{"id":18263,"date":"2014-06-29T17:24:40","date_gmt":"2014-06-29T15:24:40","guid":{"rendered":"https:\/\/www.hiig.de\/?p=18263"},"modified":"2018-07-09T13:25:29","modified_gmt":"2018-07-09T11:25:29","slug":"on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task\/","title":{"rendered":"On IT-Infrastructure security as a complex, not necessarily complicated, task"},"content":{"rendered":"<p>Every society builds upon functioning infrastructures which are kept as free from bugs and manipulations as possible. That is all the more true when it comes to critical information infrastructures, i.e. information and communication technology, which can be conceived as nerve fibre and are vital to and of particular importance for society.<sup><a href=\"#f1\">[1]<\/a><\/sup> Data, information and knowledge of any kind are being exchanged via these infrastructures. The incapacity or destruction of such systems would have a debilitating impact on societal functions. The &#8220;Internet&#8221;, consisting of its many networks connected by peering has enormous significance for the individual, society, value chains and public management. \u00a0Yet, at the same time, they are an Achilles\u2019 heel of modern society.<\/p>\n<p>IT-security faced with the conditions of networked society and the Internet is a matter of security under the conditions of complex systems. Primarily, a system can be described as an entity of linked and interconnected elements (variables) which interacts with other systems, e.g. by being networked. The elements relate to each other in a certain manner of interaction and dependence. With an increasing degree of networking among the individual elements and the dynamics associated therewith, complexity increases. \u00a0With their chains of cause and effect complex systems lack transparency for observers and are not always readily comprehensible and transparent.<sup><a href=\"#f2\">[2]<\/a><\/sup><\/p>\n<p>The current basic conditions underlying IT security design are those of complex systems.<sup><a href=\"#f3\">[3]<\/a><\/sup> Just as when developing the internet, neither in case of critical infrastructures security were no essential parameter for the design.<sup><a href=\"#f4\">[4]<\/a><\/sup> Attacks from outside were not present in the risk scenarios (security perspective). Rather, one concentrated at the first place on the stability of the operational procedure (safety perspective). This model of security now meets changed basic conditions. Computers are ubiquitous and dependencies on IT processes make unpredictable cascading effects more likely, strong and innovative attackers work highly professional with instruments easier to handle, interlinked systems are rarely to isolate, by using manipulated hardware and software, technical norms and standards, IT security environments are compromisable and therefore inherently unsecure. Encryptions can be hacked too quickly and too frequently by brute-force-method. The list could be extended at will. The essential point is that the number of security gaps in all informations technologies and applications are classified by experts in unison as critical. Besides, they can in part hardly be found.<\/p>\n<p>By using intelligent networking i.e. with the aid of information and communication technologies in further areas of infrastructures optimizing processes and increasing productivity, complexity will further increase with a rising trend. For instance, cyber-physical systems<sup><a href=\"#f5\">[5]<\/a><\/sup> are discussed under catchwords as \u2018Internet of Things\u2019, \u2018Industry 4.0\u2019, \u2018Smart City\u2019, \u2018Smart Grids\u2019 and \u2018E-Health\u2019. Communication can no longer only be thought of one between persons but also between and among machines (<i>machine to machine<\/i>).<\/p>\n<p>Features of networked societies were and still are object of intense research in many areas. Considered from the historical point of view, cybernetics, from which are derived prevalent internet prefixes like in <i>cyber<\/i>security and the foundation of system theories, is that interdisciplinarity which is concerned with (self-)organisation, regulation and control of complex systems. Not coincidentally, one of the founding fathers, Norbert Wiener, experiences a noteworthy renaissance.