Download-Material

Images

More Info

Studies & Reports

More Info


Images

The following material may be used free of charge, as long as it is related to the National Research Center for Applied Cybersecurity ATHENE. The images are to be marked with the copyright information »ATHENE«.


Studies & Reports

Privacy und Big Data

Die Analyse großer Datenmengen ermöglicht zahlreiche Verbesserungen – bei der Bekämpfung des Klimawandels ebenso wie in der Medizin. Gleichzeitig entstehen durch heutige Big-Data-Analysemöglichkeiten ganz neue Risiken für die Privatsphäre von Menschen. Fügt man beim Analysieren Datenmengen aus unterschiedlichen Quellen zusammen, kann man oftmals vermeintlich anonymisierte Daten zu persönlichen Profilen zusammenführen, mit teils unabsehbaren Folgen für die betroffenen Personen. Die Studie zeigt deshalb, wie Big-Data-Tech­no­logien genutzt werden können, ohne der Privatsphäre Einzelner zu schaden.

Download (PDF, 1,71 MB)


Eberbacher Gespräch on AI, Security & Privacy

Trotz zahlreicher Innovationsmöglichkeiten zögern viele Unternehmen und Behörden noch bei der Nutzung von Künstlicher Intelligenz (KI) im Bereich Cybersicherheit. Ein wesen­tlicher Grund: Die Leistungsfähigkeit von Systemen ist oft nur schwer zu beurteilen. In diesem Bericht sind von Expertinnen und Experten aus Wissenschaft und Wirtschaft erarbeitete Empfehlungen zusammengefasst, wie Hindernisse für den KI-Einsatz überwunden werden können, etwa konkrete Qualitätskriterien und Prüfmöglichkeiten. 

Download (PDF, 741 KB)


System Security Mechanisms for Electric Vehicles and Charge Points Supporting ISO 15118 - Proposal for a Technical Guideline

This technical guideline provides recommendations for the secure operation of an emobility charging infrastructure. The focus is on system security of the Electric Vehicle (EV) and Charge Point (CP) / Electric Vehicle Supply Equipment (EVSE), with their respective communication control units, the Electric Vehicle Communication Controller (EVCC) and the Supply Equipment Communication Controller (SECC), as well as the secure usage of their communication protocols. Both systems are required to be equipped with a Hardware Security Module (HSM), providing a hardware trust anchor for secure storage and usage of their corresponding private credentials. The trust anchor is also used to provide more advanced security features like software integrity validation or secure firmware updates. Additional recommendations are given, aiming to increase the security of the communication between EVCC and SECC using ISO 15118 [10] as well as the backend communication of the SECC.

Download (PDF, 472KB)


Security Module for the Electric Vehicle Charging System - Proposal for a Protection Profile

In the field of eMobility, Electric Vehicles (EVs) are charged using a Charge Point (CP). To enable a trustworthy and reliable charging and billing process for the transferred electrical energy, data is exchanged between the vehicle and the CP through the charge cable and specific protocols are applied. Further, the CP is part of an infrastructure that connects the point on the one hand to the energy grid and to an energy provider, billing system, and other valueadded service providers on the other hand. The international standardisation system has created a basis for communication between an electric vehicle and the charging infrastructure in the form of international standard ISO/IEC15118, which is already in place. ISO/IEC15118 defines the communication between the electric vehicle and the CP. However, some protocols that are required for the value-added services are extensions of ISO/IEC15118.

Download (PDF 742 KB)


Eberbacher Gespräch: Next Generation Cryptography

From online-banking to the blockchain – most IT security mechanisms for protecting data and digital communication are based on cryptography. Quantum computers and new forms of attacks are threatening many of these IT security mechanisms. How businesses and society can protect the cyber-world from such devastating threats in the future was discussed by experts in the realm of business, research, and politics at the “Eberbacher Gespräch” on “Next Generation Cryptography”. The experts’ opinion: Cryptography must become more flexible in order to be able to react quickly to technical changes.

Download (PDF, 2,4 MB)