Scherb, Christopher
Lade...
E-Mail-Adresse
Geburtsdatum
Projekt
Organisationseinheiten
Berufsbeschreibung
Nachname
Scherb
Vorname
Christopher
Name
Christopher Scherb
5 Ergebnisse
Suchergebnisse
Gerade angezeigt 1 - 5 von 5
- PublikationTouching space: distributed ledger technology for tracking and tracing certificates(2023) Moriggl, Pascal; Asprion, Petra; Schneider, Bettina; Scherb, Christopher; Bui, Tung X. [in: Proceedings of the 56th Hawaii International Conference on System Sciences]Components built into space vehicles and equipment (space products) must meet different regulatory requirements; in detail, each component must be certified and sustainably traceable at all times. Space engineers have expressed the need for an interoperable system to collect, manage and route certifications for components, parts and materials that go into space products. The lack of a unified approach in the European space industry is a challenge for companies involved in product development. This research proposes an open-source, secure, fast and distributed ledger technology (DLT) based solution that fits into any IT environment and is well adapted to the needs of manufacturing companies in the space sector. The results show that a blockchain-based solution based on ‘Hyperledger Fabric’ combined with the InterPlanetary File System is viable. The results can guide other researchers and practitioners to consider DLTs when changing their certification management paradigm with suppliers, customers and auditors.04B - Beitrag Konferenzschrift
- PublikationA cyber attack simulation for teaching cybersecurity(2023) Scherb, Christopher; Heitz, Luc; Grimberg, Frank; Grieder, Hermann; Maurer, Marcel; Gerber, Aurona; Hinkelmann, Knut [in: Proceedings of Society 5.0 Conference 2023]With the rising number of cyberattacks, such as ransomware attacks and cyber espionage, educating non-cybersecurity professionals to recognize threats has become more important than ever before. However, traditional training methods, such as phishing awareness campaigns, training videos and assessments have proven to be less effective over time. Therefore, it is time to rethink the approach on how to train cyber awareness. In this paper we suggest an alternative approach -- a serious game -- to educate awareness for common cyberattacks. While many serious games for cybersecurity education exist, all follow a very similar approach: showing people the effects of a cyber attack on their own system or company network. For example, one of the main tasks in these games is to sort out phishing mails. We developed and evaluated a new type of cybersecurity game: an attack simulator, which shows the entire setting from a different perspective. Instead of sorting out phishing mails the players should write phishing mails to trick potential victims and use other forms of cyberattacks. Our game explains the intention of each attack and shows the consequences of a successful attack. This way, we hope, players will get a better understanding on how to detect cyberattacks.04B - Beitrag Konferenzschrift
- PublikationAgile management in cybersecurity(2023) Asprion, Petra; Giovanoli, Claudio; Scherb, Christopher; Bhat, Sourabha; Gerber, Aurona; Hinkelmann, Knut [in: Proceedings of Society 5.0 Conference 2023]Cybersecurity management has emerged as a topic of growing importance on a global scale. Applying traditional management practices to cybersecurity is often too cumbersome and can lead to significant delays. Today's enterprises must be able to adapt to ever-evolving digital threats and act with corresponding agility and flexibility. Agile methods are well suited for projects without a defined scope, duration, tasks, and resources and has been identified as suitable for meeting the management challenges of cybersecurity teams. Based on an in-depth literature review, this study assumed that adopting an agile approach to cybersecurity helps organizations manage cybersecurity effectively. A first prototypical model was developed and evaluated which combines agile methods with cybersecurity functions - based on a recognized reference model.04B - Beitrag Konferenzschrift
- PublikationSCoIoT: Swarm-Computations for the Internet of Things(IEEE, 2021) Scherb, Christopher; Bürklin, Pascal; Tschudin, Christian [in: 2021 International Conference on Computer Communications and Networks (ICCCN)]Nowadays, most network systems are based on fixed and reliable infrastructure, but with Internet of Things (IoT), smart home and smart city systems are used more and more in mobile scenarios and vehicles become connected. Often low power mobile devices are supported by cloud computing capabilities. However, infrastructure may not be available everywhere, where mobile devices are used and local information is often only required locally, thus do not need to be uploaded into the cloud. SCoIoT is based on novel Information Centric Networking communication pattern and is designed to support cooperative computations without requiring new infrastructure or even in absence of infrastructure due to the device to device communication pattern. Thereby, nodes voluntarily participate in computations and help to spread the computation to enable further nodes to participate in the computation and to share the results. SCoIoT utilizes Append-only-Log technology for synchronization and verification of requests and results.04B - Beitrag Konferenzschrift
- PublikationTangle centric networking(ACM, 2021) Scherb, Christopher; Grewe, Dennis; Tschudin, Christian [in: ICN '21. 8th ACM Conference on Information-Centric Networking]Today's Internet is heavily used for multimedia streaming from cloud backends, while the Internet of Things (IoT) challenges the traditional data flow, with high data volumes produced at the network edge. Information Centric Networking (ICN) advocates against a host-centric communication model using content identifiers decoupling content from a location, and therefore, promising for distributed edge computing environments. However, the resulting coupling of data to content identifiers in ICNs introduces new challenges regarding dissemination of large data volumes and services and synchronization across multiple consumers. We present Tangle Centric Networking (TCN) - a decentralized data structure for coordinated distribution of data and services for ICN deployments. TCN simplifies the management of data and service changes and updates them accordingly in network nodes using principles of Tangles. Using simulations, first implementations of TCN show improvements in data discovery as well as less synchronization overhead of large volumes of data compared to a state-of-the-art ICN system.04B - Beitrag Konferenzschrift