduction to PROFINET technology. Configuring engineers, commissioning engineers and technicians are given an overview of the concept and the fundamentals they need to solve PROFINET-based automation tasks. Technical relationships and practical applications are described using SIMATIC products as example.

The Industrial Ethernet Networking Guide

Understanding the Infrastructure Connecting Business Enterprises, Factory Automation, and Control Systems

Author: Donald J. Sterling,Steven P. Wissler

Publisher: Delmar Pub

ISBN: 9780766842106

Category: Technology & Engineering

Page: 331

View: 1543

Discover the power of industrial Ethernet (or "iE"), an affordable, open, and universal alternative to nearly 230 fieldbus protocols currently available for industrial control! The only book of its kind, The Industrial Ethernet Networking Guide paints an in-depth picture of key iE technologies, components, and functions. Gleaning information from industrial automation and Ethernet technology, the authors show readers how this new technology can be used across the corporate enterprise to enable a wealth of productivity improvements, as well as e-business, supply-chain, and agile/virtual manufacturing solutions. This highly engaging, fast-paced Guide begins by discussing the "Ethernet Communication Revolution" as a new framework for factory-to-business infrastructure, taking into account factors in networking the factory floor, as well as potential benefits and limitations of an iE solution. Subsequent chapters detail how to create an iE control network and enable valuable interconnection solutions, from factory-focused remote monitoring and wireless capabilities to VMI and ERP e-business solutions. This unbiased, factory perspective equips all readers – including plant managers, process control engineers and other IT professionals, senior executives, technical consultants and more – with a common base of knowledge to draw upon when planning their own iE network and solutions.

Hacking mit Security Onion

Sicherheit im Netzwerk überwachen: Daten erfassen und sammeln, analysieren und Angriffe rechtzeitig erkennen

Author: Chris Sanders,Jason Smith

Publisher: Franzis Verlag

ISBN: 3645204962

Category: Computers

Page: 560

View: 6581

Sie können noch so viel in Hardware, Software und Abwehrmechanismen investieren, absolute Sicherheit für Ihre IT-Infrastruktur wird es nicht geben. Wenn Hacker sich wirklich anstrengen, werden sie auch in Ihr System gelangen. Sollte das geschehen, müssen Sie sowohl technisch als auch organisatorisch so aufgestellt sein, dass Sie die Gegenwart eines Hackers erkennen und darauf reagieren können. Sie müssen in der Lage sein, einen Zwischenfall zu deklarieren und die Angreifer aus Ihrem Netzwerk zu vertreiben, bevor sie erheblichen Schaden anrichten. Das ist Network Security Monitoring (NSM). Lernen Sie von dem leitenden Sicherheitsanalytiker Sanders die Feinheiten des Network Security Monitoring kennen. Konzepte verstehen und Network Security Monitoring mit Open-Source-Tools durchführen: Lernen Sie die drei NSM-Phasen kennen, um diese in der Praxis anzuwenden. Die praktische Umsetzung der NSM erfolgt mit vielen Open-Source-Werkzeugen wie z. B. Bro, Daemonlogger, Dumpcap, Justniffer, Honeyd, Httpry, Netsniff-NG, Sguil, SiLK, Snorby Snort, Squert, Suricata, TShark und Wireshark. Anhand von ausführlichen Beispielen lernen Sie, die Tools effizient in Ihrem Netzwerk einzusetzen.

Industrial Ethernet in der Automatisierungstechnik

Planung und Einsatz von Ethernet-LAN-Techniken im Umfeld von SIMATIC-Produkten

Author: Mark Metter,Rainer Bucher

Publisher: John Wiley & Sons

ISBN: 3895786896

Category: Science

Page: 392

View: 4083

Industrial Ethernet ist schon heute fester Bestandteil eines industriellen Netzwerkes. Durch die Echtzeitfähigkeit von PROFINET wird Ethernet nun auch der Standard für die Anbindung von Feldkomponenten und Antriebstechnik. Damit das von Büroanwendungen geprägte Ethernet auch industrietauglich wird, müssen industrielle Anforderungen wie Verfügbarkeit, Echtzeitfähigkeit und Robustheit erfüllt werden. Dieses Buch vermittelt Anlagenplanern und -betreibern, Programmierern und Inbetriebsetzern die Grundlagen und Begriffe für den Einsatz von Ethernet-LAN-Techniken in der Industrieautomatisierung mit SIMATIC. Die Autoren beschreiben neben Grundlagen und Projektierung auch die Diagnose eines TCP/IP basierten Netzwerkes sowie die Fokusthemen wie IT Security und Wireless-Anwendungen. Außerdem wird auf die aktuellen Komponenten und Übertragungsmedien in der SIMATIC eingegangen. So erhält der Leser einen schnellen und praxisnahen Einstieg in das Thema. 2. Auflage, (Titel der 1. Auflage: "IT in der Industrieautomatisierung")

