Banner Avatar
Solution

Security Engineering

Only hardened systems are secure systems

Contact
info.security[at]t-systems.com
Support

Contact our experts

Global access to confidential data via different network infrastructures and with any device: The required security levels for globally active corporations are hard to achieve with standard market hardware and software. Security engineering focuses on working with sensitive information in a highly secure environment right from the start during the system planning phase and then later during operation as well.
According to virus protection software provider Symantec, 2013 was the year of “mega hacks”. Even if there were “only” eight cases of large-scale data theft in Germany, there were eight cases too many. And that only includes publicly announced criminal activity. According to Symantec’s annual security report, around 552 million digital identities worldwide ended up in the wrong hands. In comparison, only one case involving around 10 million stolen data records was identified in 2012. The increasing mobilization of the digital world and the practice of outsourcing data to the cloud make security issues more complex.
It’s obvious that prevention is more than necessary. And this is gradually becoming clear to those involved in business as well. Risk awareness with a focus on critical ICT systems is growing in globally active industries like the financial sector and the automotive industry. The trend toward digitalizing and mobilizing business processes is sharpening companies’ focus on security and availability around the globe. When a company uses IT infrastructures, infrastructures to steer their company throughout all value-added phases, the success of their business depends on using proven, secure systems. Highly secure software systems become a key factor of success in view of cyber crime. Requirements on systems, software and security engineering are growing tremendously in the age of globalization.
Security engineering – Protecting IT systems with security technology
  • Use of symmetric and asymmetric encryption protocols
  • Secure generation and use of cryptographic keys
  • Optimization of security protocol performance
  • Use of high-performing cryptoservers for priority tasks
  • Development of crypto applications for chip cards
  • Some examples of key management systems:
  1. Case involving national certification by the German Federal Motor Transport Authority (KBA) for the European digital tachograph system
  2. Set up of security centers and cryptoservers for electronic toll collection systems
  • Development activities commissioned by the German Federal Office for Information Security for public authorities and public safety organizations
  • Crypto management: concept, specifications, implementation, test systems
  • Implementation of the root CA and BOS PKI trust center; BSI support in live operation
  • Development of the SNS standard for secure trans-network voice communication between TETRA, GSM and fixed-line
  • Use of the golden device as a test suite and reference system for manufacturers of SNS devices
  • Set-up of a gateway for transition from TETRA to the GSM/ISDN network
  • Development of a highly secure system to manage external service provider access to internal systems
  • Use of a ticket system to limit access in terms of time, space and function
  • All access is displayed accurately and can be monitored in real time
  • Test suite for automated conformity and protocol tests of broadband routers and gateways
  • Test suite for chip cards for public transportation commissioned by the VDV Association of German Transport Companies

Security engineering – security is an “enabler” and key factor of success

More and more corporate assets are being recorded, processed and saved electronically and then used to steer the company. Research results, patents, blueprints, price lists – how valuable is critical company data when theft of that data could threaten the existence of business activities? The Internet is making entirely new business models possible with security being an “enabler” in this process as well as a key factor of success at the same time.
Security engineering requires sound knowledge of cryptography and other security technologies that are indispensable when it comes to minimizing risks. Software is never be viewed separately here but rather as part of a larger whole. Security is a design feature that needs to be incorporated in both the development and operation process because security cannot be added at a later date to systems critical to business success! The decisions made early on in the security design process by security engineering experts are the only factors that can minimize system vulnerability to technical errors or attacks and up the costs involved in executing cyber attacks and manipulating systems and data.
T-Systems employs qualified security experts to develop highly secure systems. We collaborate closely with the German Federal Office for Information Security (BSI) to make sure that we only use standards and methods in our security engineering activities that comply with the highest standards in terms of technological innovation. For example, T-Systems developed a tamper-proof communication system that is currently being used by the police, fire department and rescue workers to protect residents, administration and businesses. The digital trunked radio technology is completely encrypted. The entire cryptographic system comprised of keys and trust center infrastructure was developed by the security engineering experts at T-Systems.

Security engineering uses asymmetrical encryption technology

Cryptography is used to secure data and processes. For example, asymmetrical encryption technology is used when a number of people who do not know each other personally want to conduct secure online business transactions. Or to use digital signatures to validate the legality and authenticity of documents. Technological processes make it easier to comply with legal requirements. For these processes to be effective, the cryptographic keys being used need to be generated, saved, assigned and used securely. That means companies need to operate effective key management systems.
Security engineering – preventing potential cases of loss
With Security engineering companies prevent possible cases of los from the beginning.
Data theft can cause three of five possible cases of loss: monetary damages, damages of reputation and legal damages. Security engineering hardens IT systems, so that they can sustain these threats.
Always up-to-date
Please enter a valid email address.
Topic subscription