Responsible for the module
Qualification goal
The module teaches basic concepts in the field of security of information technology systems with a particular focus on the areas of networked logistics systems. Networked logistics systems include source logistics, processing logistics, distribution logistics and disposal logistics. A state-of-the-art feature of modern logistics is the support of such systems by objects and methods of automation technology. Due to the inherent mobility of the goods moved in the system, information technology in the logistics environment offers an enormous target for cyber attacks and therefore a high risk.
Students acquire the qualification to
- assess the IT security of the components used in logistics systems
- to identify the vulnerabilities of logistics systems to common attack techniques
- to select automated mechanisms for attack detection appropriately
- to specify hardened logistics systems and to accompany them during construction and operation
- to assess the IT security of the components used in logistics systems
Contents
The subject-specific professional qualification and key skills are to be taught in the following areas in particular:
- Basics of attack techniques on logistical systems
- Basics of automated attack detection (e.g., intrusion detection, AI, bots, ants)
- Basics of risk minimization through the design of hardened logistical systems in the areas of:
- Vehicles on land, air, and sea (LLS)
- Infrastructure: sources, sinks, processing, transportation (vehicles LLS, pipe systems, lines), classes of goods: general cargo, liquid cargo, suction and bulk cargo, and data
- Local and distributed logistics accompanying IT
- Security-related evaluation and hardening of local and distributed logistics information systems using case studies
- IT security of embedded systems in logistics networks
Module components
The scope of the course is 2 TWS lecture, 1 TWS exercise for 6 CP.
Recommended literature
Pohlmann: Cyber-Sicherheit: Das Lehrbuch fu2r Konzepte, Prinzipien, Mechanismen, Architekturen und Eigenschaften von Cyber-Sicherheitssystemen in der Digitalisierung
Möller, Haas: Guide to Automotive Connectivity and Cybersecurity: Trends, Technologies, Innovations and Applications
Letzte Änderung: 11. February 2025