{"id":70263,"date":"2021-10-04T15:21:48","modified":"2024-04-17T16:33:13","slug":"iot-sicherheit","status":"publish","type":"post","link":"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/","title":{"rendered":"IoT-Sicherheit"},"content":{"rendered":"        <div\n            id=\"block_5ee9ebb4f0a0b4e1961aa8462a4fa84d\"\n            class=\"acf-block is-edit is-category-text\"\n            data-highlight=\"https:\/\/www.tele-online.com\/?p=70263#highlightblock=block_5ee9ebb4f0a0b4e1961aa8462a4fa84d\"\n            data-block=\"textblock\"\n        >\n                            <h2 class=\"acf-block-title\">\n                    <svg  xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  width=\"24\"  height=\"24\"  viewBox=\"0 0 24 24\"  fill=\"none\"  stroke=\"currentColor\"  stroke-width=\"2\"  stroke-linecap=\"round\"  stroke-linejoin=\"round\"  class=\"icon icon-tabler icons-tabler-outline icon-tabler-align-left\"><path stroke=\"none\" d=\"M0 0h24v24H0z\" fill=\"none\"\/><path d=\"M4 6l16 0\" \/><path d=\"M4 12l10 0\" \/><path d=\"M4 18l14 0\" \/><\/svg>                    <span class=\"name\">Textblock <\/span>\n                <\/h2>\n\n                                    <\/div>\n    ","protected":false},"excerpt":{"rendered":"","protected":false},"author":48,"featured_media":70264,"sticky":false,"template":"","format":"standard","categories":[7378,6],"tags":[7433,7434],"acf":{"footer_link_block":false,"webblocks":[{"acf_fc_layout":"textblock","acf_fc_id":"acf-block-69a2405c1e3c0","acf_fc_style":"","flexible":false,"text":"<h2>Warum IoT-Sicherheit so wichtig ist<\/h2>\n<p>Die meisten der in IoT-Produkten verwendeten Informationen befinden sich nicht hinter dicken Firewalls auf gesch\u00fctzten Firmenservern oder -datenbanken sondern im Internet. Deshalb ist das Thema IT- bzw. IoT-Sicherheit so wichtig. Das Risiko und die Auswirkungen von Sicherheitsl\u00fccken k\u00f6nnen fatal sein. Schwaches Sicherheitshandling verursachen nicht nur Kosten, sondern kann auch massive Imageverluste zur Folge haben.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3><strong>Der Informationsfluss<\/strong><\/h3>\n<p>Bevor wir in das Thema einsteigen, lassen Sie uns kurz den Informationsfluss in IoT-Produkten betrachten. Die Informationen werden hier in der Regel auf der Grundlage eines Sensors oder durch eine Benutzer:inneninteraktion erzeugt. Anschlie\u00dfend werden die Daten gespeichert und beispielsweise \u00fcber ein Mobilfunknetz ins Internet \u00fcbertragen. Hier werden sie in einer Cloud gespeichert und bei Bedarf an eine Smartphone-App \u00fcbertragen. Auch die umgekehrte Richtung ist m\u00f6glich. An jeder Stelle dieses Prozesses m\u00fcssen die Informationen gesch\u00fctzt sein.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Das Ziel von IT- oder IoT-Sicherheit<\/strong><\/h3>\n<p>IoT-Sicherheit meint also den Schutz der Informationen, die von den Nutzer:innen in den Produkten, oder in den Gesch\u00e4ftsprozessen verwendet werden. In der IT-Sicherheit allgemein werden die wichtigsten drei Schutzziele als Schutztrias bezeichnet und gelten auch f\u00fcr IoT-Systeme.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-70280 size-full\" src=\"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/Security-Abbildung-Microtronics.jpg\" alt=\"Security Abbildung Microtronics\" width=\"1000\" height=\"571\" srcset=\"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/Security-Abbildung-Microtronics.jpg 1000w, https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/Security-Abbildung-Microtronics-768x439.jpg 768w, https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/Security-Abbildung-Microtronics-320x183.jpg 320w, https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/Security-Abbildung-Microtronics-600x343.jpg 600w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p>Quelle: Microtronics <a href=\"https:\/\/iot.microtronics.com\/security-whitepaper\" target=\"_blank\" rel=\"noopener\">https:\/\/iot.microtronics.com\/security-whitepaper<\/a><\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li>\n<h3><strong> Vertraulichkeit<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>Die erste Dimension der Schutztrias ist die Vertraulichkeit. Informationen m\u00fcssen vor unbefugtem Zugriff gesch\u00fctzt werden und d\u00fcrfen nicht in die H\u00e4nde der falschen Personen gelangen. Ein typischer Mechanismus, um dies zu verhindern, ist die Verschl\u00fcsselung von Informationen. Bei IoT-Ger\u00e4ten werden die Informationen auf dem Ger\u00e4t verschl\u00fcsselt, so dass die Informationen bei der \u00dcbertragung zwar &#8222;mitgeh\u00f6rt&#8220;, aber nicht verstanden werden k\u00f6nnen. Die Entschl\u00fcsselung findet erst am anderen Ende der \u00dcbertragungskette statt, z. B. in der Cloud. Erst am Ende der Kette (z. B.: in der Cloud-Schnittstelle) werden die Informationen entschl\u00fcsselt und sind eindeutig lesbar. Dies wird auch als Ende-zu-Ende-Verschl\u00fcsselung oder Sicherheit bezeichnet.