IP Network-based Multi-agent Systems for Industrial Automation

Information Management, Condition Monitoring and Control of Power Systems

Author: David P. Buse,Q.H. Wu

Publisher: Springer Science & Business Media

ISBN: 1846286476

Category: Technology & Engineering

Page: 187

View: 7840

This book details the use of the Internet protocol suite and multi-agent systems for the information management, online monitoring, and control of distributed power system substations. It proposes an open architecture for information management and control, based on the concepts of multi-agent systems and mobile agents. Mobile agents are applied to the retrieval and analysis of substation data and to remote operator intervention.

Automatisieren mit PROFINET

Industrielle Kommunikation auf Basis von Industrial Ethernet

Author: Raimond Pigan,Mark Metter

Publisher: John Wiley & Sons

ISBN: 3895789496

Category: Science

Page: 486

View: 2205

PROFINET is the first integrated Industrial Ethernet Standard for automation, and utilizes the advantages of Ethernet and TCP/IP for open communication from the corporate management level to the process itself. PROFINET CBA divides distributed, complex applications into autonomous units of manageable size. Existing fieldbuses such as PROFIBUS and AS-Interface can be integrated using so-called proxies. This permits separate and cross-vendor development, testing and commissioning of individual plant sections prior to the integration of the solution as a whole. PROFINET IO, with its particularly fast real-time communication, fulfills all demands currently placed on the transmission of process data and enables easy integration of existing fieldbus systems. Isochronous real-time (IRT) is used for isochronous communication in motion control applications. PROFINET depends on established IT standards for network management and teleservice. Particulary to automation control engineering it offers a special security concept. Special industrial network technology consisting of active network components, cables and connection systems, together with recommendations for installation, complete the concept. This book serves as an introduction to PROFINET technology. Configuring engineers, commissioning engineers and technicians are given an overview of the concept and the fundamentals they need to solve PROFINET-based automation tasks. Technical relationships and practical applications are described using SIMATIC products as example.

Network Security Principles and Practices

Author: Saadat Malik

Publisher: Cisco Press

ISBN: 9781587050251

Category: Computers

Page: 774

View: 1461

Expert solutions for securing network infrastructures and VPNs Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments Understand the inner workings of the Cisco PIX Firewall and analyze in-depth Cisco PIX Firewall and Cisco IOS Firewall features and concepts Understand what VPNs are and how they are implemented with protocols such as GRE, L2TP, and IPSec Gain a packet-level understanding of the IPSec suite of protocols, its associated encryption and hashing functions, and authentication techniques Learn how network attacks can be categorized and how the Cisco IDS is designed and can be set upto protect against them Control network access by learning how AAA fits into the Cisco security model and by implementing RADIUS and TACACS+ protocols Provision service provider security using ACLs, NBAR, and CAR to identify and control attacks Identify and resolve common implementation failures by evaluating real-world troubleshooting scenarios As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. In today's networked era, information is an organization's most valuable resource. Lack of customer, partner, and employee access to e-commerce and data servers can impact both revenue and productivity. Even so, most networks do not have the proper degree of security. Network Security Principles and Practices provides an in-depth understanding of the policies, products, and expertise that brings organization to this extremely complex topic and boosts your confidence in the performance and integrity of your network systems and services. Written by the CCIE engineer who wrote the CCIE Security lab exam and who helped develop the CCIE Security written exam, Network Security Principles and Practices is the first book to help prepare candidates for the CCIE Security exams. Network Security Principles and Practices is a comprehensive guide to network security threats and the policies and tools developed specifically to combat those threats. Taking a practical, applied approach to building security into networks, the book shows you how to build secure network architectures from the ground up. Security aspects of routing protocols, Layer 2 threats, and switch security features are all analyzed. A comprehensive treatment of VPNs and IPSec is presented in extensive packet-by-packet detail. The book takes a behind-the-scenes look at how the Cisco PIX(r) Firewall actually works, presenting many difficult-to-understand and new Cisco PIX Firewall and Cisco IOS(r) Firewall concepts. The book launches into a discussion of intrusion detection systems (IDS) by analyzing and breaking down modern-day network attacks, describing how an IDS deals with those threats in general, and elaborating on the Cisco implementation of IDS. The book also discusses AAA, RADIUS, and TACACS+ and their usage with some of the newer security implementations such as VPNs and proxy authentication. A complete section devoted to service provider techniques for enhancing customer security and providing support in the event of an attack is also included. Finally, the book concludes with a section dedicated to discussing tried-and-tested troubleshooting tools and techniques that are not only invaluable to candidates working toward their CCIE Security lab exam but also to the security network administrator running the operations of a network on a daily basis.

