IT Security
Data which is exchanged by Internet of Things applications is vulnerable to attack. We thus take relevant measures to protect the data effectively.
Not only personal data, but also user behaviour and even trade secrets and corporate data can be intercepted through IoT applications. Numerous stakeholders therefore have an incentive to steal, use without authorisation, manipulate or even destroy this data. Furthermore, anonymous hackers are no longer the only perpetrators, often it is legitimate users of an IoT application. Chip tuning in the automobile world and the manipulation of digital electricity meters in the energy industry are well-known examples of such misconduct.
The main threat to data protection in IoT applications is the excessive collection, processing and diffuse storage of data, insufficient or insecure control of access, deficient encryption and inadequate anonymization. The necessity of effective data protection is therefore a significant and pressing challenge.