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"2\">\n<li>\n<h3><strong> Integrit\u00e4t <\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>Die zweite Dimension ist die Integrit\u00e4t. Die Gew\u00e4hrleistung der Integrit\u00e4t bedeutet, dass es nicht m\u00f6glich sein darf, Informationen zu ver\u00e4ndern. Im Falle von IoT-Produkten betrifft das beispielsweise Informationen, die die Strecke vom Produkt bis zur mobilen App \u00fcbertragen werden. Die physikalische Beschaffenheit von Funkverbindungen oder die \u00dcbertragung von Informationen \u00fcber Kabel kann St\u00f6rungen durch \u00e4u\u00dfere Einfl\u00fcsse unterliegen, so dass es bei der \u00dcbertragung zu Ver\u00e4nderungen der Informationen kommen kann. Ein bekannter Mechanismus, um dies zu verhindern und gegebenenfalls zu korrigieren, sind z. B. Pr\u00fcfsummen. Dabei wird die Summe der Informationen vor dem Senden und nach dem Empfangen verglichen. Wenn sie unterschiedlich sind, wurde etwas ver\u00e4ndert. Ein weiterer Mechanismus ist die Verwendung von Signaturen, z. B. mit Software, die auf dem Ger\u00e4t installiert werden muss.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li>\n<h3><strong> Verf\u00fcgbarkeit<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>Die dritte Dimension der Informationssicherheit ist die Verf\u00fcgbarkeit. Das bedeutet, dass &#8222;das System&#8220;, in unserem Fall alle Komponenten des IoT-Systems, jederzeit verf\u00fcgbar und die Informationen abrufbar sein sollten. Die Verf\u00fcgbarkeit wird angegeben als das Verh\u00e4ltnis zwischen der Zeit, in der das System tats\u00e4chlich verf\u00fcgbar war, und der vereinbarten Zeit, in der das System verf\u00fcgbar sein sollte.\u00a0 Diese Werte werden in der Regel vertraglich als Service Level Agreement festgelegt. Eine 100%ige Verf\u00fcgbarkeit ist z.B. in Mobilfunknetzen nur schwer und &#8222;teuer&#8220; zu erreichen. Daher ist es gerade bei IoT-Produkten wichtig zu \u00fcberlegen, welche Funktionen und Mechanismen auch ohne Mobilfunknetz funktionieren m\u00fcssen.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Risikofaktor Mensch<\/strong><\/h3>\n<p>IT-Sicherheit muss aber nicht nur technische Aspekte ber\u00fccksichtigen. Die gr\u00f6\u00dfte Gefahr f\u00fcr die IT und die IoT geht vom Menschen aus. Die Reinigungskraft, die den Cloud-Rechner vom Staub befreit oder der:die ver\u00e4rgerte Mitarbeiter:in, der:die die Zugangsdaten zum Firmennetzwerk nicht gel\u00f6scht hat, k\u00f6nnen massive Probleme und Kosten verursachen. IT- und IoT-Sicherheit sind weitgehend eine Organisations- und Prozessfrage. Zudem ist Sicherheit keine einmalige Aufgabe. Wie Berichte in den Medien zeigen, werden immer wieder Sicherheitsl\u00fccken aufgedeckt. Die Sicherheit muss laufend \u00fcberwacht und verbessert werden. Nicht zuletzt brauchen IoT-Systeme eine M\u00f6glichkeit f\u00fcr automatische Updates &#8222;unsicherer&#8220; Software, z. B. durch Over-the-Air-Updates.<\/p>\n<p>Sicherheit ist also ein sensibles Thema, das viel Geld und Nerven kostet. Aber das Thema zu ignorieren wird noch viel teurer. Deshalb setzen wir bei TELE im IoT auf kompetente IoT-Partner:innen, die Managed Security anbieten.