{"id":113378,"date":"2022-05-11T10:20:00","date_gmt":"2022-05-11T08:20:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=113378"},"modified":"2022-05-12T08:11:56","modified_gmt":"2022-05-12T06:11:56","slug":"sicherheitslage-im-cyberspace","status":"publish","type":"post","link":"https:\/\/e3mag.com\/de\/sicherheitslage-im-cyberspace\/","title":{"rendered":"Sicherheitslage im Cyberspace"},"content":{"rendered":"\n<p>Dazu geh\u00f6ren spezielle Intrusion-Prevention-Signaturen, Betriebssystem- und Gateway-Konfigurationseinstellungen, automatische Management-Reaktionen sowie Befehle zum dynamischen Blockieren von Angriffsquellen. Will man DDoS-Attacken in G\u00e4nze abwehren, empfiehlt sich ein sogenanntes Perimeter-Attack Mitigation Device. Das ist in der Lage, Unternehmen vor neuen Netzwerk- und Applikationsbedrohungen zu sch\u00fctzen. Dar\u00fcber hinaus sollte eine Reihe von Ma\u00dfnahmen immer auf der Checkliste stehen: der Schutz der Infrastruktur vor Netzwerk- und Anwendungsausf\u00e4llen, die Identifikation und Schlie\u00dfung von Anwendungsschwachstellen, die Pr\u00e4vention von Malware-Verbreitung und Netzwerkanomalien sowie eine Absicherung gegen Informationsdiebstahl. <\/p>\n\n\n\n<p>Lothar Geuenich, Regional Director Central Europe bei Check Point Software Technologies: <em>\u201eDie geopolitische Lage zeigt zweifellos, dass Kriege nicht mehr nur in der analogen, sondern zunehmend in der digitalen Welt ausgetragen werden. Dabei geraten auch Unternehmen und Organisationen, die auf den ersten Blick weder geografisch noch politisch direkt involviert sind, gezielt ins Visier von Cyber-angriffen. Verantwortliche in IT-Sicherheitsabteilungen m\u00fcssen sich auf eine Reihe von Angriffstypen einstellen, w\u00e4hrend sie, und das ist unerl\u00e4sslich, stets in engem Kontakt mit Strafverfolgungsbeh\u00f6rden, Nachrichtendiensten und Computer Emergency Response Teams, auch Incident Response Teams genannt, bleiben. Die Devise lautet stets: Pr\u00e4vention statt Reaktion. Reagieren bedeutet, dass ein Angriff bereits erfolgreich war und nun Schadensbegrenzung betrieben wird.\u201c<\/em><\/p><div class=\"great-fullsize-content-de\" style=\"float: left;\" id=\"great-2512387942\"><div id=\"great-2655393040\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"613\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/checkpoint_lothar_geuenich_800.jpg\" alt=\"Lothar Geuenich, checkpoint\" class=\"wp-image-113380\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/checkpoint_lothar_geuenich_800.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/checkpoint_lothar_geuenich_800-768x588.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/checkpoint_lothar_geuenich_800-100x77.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/checkpoint_lothar_geuenich_800-480x368.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/checkpoint_lothar_geuenich_800-640x490.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/checkpoint_lothar_geuenich_800-720x552.jpg 720w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption><em>Verantwortliche in IT-Sicherheitsabteilungen m\u00fcssen sich auf eine Reihe von Angriffstypen einstellen.<\/em> &#8211; <em>Lothar Geuenich, Regional Director Central Europe, Check Point Software Technologies<\/em><\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>DDoS-Attacken geh\u00f6ren zu den mitunter am h\u00e4ufigsten gemeldeten Angriffstypen. Nicht immer sind sie zu verhindern, doch es gibt Ma\u00dfnahmen, die sie signifikant abschw\u00e4chen k\u00f6nnen.<\/p>\n","protected":false},"author":38,"featured_media":113383,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,40563],"tags":[40583,5207],"coauthors":[19920],"class_list":["post-113378","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-22-04","tag-mag-22-04","tag-sapanoptikum","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/05\/shutterstock_1176723331-Funtap-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>DDoS-Attacken geh\u00f6ren zu den mitunter am h\u00e4ufigsten gemeldeten Angriffstypen. Nicht immer sind sie zu verhindern, doch es gibt Ma\u00dfnahmen, die sie signifikant abschw\u00e4chen k\u00f6nnen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/de\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/de\/category\/mag-22-04\/\" rel=\"category tag\">Mag 22-04<\/a>","author_info_v2":{"name":"E-3 Magazin","url":"https:\/\/e3mag.com\/de\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts\/113378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/comments?post=113378"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts\/113378\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/media\/113383"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/media?parent=113378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/categories?post=113378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/tags?post=113378"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/coauthors?post=113378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}