<sup><a href=\"#f6\">[6]<\/a><\/sup> A key term of cybernetics is named <i>feedback<\/i>, i.e. a process, in which two parts are effected by information in a loop mechanism.<\/p>\n<p>The law, too, must adjust to the conditions of the network society.<sup><a href=\"#f7\">[7]<\/a><\/sup> The current European proposal for a directive to increase the network and information security across the European Union (NIS Directive) and the envisaged German IT security act (IT-SiG-E) do use an instrument which can be understood as similar to a feedback loop.<\/p>\n<p>Plans for regulations provide in each case to introduce the so-called incident notification (Art. 14 (2) NIS Directive Proposal resp. \u00a7 8b (4) IT-SiG-E). The operators of critical infrastructures shall notify to the Federal Office for Information Security (BSI) as competent authority incidents having a significant impact on the security of the core services they provide.<\/p>\n<p>In this respect it is consequent that democratically legitimated actors in the area of IT security can only make decisions on the basis of a valid overview of the situation and act accordingly.<sup><a href=\"#f8\">[8]<\/a><\/sup> The notifictions of cyber security incidents constitute information and knowledge at least enabling to gain a revised picture of the status of complex systems. Since both public and (predominantly) private actors on national, European and international level are involved in guaranteeing IT security, in future, an optimal information flow between all stakeholders in the area of law, technique and politics will be even more important. The knowledge of security gaps may help to build better systems.<\/p>\n<p>Remaining in the metaphor above, the challenge then would be to construct an architecture of a democratic feedback model. If the accumulated knowledge was distributed on a wide basis<sup><a href=\"#f9\">[9]<\/a><\/sup> and if a transparency according to a principle of a graduated public were created, complexity in systems critical for security could be coped with, security would be made verifiable, for example, by public discussion, code review and public security gaps databases and thereby more democratic.<sup><a href=\"#f1\">[1]<\/a><\/sup><\/p>\n<hr \/>\n<p><a name=\"f1\"><\/a><sup>1.<\/sup>\u00a0see for an example for ICT infrastructure and its dependency on energy as a meta-infrastructure: Bericht des Ausschusses f\u00fcr Bildung, Forschung und Technikfolgenabsch\u00e4tzung: Gef\u00e4hrdungen und Verletzungen morderner Gesellschaften &#8211; am Beispiel eines gro\u00dfr\u00e4umigen und langandauernden Ausfall der Stromversorgung, 2011, Drucksache 17\/5672; available here: <a href=\"http:\/\/dipbt.bundestag.de\/dip21\/btd\/17\/056\/1705672.pdf\">http:\/\/dipbt.bundestag.de\/dip21\/btd\/17\/056\/1705672.pdf<\/a>.<br \/>\n<a name=\"f2\"><\/a><sup>2.<\/sup>\u00a0see Niklas Luhmann, Die Gesellschaft der Gesellschaft, 1998, p. 144: \u201dOhne Beobachter gibt es keine Komplexit\u00e4t\u201d [\u201cThere is no complexity without observer\u201d].<br \/>\n<a name=\"f3\"><\/a><sup>3.<\/sup>\u00a0see Sandro Gaycken, Cybersicherheit in der Wissensgesellschaft: Zum Zusammenhang epistemischer und physischer Unsicherheit, in: Christopher Daase, Stefan Engert, Julian Junk (Hrsg.), Verunsicherte Gesellschaft &#8211; \u00dcberforderter Staat &#8211; Zum Wandel der Sicherheitskultur, S. 109 ff.<br \/>\n<a name=\"f4\"><\/a><sup>4.<\/sup>\u00a0for a succint description see Marjory S. Blumenthal \/ David D. Clark, Rethinking the Design of the Internet: the End-to-end Arguments vs. the Brave New World,&#8221; ACM Transactions on Internet Technology, Vol. 1, No. 1 (Aug. 2001), S. 70 ff. (93), die das Modell des fr\u00fchen Internets beschreiben als &#8220;a group of mutually trusting users attached to a transparent network&#8221;.<br \/>\n<a name=\"f5\"><\/a><sup>5.<\/sup>\u00a0see <a href=\"https:\/\/ec.europa.eu\/digital-agenda\/en\/cyber-physical-systems\">https:\/\/ec.europa.eu\/digital-agenda\/en\/cyber-physical-systems<\/a>.<br \/>\n<a name=\"f6\"><\/a><sup>6.<\/sup>\u00a0<a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2014\/06\/norbert-wiener-the-eccentric-genius-whose-time-may-have-finally-come-again\/372607\/\">http:\/\/www.theatlantic.com\/technology\/archive\/2014\/06\/norbert-wiener-the-eccentric-genius-whose-time-may-have-finally-come-again\/372607\/<\/a>; see from the perspective of Governance research: Guy Peters, Information and Governing: Cybernetic Models of Governance, in: Oxford Handbook of Governance, p. 113 et seqq.