<\/p>\n<p>Noch mehr Information \u00fcber IoT-Security:\u00a0<a href=\"https:\/\/iot.microtronics.com\/security-whitepaper\" target=\"_blank\" rel=\"noopener\">https:\/\/iot.microtronics.com\/security-whitepaper<\/a><\/p>\n","id":"","linie_oben_einblenden":false,"linie_unten_einblenden":false,"container":"normal","hintergrund":"weis","box":false,"abstand_oben":"","abstand_unten":""}],"seo":[{"googleAuthor":"","googlePublisher":"","schemaName":"","schemaDescription":"","schemaImage":false}],"news_title":"IoT-Sicherheit","news_image":false,"news_max_hohe":"70vh","news_teaser":"Die meisten Informationen in der IoT befinden sich im Internet. Deshalb ist das Thema IT- bzw. IoT-Sicherheit so wichtig.","news_standardlayout_hinzufugen":"ja","news_mitarbeiter_headline":"","news_mitarbeiter_text":"","type":"automatisch","news_mitarbeiter":45954,"evt_bild":false,"evt_date":"","evt_time":"","evt_date_end":"","evt_time_end":"","evt_location":"","evt_teaser_text":"","evt_participants":"","evt_url":"","evt_background_img":false,"evt_description":"","footer":{"footer_headline_powerd_by":"","footer_text_powered_by":"","footer_logos":[{"logo":{"ID":50393,"id":50393,"title":"tele_worldwide","filename":"tele_worldwide.png","filesize":4387,"url":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_worldwide.png","link":"https:\/\/www.tele-online.com\/us\/60th-anniversary-registration\/attachment\/tele_worldwide-2-2\/","alt":"","author":"44","description":"","caption":"","name":"tele_worldwide-2-2","status":"inherit","uploaded_to":185152,"date":"2021-05-05 06:16:16","modified":"2023-01-26 16:33:01","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.tele-online.com\/wp-includes\/images\/media\/default.png","width":418,"height":59,"sizes":{"thumbnail":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_worldwide-220x59.png","thumbnail-width":220,"thumbnail-height":59,"medium":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_worldwide.png","medium-width":418,"medium-height":59,"medium_large":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_worldwide.png","medium_large-width":418,"medium_large-height":59,"large":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_worldwide.png","large-width":418,"large-height":59,"1536x1536":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_worldwide.png","1536x1536-width":418,"1536x1536-height":59,"2048x2048":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_worldwide.png","2048x2048-width":418,"2048x2048-height":59,"hd":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_worldwide.png","hd-width":418,"hd-height":59,"galerie":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_worldwide-320x45.png","galerie-width":320,"galerie-height":45,"stellen":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_worldwide-400x59.png","stellen-width":400,"stellen-height":59}},"link":"https:\/\/www.tele-online.com\/en\/sales-partner\/"},{"logo":{"ID":50398,"id":50398,"title":"tele_linkedin","filename":"tele_linkedin.png","filesize":4542,"url":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_linkedin.png","link":"https:\/\/www.tele-online.com\/us\/60th-anniversary-registration\/attachment\/tele_linkedin-2-2\/","alt":"","author":"44","description":"","caption":"","name":"tele_linkedin-2-2","status":"inherit","uploaded_to":185152,"date":"2021-05-05 06:16:25","modified":"2023-01-26 16:33:01","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.tele-online.com\/wp-includes\/images\/media\/default.png","width":473,"height":67,"sizes":{"thumbnail":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_linkedin-220x67.png","thumbnail-width":220,"thumbnail-height":67,"medium":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_linkedin.png","medium-width":473,"medium-height":67,"medium_large":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_linkedin.png","medium_large-width":473,"medium_large-height":67,"large":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_linkedin.png","large-width":473,"large-height":67,"1536x1536":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_linkedin.png","1536x1536-width":473,"1536x1536-height":67,"2048x2048":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_linkedin.png","2048x2048-width":473,"2048x2048-height":67,"hd":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_linkedin.png","hd-width":473,"hd-height":67,"galerie":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_linkedin-320x45.png","galerie-width":320,"galerie-height":45,"stellen":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_linkedin-400x67.png","stellen-width":400,"stellen-height":67}},"link":"https:\/\/www.linkedin.com\/company\/tele-controls-inc\/"},{"logo":{"ID":50403,"id":50403,"title":"tele_check","filename":"tele_check.png","filesize":4548,"url":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_check.png","link":"https:\/\/www.tele-online.com\/us\/60th-anniversary-registration\/attachment\/tele_check-2-2\/","alt":"","author":"44","description":"","caption":"","name":"tele_check-2-2","status":"inherit","uploaded_to":185152,"date":"2021-05-05 