{"id":55816,"date":"2019-02-07T08:00:39","date_gmt":"2019-02-07T07:00:39","guid":{"rendered":"http:\/\/e3mag.com\/?p=55816"},"modified":"2020-02-09T15:21:45","modified_gmt":"2020-02-09T14:21:45","slug":"security-ascent","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/security-ascent\/","title":{"rendered":"Security Ascent"},"content":{"rendered":"<p>Everything used to be better! Networks were secured with packet filters, far down in the OSI reference model (on layer 3 or 4). Access rights were regulated on machine or operating system level, programming was done in assembler or C - all nice and low-level!<\/p>\n<p>Ah, the good old days, when we still had a net perimeter and clear enemy images: outside was bad, inside was good - and viruses were caught via infected floppy disks!<\/p><div id=\"great-2579649311\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>At that time, \"all areas of security\" - i.e. firewall and virus protection - were covered by a single admin, who was also responsible for the administration of the (of course internal) mail server (UNIX sendmail - no Exchange!).<\/p>\n<h3>Emancipation and valence<\/h3>\n<p>But let's face it: (in)security has moved up - up in the layers of the OSI reference model. Most attacks today take place at the presentation or even application layer.<\/p>\n<p>For security managers, this development means that it is no longer enough to deal with networks, firewalls and a handful of operating systems to protect corporate networks, applications and users.<\/p>\n<p>They must be familiar with the peculiarities and special requirements of a wide range of applications - and often better than their users. Today's security experts no longer resemble general practitioners, but rather vascular surgeons.<\/p>\n<p>They often specialize in a particular aspect of the complex security stack we find in enterprises today: OS security, firewalls (\"application-aware, next generation,\" of course), IDS\/IPS, multi-factor authentication, cryptography, database security, cloud security, and more.<\/p>\n<p>Securing complex, heterogeneous enterprise IT infrastructures therefore usually requires a number of such highly specialized cyber security specialists.<\/p>\n<p>However, this veritable army of IT defenders must be recruited and trained somewhere and ideally have several years of relevant experience before CISOs entrust them with securing mission-critical IT systems. Unfortunately, there are very few offerings in the academic environment that specifically address the complex of topics of IT security or even explicitly cyber security.<\/p>\n<h3>Teaching and research<\/h3>\n<p>This lack of non-commercial training opportunities creates a problem that many companies are facing today: There are simply too few cyber security experts!<\/p>\n<p>ISACA (Information Systems Audit and Control Association), an association of international experts in the field of IT systems auditing, predicted back in 2016 that there would be a shortage of two million cyber security experts worldwide by 2019. Given the unexpectedly strong increase in hacking attacks, malware distribution and data theft, the actual number will be even higher.<\/p>\n<p>For those interested in technology, this cyber security know-how vacuum in turn means interesting career opportunities, attractive salaries and an almost free choice of exciting places to work, because the demand for cyber security experts is already growing about three times faster than the general demand for skilled workers in the IT segment. Security has taken on a lasting significance.<\/p>\n<p>These rosy prospects are, in my opinion, many times better if said future cyber security experts specialize analogous to brain-vascular surgeons: to SAP cyber security experts - security career advancement guaranteed!<\/p>","protected":false},"excerpt":{"rendered":"<p>The field of IT security must emancipate itself and raise its profile. It is not a luxury, but a necessity, which includes sound training and years of experience. Security is grown up!<\/p>","protected":false},"author":1510,"featured_media":15608,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[21,7,27178],"tags":[39,4780,1516],"coauthors":[22523],"class_list":["post-55816","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security","category-meinung","category-mag-1812","tag-cloud","tag-cyber-security","tag-security","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",400,172,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-768x331.jpg",768,331,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-100x43.jpg",100,43,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-480x207.jpg",480,207,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-640x276.jpg",640,276,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-720x310.jpg",720,310,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-960x414.jpg",960,414,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",600,259,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",600,259,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Das Aufgabengebiet IT-Security muss sich emanzipieren und in seiner Wertigkeit profilieren. Es ist kein Luxus, sondern Notwendigkeit, zu der auch eine fundierte Ausbildung und jahrelange Erfahrung geh\u00f6ren. Security ist erwachsen!<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/opinion\/it-security\/\" rel=\"category tag\">IT-Security Kolumne<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/opinion\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/likes-1812\/\" rel=\"category tag\">MAG 18-12<\/a>","author_info_v2":{"name":"J\u00f6rg Schneider-Simon, Bowbridge Software","url":"https:\/\/e3mag.com\/en\/author\/joerg-schneider\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/55816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/1510"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=55816"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/55816\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/15608"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=55816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=55816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=55816"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=55816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}