{"id":483,"date":"2016-11-01T00:10:08","date_gmt":"2016-10-31T23:10:08","guid":{"rendered":"http:\/\/e3mag.com\/?p=483"},"modified":"2022-05-01T08:12:25","modified_gmt":"2022-05-01T06:12:25","slug":"the-final-technology-to-solve-all-it-security-problems-part-42","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/die-finale-technologie-zur-loesung-aller-it-sicherheitsprobleme-teil-42\/","title":{"rendered":"The final technologies to solve all IT security problems"},"content":{"rendered":"<p>But just as theory differs from practice, one must distinguish between technology and its implementation.<\/p>\n<p>A technology that is recognized as \"safe\" according to the current state of research may nevertheless be unsafe in a concrete implementation.<\/p><div id=\"great-3662043009\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>This is what happens with public key infrastructures (PKI). The theory behind it - i.e. <span id=\"urn:local-text-annotation-uvoxb0haxil5agoc482vt2qlro6tn8z9\" class=\"textannotation disambiguated wl-thing\">symmetrical<\/span> and asymmetric encryption, digital <span id=\"urn:local-text-annotation-xtzy2z6styc841n9mzkj4sspyjx5b9mv\" class=\"textannotation disambiguated wl-thing\">Signatures<\/span> and certificates - are established and proven technologies.<\/p>\n<p>Nevertheless, the implementation of PKI has weak points. In this specific case, two \"certificate authorities\", namely Startcom and Wosign, issued false or at least questionable certificates.<\/p>\n<p>The technology behind it worked flawlessly.<\/p>\n<p>Nevertheless, the incorrect or improper use or implementation created a security problem.<\/p>\n<p>So if you limit yourself to just the technology view, everything was flawless - yet there were gaps in the implementation and thus security problems.<\/p>\n<p>Insecure certificates despite secure cryptography. Now cryptographic algorithms and <span id=\"urn:local-text-annotation-6uh4y98rjr68lkyek215466xtcr0gi72\" class=\"textannotation disambiguated wl-thing\">PKI<\/span>, at least in our IT age, very old. So to speak from the stone age of computer science...<\/p>\n<p>So the current technology buzzword is \"<span id=\"urn:local-text-annotation-170xdpys62zrw9epyjv8p6zrj1bh7pq6\" class=\"textannotation disambiguated wl-thing\">Machine Learning<\/span>\"especially in the IT security sector. If you believe some marketing statements, this makes <span id=\"urn:local-text-annotation-yqq3pgolkinndq0o6z95c80cu77of0be\" class=\"textannotation disambiguated wl-thing\">machine learning<\/span> all other technologies obsolete.<\/p>\n<p>But also <span id=\"urn:local-text-annotation-uyqbcjhgoeo7an2ts6c6xx0cad0mvklc\" class=\"textannotation disambiguated wl-thing\">ML<\/span> is \"only\" a technology. And strictly speaking, it's not even new: Many basic algorithms and procedures have been known for decades.<\/p>\n<p>Even though ML as a technology has a lot of potential, especially in detecting new unknown threats, it is well worth looking at the implementation.<\/p>\n<p>One of the most important factors in implementing ML is training.  This includes the amount and quality of training data as well as the training method.<\/p>\n<p>The quality of an ML implementation thus depends directly on the quality - and to some extent the quantity - of the training data. It is therefore not enough to have a good command of the pure technology ML.<\/p>\n<p>Rather, external factors, in this case the training data, also play a - if not \"the\" - decisive role. To put it casually: \"Garbage in, garbage out.\"<\/p>\n<h2>Machine Learning vs. Training<\/h2>\n<p>In addition to the \"technology\" dimension, there is suddenly another dimension to consider when evaluating ML implementations: the \"training set.\"<\/p>\n<p>This is an example of how a technology must always be evaluated in the context of its implementation.<\/p>\n<p>Another aspect that implementation can throw a spanner in the works is \"false positives\". That is, legitimate content that is incorrectly classified as undesirable.<\/p>\n<p>Many ML algorithms historically suffer from this problem. They may very efficiently detect new threats that other technologies do not, but at the same time report a lot of harmless content as dangerous.<\/p>\n<p>In the context of an optimization, therefore, further noise reduction measures are often used.<\/p>\n<p>The influence of new technologies is indispensable for IT security. If only to be able to meet the creativity of cybercriminals on an equal footing.<\/p>\n<p>However, technology affiliation does not lead to the desired results. The implementation and its context must always be considered.<\/p>\n<p>If this is not done, there is always the danger of creating the impression of a \"perfect\" technology. A theory that is all too often disenchanted by practical implementation.<\/p>\n<p><a href=\"https:\/\/e3mag.com\/partners\/trend-micro-deutschland-gmbh\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" title=\"The final technologies to solve all it security problems\" class=\"aligncenter wp-image-11382 size-full\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-TREND-MICRO.jpg\" alt=\"https:\/\/e3mag.com\/partners\/trend-micro-deutschland-gmbh\/\" width=\"1000\" height=\"112\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-TREND-MICRO.jpg 1000w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-TREND-MICRO-768x86.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-TREND-MICRO-100x11.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-TREND-MICRO-480x54.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-TREND-MICRO-640x72.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-TREND-MICRO-720x81.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-TREND-MICRO-960x108.jpg 960w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Whether touted as the \"Holy Grail,\" the \"Egg-Laying Wooly Pig\" or the \"Silver Bullet: Every year, new technologies are presented at IT security trade fairs that supposedly solve all security problems better and more cost-effectively than anything before.<\/p>","protected":false},"author":52,"featured_media":2451,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[7,21,731],"tags":[481,485,480,117,478],"coauthors":[24313],"class_list":["post-483","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-meinung","category-it-security","category-mag1611","tag-algorithmen","tag-cyberkriminalitaet","tag-machine-learning","tag-sicherheit","tag-technologie","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",400,172,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-768x331.jpg",768,331,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-100x43.jpg",100,43,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-480x207.jpg",480,207,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-640x276.jpg",640,276,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-720x310.jpg",720,310,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-960x414.jpg",960,414,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",600,259,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security.jpg",600,259,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/It-Security-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Ob nun als \u201eHeiliger Gral\u201c, \u201eeierlegende Wollmilchsau\u201c oder \u201eSilver Bullet\u201c angepriesen: Jedes Jahr aufs Neue finden sich auf IT-Security-Messen neue Technologien, die angeblich alle Sicherheitsprobleme besser und kosteng\u00fcnstiger l\u00f6sen als alles zuvor.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/meinung\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/meinung\/it-security\/\" rel=\"category tag\">IT-Security Kolumne<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag1611\/\" rel=\"category tag\">MAG 16-11<\/a>","author_info_v2":{"name":"Raimund Genes, Trend Micro","url":"https:\/\/e3mag.com\/en\/author\/raimund-genes\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/52"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=483"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/483\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/2451"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=483"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}