06:16:33","modified":"2023-01-26 16:33:01","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.tele-online.com\/wp-includes\/images\/media\/default.png","width":411,"height":63,"sizes":{"thumbnail":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_check-220x63.png","thumbnail-width":220,"thumbnail-height":63,"medium":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_check.png","medium-width":411,"medium-height":63,"medium_large":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_check.png","medium_large-width":411,"medium_large-height":63,"large":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_check.png","large-width":411,"large-height":63,"1536x1536":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_check.png","1536x1536-width":411,"1536x1536-height":63,"2048x2048":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_check.png","2048x2048-width":411,"2048x2048-height":63,"hd":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_check.png","hd-width":411,"hd-height":63,"galerie":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_check-320x49.png","galerie-width":320,"galerie-height":49,"stellen":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/05\/tele_check-400x63.png","stellen-width":400,"stellen-height":63}},"link":"https:\/\/www.tele-online.com\/us\/tele-partner-program\/"}],"footer_mylayout_logos":"gros","footer_text_oben":"<p><strong>TELE Controls Inc. |<\/strong> 570 HERNDON PARKWAY, SUITE 110, VA 20170 HERNDON | USA<\/p>\n<p><strong><a href=\"mailto:sales@tele-controls.com\">sales@tele-controls.com<\/a><\/strong><\/p>\n","footer_headline_social_media":"Social Media","footer_social_media":[{"icon":"<i class=\"icon-linkedin\"><\/i>","link":"https:\/\/www.linkedin.com\/company\/tele-controls-inc\/"},{"icon":"<i class=\"icon-youtube\"><\/i>","link":"https:\/\/www.youtube.com\/channel\/UC-xurh-oMFMVYCuwBVWcIFw"},{"icon":"<i class=\"icon-twitter\"><\/i>","link":"https:\/\/twitter.com\/TeleUSA_"},{"icon":"<i class=\"icon-instagram\"><\/i>","link":"https:\/\/www.instagram.com\/tele_haase\/"}]},"nav_data":{"link":"","text":""},"wpmlurl":{"de":"\/","en":"\/en\/","us":"\/us\/","fr":"\/fr\/","es":"\/es\/"}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IoT-Sicherheit - Tele Haase<\/title>\n<meta name=\"description\" content=\"Die meisten Informationen in der IoT befinden sich im Internet. Deshalb ist das Thema IT- bzw. IoT-Sicherheit so wichtig.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoT-Sicherheit - Tele Haase\" \/>\n<meta property=\"og:description\" content=\"Die meisten Informationen in der IoT befinden sich im Internet. Deshalb ist das Thema IT- bzw. IoT-Sicherheit so wichtig.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"Tele Haase\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-04T13:21:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-17T14:33:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"barbara.reininger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"barbara.reininger\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/\",\"url\":\"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/\",\"name\":\"IoT-Sicherheit - Tele Haase\",\"isPartOf\":{\"@id\":\"https:\/\/www.tele-online.com\/us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg\",\"datePublished\":\"2021-10-04T13:21:48+00:00\",\"dateModified\":\"2024-04-17T14:33:13+00:00\",\"author\":{\"@id\":\"https:\/\/www.tele-online.com\/us\/#\/schema\/person\/b4ae272cd5e5bc1e2052e26149de1ac0\"},\"description\":\"Die meisten Informationen in der IoT befinden sich im Internet. Deshalb ist das Thema IT- bzw. IoT-Sicherheit so wichtig.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/#primaryimage\",\"url\":\"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg\",\"contentUrl\":\"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg\",\"width\":2048,\"height\":1365,\"caption\":\"Internet of things (IoT) concept. Businessman offer IoT products and solutions. Abstract chip with text IoT connected with abstract devices represented by points.