<br \/>\n<a name=\"f7\"><\/a><sup>7.<\/sup>\u00a0see Karl-Heinz Ladeur, Das Recht der Netzwerkgesellschaft, ed. by Thomas Vesting und Ino Augsberg, 2013.<br \/>\n<a name=\"f8\"><\/a><sup>8.<\/sup>\u00a0in this sense see, for example, \u00a0German Federal Constitutional Court \u00a0on the collection and processing of data for statistical purposes, BVerfGE 65, 1 (47) &#8211; \u201cVolkz\u00e4hlungsurteil\u201d: \u201cDie Statistik hat erhebliche Bedeutung f\u00fcr eine staatliche Politik, die den Prinzipien und Richtlinien des Grundgesetzes verpflichtet ist. Wenn die \u00f6konomische und soziale Entwicklung nicht als unab\u00e4nderliches Schicksal hingenommen, sondern als permanente Aufgabe verstanden werden soll, bedarf es einer umfassenden, kontinuierlichen sowie laufend aktualisierten Information \u00fcber die wirtschaftlichen, \u00f6kologischen und sozialen Zusammenh\u00e4nge. Erst die Kenntnis der relevanten Daten und die M\u00f6glichkeit, die durch sie vermittelten Informationen mit Hilfe der Chancen, die eine automatische Datenverarbeitung bietet, f\u00fcr die Statistik zu nutzen, schafft die f\u00fcr eine am Sozialstaatsprinzip orientierte staatliche Politik unentbehrliche Handlungsgrundlage\u201d.<br \/>\n<a name=\"f9\"><\/a><sup>9.<\/sup>\u00a0see for this tendency the European legislation and the Directive on the re-use of Public Sector Information: <a href=\"http:\/\/ec.europa.eu\/digital-agenda\/en\/european-legislation-reuse-public-sector-information\">http:\/\/ec.europa.eu\/digital-agenda\/en\/european-legislation-reuse-public-sector-information<\/a>; see for the idea of \u201cGovernment As a Platform\u201d:Tim O\u2019Reilly, in: \u00a0Daniel Lathrop \/ Laurel Ruma (ed.), Open Government &#8211; Collaboration, Transparency, and Participation in Practice, 2. Chapter; available here: <a href=\"http:\/\/chimera.labs.oreilly.com\/books\/1234000000774\/index.html\">http:\/\/chimera.labs.oreilly.com\/books\/1234000000774\/index.html<\/a>.<br \/>\n<a name=\"f10\"><\/a><sup>10.<\/sup>\u00a0as an introduction see Zehnter Zwischenbericht der Enquete-Kommission \u201cInternet und digitale Gesellschaft\u201d &#8211; Interoperabilit\u00e4t, Standards, Freie Software, BT-Drs. 17\/12495, in particular p. 44 et seq.; available here: <a href=\"http:\/\/dipbt.bundestag.de\/dip21\/btd\/17\/124\/1712495.pdf\">http:\/\/dipbt.bundestag.de\/dip21\/btd\/17\/124\/1712495.pdf<\/a>.<br \/>\n<sup>Image<\/sup> <a href=\"https:\/\/www.flickr.com\/photos\/argonavigo\/5320119828\/in\/photolist-nMHdaE-jSVSGB-jxjD6v-cLAmxL-8zyWoi-9781gW-86xgjK-7FdLM7-7vVZvL-7vVZ15-7vSaPB-7vVYH9\/\" target=\"_blank\" rel=\"noopener\">flickr<\/a>, Armando G Alonso, Complexity of Railways in Paris<\/p>\n<h4>This post is part of a weekly series of articles by <a title=\"Doctoral Programme\" href=\"https:\/\/www.hiig.de\/en\/doctoral-programme\/\">doctoral candidates<\/a> of the Alexander von Humboldt Institute for Internet and Society. It does not necessarily represent the view of the Institute itself. For more information about the topics of these articles and associated research projects, please contact <a href=\"mailto:presse@hiig.de\">presse@hiig.de<\/a>.<\/h4>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fon-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=On%20IT-Infrastructure%20security%20as%20a%20complex%2C%20not%20necessarily%20complicated%2C%20task https%3A%2F%2Fwww.hiig.de%2Fen%2Fon-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fon-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task%2F&subject=On%20IT-Infrastructure%20security%20as%20a%20complex%2C%20not%20necessarily%20complicated%2C%20task\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>Every society builds upon functioning infrastructures which are kept as free from bugs and manipulations as possible. That is all the more true when it comes to critical information infrastructures, i.e. information and communication technology, which can be conceived as nerve fibre and are vital to and of particular importance for society.