Information security of connected logistic Systems

Responsible for the module

Prof. Dr. Maria Maleshkova

Qualification goal

The module teaches basic concepts in the field of security of information technology systems with a particular focus on the areas of networked logistics systems. Networked logistics systems include source logistics, processing logistics, distribution logistics and disposal logistics. A state-of-the-art feature of modern logistics is the support of such systems by objects and methods of automation technology. Due to the inherent mobility of the goods moved in the system, information technology in the logistics environment offers an enormous target for cyber attacks and therefore a high risk.

Students acquire the qualification to

  • assess the IT security of the components used in logistics systems
  • to identify the vulnerabilities of logistics systems to common attack techniques
  • to select automated mechanisms for attack detection appropriately
  • to specify hardened logistics systems and to accompany them during construction and operation
  • to assess the IT security of the components used in logistics systems

Contents

The subject-specific professional qualification and key skills are to be taught in the following areas in particular:

  • Basics of attack techniques on logistical systems
  • Basics of automated attack detection (e.g., intrusion detection, AI, bots, ants)
  • Basics of risk minimization through the design of hardened logistical systems in the areas of:
    • Vehicles on land, air, and sea (LLS)
    • Infrastructure: sources, sinks, processing, transportation (vehicles LLS, pipe systems, lines), classes of goods: general cargo, liquid cargo, suction and bulk cargo, and data
  • Local and distributed logistics accompanying IT
  • Security-related evaluation and hardening of local and distributed logistics information systems using case studies
  • IT security of embedded systems in logistics networks

Module components

The scope of the course is 2 TWS lecture, 1 TWS exercise for 6 CP.

Recommended literature

Pohlmann: Cyber-Sicherheit: Das Lehrbuch fu2r Konzepte, Prinzipien, Mechanismen, Architekturen und Eigenschaften von Cyber-Sicherheitssystemen in der Digitalisierung

Möller, Haas: Guide to Automotive Connectivity and Cybersecurity: Trends, Technologies, Innovations and Applications

HSU

Letzte Änderung: 11. February 2025