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.tele-online.com\/us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IoT-Sicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tele-online.com\/us\/#website\",\"url\":\"https:\/\/www.tele-online.com\/us\/\",\"name\":\"Tele Haase\",\"description\":\"Your Smart Factory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tele-online.com\/us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tele-online.com\/us\/#\/schema\/person\/b4ae272cd5e5bc1e2052e26149de1ac0\",\"name\":\"barbara.reininger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tele-online.com\/us\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/00f0cf5ff01431d666b84bb7bc267428?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/00f0cf5ff01431d666b84bb7bc267428?s=96&d=mm&r=g\",\"caption\":\"barbara.reininger\"},\"url\":\"https:\/\/www.tele-online.com\/us\/author\/barbara-reininger\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IoT-Sicherheit - Tele Haase","description":"Die meisten Informationen in der IoT befinden sich im Internet. Deshalb ist das Thema IT- bzw. IoT-Sicherheit so wichtig.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/","og_locale":"en_US","og_type":"article","og_title":"IoT-Sicherheit - Tele Haase","og_description":"Die meisten Informationen in der IoT befinden sich im Internet. Deshalb ist das Thema IT- bzw. IoT-Sicherheit so wichtig.","og_url":"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/","og_site_name":"Tele Haase","article_published_time":"2021-10-04T13:21:48+00:00","article_modified_time":"2024-04-17T14:33:13+00:00","og_image":[{"width":2048,"height":1365,"url":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg","type":"image\/jpeg"}],"author":"barbara.reininger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"barbara.reininger"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/","url":"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/","name":"IoT-Sicherheit - Tele Haase","isPartOf":{"@id":"https:\/\/www.tele-online.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/#primaryimage"},"image":{"@id":"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg","datePublished":"2021-10-04T13:21:48+00:00","dateModified":"2024-04-17T14:33:13+00:00","author":{"@id":"https:\/\/www.tele-online.com\/us\/#\/schema\/person\/b4ae272cd5e5bc1e2052e26149de1ac0"},"description":"Die meisten Informationen in der IoT befinden sich im Internet. Deshalb ist das Thema IT- bzw. IoT-Sicherheit so wichtig.","breadcrumb":{"@id":"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/#primaryimage","url":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg","contentUrl":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg","width":2048,"height":1365,"caption":"Internet of things (IoT) concept. Businessman offer IoT products and solutions. Abstract chip with text IoT connected with abstract devices represented by points."},{"@type":"BreadcrumbList","@id":"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.tele-online.com\/us\/"},{"@type":"ListItem","position":2,"name":"IoT-Sicherheit"}]},{"@type":"WebSite","@id":"https:\/\/www.tele-online.com\/us\/#website","url":"https:\/\/www.tele-online.com\/us\/","name":"Tele Haase","description":"Your Smart Factory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tele-online.com\/us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tele-online.com\/us\/#\/schema\/person\/b4ae272cd5e5bc1e2052e26149de1ac0","name":"barbara.reininger","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tele-online.com\/us\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/00f0cf5ff01431d666b84bb7bc267428?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/00f0cf5ff01431d666b84bb7bc267428?s=96&d=mm&r=g","caption":"barbara.reininger"},"url":"https:\/\/www.tele-online.com\/us\/author\/barbara-reininger\/"}]}},"yoast_data":{"yoast_wpseo_canonical":"https:\/\/www.tele-online.com\/us\/news\/iot-sicherheit\/","yoast_wpseo_opengraph_image":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg","yoast_wpseo_metadesc":"Die meisten Informationen in der IoT befinden sich im Internet. Deshalb ist das Thema IT- bzw. IoT-Sicherheit so wichtig.","yoast_wpseo_meta_robots_noindex":"","yoast_wpseo_meta_robots_nofollow":""},"footer_links":null,"yoasttitle":"IoT-Sicherheit - Tele Haase","yoast_title":"IoT-Sicherheit - Tele Haase","yoast_meta":[{"name":"description","content":"Die meisten Informationen in der IoT befinden sich im Internet. Deshalb ist das Thema IT- bzw. IoT-Sicherheit so wichtig."