Security and Protection in Information Processing Systems

IFIP 18th World Computer Congress : TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France

Author: Yves Deswarte,Frederic Cuppens,Sushil Jajodia,Lingyu Wang

Publisher: Springer Science & Business Media

ISBN: 1402081421

Category: Computers

Page: 548

View: 4358

Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance between future technology improvements and day-to-day security management has contributed to better understanding between researchers, solution providers and practitioners, making this forum lively and fruitful. Security and Protection in Information Processing Systems contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.

Integration Technologies for Industrial Automated Systems

Author: Richard Zurawski

Publisher: CRC Press

ISBN: 1420009044

Category: Computers

Page: 600

View: 6731

If there exists a single term that summarizes the key to success in modern industrial automation, the obvious choice would be integration. Integration is critical to aligning all levels of an industrial enterprise and to optimizing each stratum in the hierarchy. While many books focus on the technological components of enterprise information systems, Integration Technologies for Industrial Automated Systems is the first book to present a comprehensive picture of the technologies, methodologies, and knowledge used to integrate seamlessly the various technologies underlying modern industrial automation and information systems. In chapters drawn from two of Zurawski's popular works, The Industrial Communication Technology Handbook and The Industrial Information Technology Handbook, this practical guide offers tutorials, surveys, and technology overviews contributed by experts from leading industrial and research institutions from around the world. The book is organized into sections for cohesive and comprehensive treatment. It examines e-technologies, software and IT technologies, communication network-based technologies, agent-based technologies, and security in detail as well as their role in the integration of industrial automated systems. For each of these areas, the contributors discuss emerging trends, novel solutions, and relevant standards. Charting the course toward more responsive and agile enterprise, Integration Technologies for Industrial Automated Systems gives you the tools to make better decisions and develop more integrated systems.

Industrial Process Automation Systems

Design and Implementation

Author: B.R. Mehta,Y. Jaganmohan Reddy

Publisher: Butterworth-Heinemann

ISBN: 0128010983

Category: Technology & Engineering

Page: 668

View: 8410

Industrial Process Automation Systems: Design and Implementation is a clear guide to the practicalities of modern industrial automation systems. Bridging the gap between theory and technician-level coverage, it offers a pragmatic approach to the subject based on industrial experience, taking in the latest technologies and professional practices. Its comprehensive coverage of concepts and applications provides engineers with the knowledge they need before referring to vendor documentation, while clear guidelines for implementing process control options and worked examples of deployments translate theory into practice with ease. This book is an ideal introduction to the subject for junior level professionals as well as being an essential reference for more experienced practitioners. Provides knowledge of the different systems available and their applications, enabling engineers to design automation solutions to solve real industry problems. Includes case studies and practical information on key items that need to be considered when procuring automation systems. Written by an experienced practitioner from a leading technology company

Industrial Wireless Sensor Networks

Applications, Protocols, and Standards

Author: V. Ça?r? Güngör,Gerhard P. Hancke

Publisher: CRC Press

ISBN: 1351832506

Category: Computers

Page: 406

View: 8689

The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies’ competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outlines future directions for research. What Are the Main Challenges in Developing IWSN Systems? Featuring contributions by researchers around the world, this book explores the software and hardware platforms, protocols, and standards that are needed to address the unique challenges posed by IWSN systems. It offers an in-depth review of emerging and already deployed IWSN applications and technologies, and outlines technical issues and design objectives. In particular, the book covers radio technologies, energy harvesting techniques, and network and resource management. It also discusses issues critical to industrial applications, such as latency, fault tolerance, synchronization, real-time constraints, network security, and cross-layer design. A chapter on standards highlights the need for specific wireless communication standards for industrial applications. A Starting Point for Further Research Delving into wireless sensor networks from an industrial perspective, this comprehensive work provides readers with a better understanding of the potential advantages and research challenges of IWSN applications. A contemporary reference for anyone working at the cutting edge of industrial automation, communication systems, and networks, it will inspire further exploration in this promising research area.