[1] Data, information and&hellip;<\/p>\n","protected":false},"author":50,"featured_media":18264,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[227,226],"tags":[],"class_list":["post-18263","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-everyday-life","category-knowledge"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>On IT-Infrastructure security as a complex, not necessarily complicated, task &#8211; Digital Society Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"On IT-Infrastructure security as a complex, not necessarily complicated, task &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"Every society builds upon functioning infrastructures which are kept as free from bugs and manipulations as possible. That is all the more true when it comes to critical information infrastructures, i.e. information and communication technology, which can be conceived as nerve fibre and are vital to and of particular importance for society.[1] Data, information and&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-29T15:24:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-07-09T11:25:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2014\/06\/hfl1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"404\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hannfried Leisterer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hannfried Leisterer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"On IT-Infrastructure security as a complex, not necessarily complicated, task &#8211; Digital Society Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task\/","og_locale":"en_US","og_type":"article","og_title":"On IT-Infrastructure security as a complex, not necessarily complicated, task &#8211; Digital Society Blog","og_description":"Every society builds upon functioning infrastructures which are kept as free from bugs and manipulations as possible. That is all the more true when it comes to critical information infrastructures, i.e. information and communication technology, which can be conceived as nerve fibre and are vital to and of particular importance for society.[1] Data, information and&hellip;","og_url":"https:\/\/www.hiig.de\/en\/on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task\/","og_site_name":"HIIG","article_published_time":"2014-06-29T15:24:40+00:00","article_modified_time":"2018-07-09T11:25:29+00:00","og_image":[{"width":640,"height":404,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2014\/06\/hfl1.jpg","type":"image\/jpeg"}],"author":"Hannfried Leisterer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hannfried Leisterer","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task\/"},"author":{"name":"Hannfried Leisterer","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/be2f0008393292dc0ae9646459502bb2"},"headline":"On IT-Infrastructure security as a complex, not necessarily complicated, task","datePublished":"2014-06-29T15:24:40+00:00","dateModified":"2018-07-09T11:25:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task\/"},"wordCount":1340,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","articleSection":["Everyday Life","Knowledge"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task\/","url":"https:\/\/www.hiig.de\/en\/on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task\/","name":"On IT-Infrastructure security as a complex, not necessarily complicated, task &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","datePublished":"2014-06-29T15:24:40+00:00","dateModified":"2018-07-09T11:25:29+00:00","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","width":640,"height":404},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/on-it-infrastructure-security-as-a-complex-not-necessarily-complicated-task\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"On IT-Infrastructure security as a complex, not necessarily complicated, task"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/be2f0008393292dc0ae9646459502bb2","name":"Hannfried Leisterer"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/18263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=18263"}],"version-history":[{"count":7,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/18263\/revisions"}],"predecessor-version":[{"id":49946,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/18263\/revisions\/49946"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/18264"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=18263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=18263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=18263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}