{"guid":"a966e7fd-afda-464d-b4e1-d61f8b790593","title":"Automatisierung im Cyberspace","subtitle":"Wie wir die Asymmetrien überwinden können","slug":"froscon2022-2778-automatisierung_im_cyberspace","link":"https://programm.froscon.org/2022/events/2778.html","description":"Die Zeiten des einsamen weißen Hackers im Keller seiner Eltern sind lange vorbei. Moderne Cyber-Angriffe werden von Staaten oder organisierten kriminellen Gruppen durchgeführt. Um gegen die schiere Anzahl solcher Angriff und Akteure an zu kommen ist viel Kreativität und Durchhaltevermögen gefragt.\n\nMan spricht klassischerweise davon, dass es eine Asymmetrie zwischen Hackern und Defendern gibt: die erste Gruppe ist Pro-Aktiv, braucht nur einmal erfolgreich sein, und muss die Malware lediglich schreiben. Defender auf der anderen Seite können immer nur reagieren, müssen \u003ci\u003eimmer\u003c/i\u003e erfolgreich sein, und das manuelle Analysieren von Malware ist sehr zeitaufwändig.\n\nIn diesem Talk werden wir exemplarisch einige Vorfälle durchgehen und einen Vorschlag umreißen, welche Asymmetrien in die entgegengesetzte Richtung bestehen.","original_language":"deu","persons":["larsborn"],"tags":["froscon2022","2778","2022","Security"],"view_count":92,"promoted":false,"date":"2022-08-21T15:15:00.000+02:00","release_date":"2022-08-21T00:00:00.000+02:00","updated_at":"2023-06-29T23:00:01.989+02:00","length":3070,"duration":3070,"thumb_url":"https://static.media.ccc.de/media/events/froscon/2022/2778-a966e7fd-afda-464d-b4e1-d61f8b790593.jpg","poster_url":"https://static.media.ccc.de/media/events/froscon/2022/2778-a966e7fd-afda-464d-b4e1-d61f8b790593_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/froscon/2022/2778-a966e7fd-afda-464d-b4e1-d61f8b790593.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/froscon/2022/2778-a966e7fd-afda-464d-b4e1-d61f8b790593.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/froscon2022-2778-automatisierung_im_cyberspace","url":"https://api.media.ccc.de/public/events/a966e7fd-afda-464d-b4e1-d61f8b790593","conference_title":"FrOSCon 2022","conference_url":"https://api.media.ccc.de/public/conferences/froscon2022","related":[],"recordings":[{"size":695,"length":3070,"mime_type":"video/webm","language":"deu","filename":"froscon2022-2778-deu-Automatisierung_im_Cyberspace_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2022-08-21T23:20:29.185+02:00","recording_url":"https://cdn.media.ccc.de/events/froscon/2022/webm-hd/froscon2022-2778-deu-Automatisierung_im_Cyberspace_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/61265","event_url":"https://api.media.ccc.de/public/events/a966e7fd-afda-464d-b4e1-d61f8b790593","conference_url":"https://api.media.ccc.de/public/conferences/froscon2022"},{"size":214,"length":3070,"mime_type":"video/webm","language":"deu","filename":"froscon2022-2778-deu-Automatisierung_im_Cyberspace_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2022-08-21T22:19:11.161+02:00","recording_url":"https://cdn.media.ccc.de/events/froscon/2022/webm-sd/froscon2022-2778-deu-Automatisierung_im_Cyberspace_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/61257","event_url":"https://api.media.ccc.de/public/events/a966e7fd-afda-464d-b4e1-d61f8b790593","conference_url":"https://api.media.ccc.de/public/conferences/froscon2022"},{"size":130,"length":3070,"mime_type":"video/mp4","language":"deu","filename":"froscon2022-2778-deu-Automatisierung_im_Cyberspace_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2022-08-21T18:17:07.954+02:00","recording_url":"https://cdn.media.ccc.de/events/froscon/2022/h264-sd/froscon2022-2778-deu-Automatisierung_im_Cyberspace_sd.mp4","url":"https://api.media.ccc.de/public/recordings/61202","event_url":"https://api.media.ccc.de/public/events/a966e7fd-afda-464d-b4e1-d61f8b790593","conference_url":"https://api.media.ccc.de/public/conferences/froscon2022"},{"size":27,"length":3070,"mime_type":"audio/opus","language":"deu","filename":"froscon2022-2778-deu-Automatisierung_im_Cyberspace_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2022-08-21T18:15:04.113+02:00","recording_url":"https://cdn.media.ccc.de/events/froscon/2022/opus/froscon2022-2778-deu-Automatisierung_im_Cyberspace_opus.opus","url":"https://api.media.ccc.de/public/recordings/61200","event_url":"https://api.media.ccc.de/public/events/a966e7fd-afda-464d-b4e1-d61f8b790593","conference_url":"https://api.media.ccc.de/public/conferences/froscon2022"},{"size":46,"length":3070,"mime_type":"audio/mpeg","language":"deu","filename":"froscon2022-2778-deu-Automatisierung_im_Cyberspace_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2022-08-21T18:14:48.296+02:00","recording_url":"https://cdn.media.ccc.de/events/froscon/2022/mp3/froscon2022-2778-deu-Automatisierung_im_Cyberspace_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/61199","event_url":"https://api.media.ccc.de/public/events/a966e7fd-afda-464d-b4e1-d61f8b790593","conference_url":"https://api.media.ccc.de/public/conferences/froscon2022"},{"size":540,"length":3070,"mime_type":"video/mp4","language":"deu","filename":"froscon2022-2778-deu-Automatisierung_im_Cyberspace_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2022-08-21T17:59:35.339+02:00","recording_url":"https://cdn.media.ccc.de/events/froscon/2022/h264-hd/froscon2022-2778-deu-Automatisierung_im_Cyberspace_hd.mp4","url":"https://api.media.ccc.de/public/recordings/61195","event_url":"https://api.media.ccc.de/public/events/a966e7fd-afda-464d-b4e1-d61f8b790593","conference_url":"https://api.media.ccc.de/public/conferences/froscon2022"}]}