Industrial Cybersecurity

Efficiently secure critical infrastructure systems

Author: Pascal Ackerman

Publisher: Packt Publishing Ltd

ISBN: 1788395980

Category: Computers

Page: 456

View: 1053

Your one-step guide to understanding industrial cyber security, its control systems, and its operations. About This Book Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices Filled with practical examples to help you secure critical infrastructure systems efficiently A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systems Who This Book Is For If you are a security professional and want to ensure a robust environment for critical infrastructure systems, this book is for you. IT professionals interested in getting into the cyber security domain or who are looking at gaining industrial cyber security certifications will also find this book useful. What You Will Learn Understand industrial cybersecurity, its control systems and operations Design security-oriented architectures, network segmentation, and security support services Configure event monitoring systems, anti-malware applications, and endpoint security Gain knowledge of ICS risks, threat detection, and access management Learn about patch management and life cycle management Secure your industrial control systems from design through retirement In Detail With industries expanding, cyber attacks have increased significantly. Understanding your control system's vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed. Style and approach A step-by-step guide to implement Industrial Cyber Security effectively.

Die Vierte Industrielle Revolution

Author: Klaus Schwab

Publisher: Pantheon Verlag

ISBN: 3641203171

Category: Business & Economics

Page: 240

View: 4017

Die größte Herausforderung unserer Zeit Ob selbstfahrende Autos, 3-D-Drucker oder Künstliche Intelligenz: Aktuelle technische Entwicklungen werden unsere Art zu leben und zu arbeiten grundlegend verändern. Die Vierte Industrielle Revolution hat bereits begonnen. Ihr Merkmal ist die ungeheuer schnelle und systematische Verschmelzung von Technologien, die die Grenzen zwischen der physischen, der digitalen und der biologischen Welt immer stärker durchbrechen. Wie kein anderer ist Klaus Schwab, der Vorsitzende des Weltwirtschaftsforums, in der Lage aufzuzeigen, welche politischen, wirtschaftlichen, sozialen und kulturellen Herausforderungen diese Revolution für uns alle mit sich bringt.

Die Kunst der Anonymität im Internet

So schützen Sie Ihre Identität und Ihre Daten

Author: Kevin D. Mitnick

Publisher: MITP-Verlags GmbH & Co. KG

ISBN: 3958456375

Category: Computers

Page: 320

View: 9493

Ob Sie wollen oder nicht – jede Ihrer Online-Aktivitäten wird beobachtet und analysiert Sie haben keine Privatsphäre. Im Internet ist jeder Ihrer Klicks für Unternehmen, Regierungen und kriminelle Hacker uneingeschränkt sichtbar. Ihr Computer, Ihr Smartphone, Ihr Auto, Ihre Alarmanlage, ja sogar Ihr Kühlschrank bieten potenzielle Angriffspunkte für den Zugriff auf Ihre Daten. Niemand kennt sich besser aus mit dem Missbrauch persönlicher Daten als Kevin Mitnick. Als von der US-Regierung ehemals meistgesuchter Computer-Hacker kennt er alle Schwachstellen und Sicherheitslücken des digitalen Zeitalters. Seine Fallbeispiele sind spannend und erschreckend: Sie werden Ihre Aktivitäten im Internet neu überdenken. Mitnick weiß aber auch, wie Sie Ihre Daten bestmöglich schützen. Er zeigt Ihnen anhand zahlreicher praktischer Tipps und Schritt-für-Schritt-Anleitungen, was Sie tun können, um online und offline anonym zu sein. Bestimmen Sie selbst über Ihre Daten. Lernen Sie, Ihre Privatsphäre im Internet zu schützen. Kevin Mitnick zeigt Ihnen, wie es geht. Hinterlassen Sie keine Spuren ● Sichere Passwörter festlegen und verwalten ● Mit dem Tor-Browser im Internet surfen, ohne Spuren zu hinterlassen ● E-Mails und Dateien verschlüsseln und vor fremden Zugriffen schützen ● Öffentliches WLAN, WhatsApp, Facebook & Co. sicher nutzen ● Sicherheitsrisiken vermeiden bei GPS, Smart-TV, Internet of Things und Heimautomation ● Eine zweite Identität anlegen und unsichtbar werden