},{"name":"robots","content":"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1"},{"property":"og:locale","content":"de_DE"},{"property":"og:type","content":"article"},{"property":"og:title","content":"IoT-Sicherheit - Tele Haase"},{"property":"og:description","content":"Die meisten Informationen in der IoT befinden sich im Internet. Deshalb ist das Thema IT- bzw. IoT-Sicherheit so wichtig."},{"property":"og:url","content":"https:\/\/www.tele-online.com\/news\/iot-sicherheit\/"},{"property":"og:site_name","content":"Tele Haase"},{"property":"article:published_time","content":"2021-10-04T13:21:48+00:00"},{"property":"article:modified_time","content":"2024-04-17T14:33:13+00:00"},{"property":"og:image","content":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg"},{"property":"og:image:width","content":"2048"},{"property":"og:image:height","content":"1365"},{"property":"og:image:type","content":"image\/jpeg"},{"name":"author","content":"barbara.reininger"},{"name":"twitter:card","content":"summary_large_image"},{"name":"twitter:label1","content":"Verfasst von"},{"name":"twitter:data1","content":"barbara.reininger"},{"name":"robots","content":"index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1"}],"yoast_json_ld":[{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tele-online.com\/news\/iot-sicherheit\/","url":"https:\/\/www.tele-online.com\/news\/iot-sicherheit\/","name":"IoT-Sicherheit - Tele Haase","isPartOf":{"@id":"https:\/\/www.tele-online.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tele-online.com\/news\/iot-sicherheit\/#primaryimage"},"image":{"@id":"https:\/\/www.tele-online.com\/news\/iot-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg","datePublished":"2021-10-04T13:21:48+00:00","dateModified":"2024-04-17T14:33:13+00:00","author":{"@id":"https:\/\/www.tele-online.com\/#\/schema\/person\/b4ae272cd5e5bc1e2052e26149de1ac0"},"description":"Die meisten Informationen in der IoT befinden sich im Internet. Deshalb ist das Thema IT- bzw. IoT-Sicherheit so wichtig.","breadcrumb":{"@id":"https:\/\/www.tele-online.com\/news\/iot-sicherheit\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tele-online.com\/news\/iot-sicherheit\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tele-online.com\/news\/iot-sicherheit\/#primaryimage","url":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg","contentUrl":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg","width":2048,"height":1365,"caption":"IoT-Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tele-online.com\/news\/iot-sicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.tele-online.com\/"},{"@type":"ListItem","position":2,"name":"IoT-Sicherheit"}]},{"@type":"WebSite","@id":"https:\/\/www.tele-online.com\/#website","url":"https:\/\/www.tele-online.com\/","name":"Tele Haase","description":"Your Smart Factory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tele-online.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Person","@id":"https:\/\/www.tele-online.com\/#\/schema\/person\/b4ae272cd5e5bc1e2052e26149de1ac0","name":"barbara.reininger","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tele-online.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/00f0cf5ff01431d666b84bb7bc267428?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/00f0cf5ff01431d666b84bb7bc267428?s=96&d=mm&r=g","caption":"barbara.reininger"},"url":"https:\/\/www.tele-online.com\/author\/barbara-reininger\/"}]}],"_links":{"self":[{"href":"https:\/\/www.tele-online.com\/us\/wp-json\/wp\/v2\/posts\/70263"}],"collection":[{"href":"https:\/\/www.tele-online.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tele-online.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tele-online.com\/us\/wp-json\/wp\/v2\/users\/48"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tele-online.com\/us\/wp-json\/wp\/v2\/comments?post=70263"}],"version-history":[{"count":11,"href":"https:\/\/www.tele-online.com\/us\/wp-json\/wp\/v2\/posts\/70263\/revisions"}],"predecessor-version":[{"id":757248,"href":"https:\/\/www.tele-online.com\/us\/wp-json\/wp\/v2\/posts\/70263\/revisions\/757248"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tele-online.com\/us\/wp-json\/wp\/v2\/media\/70264"}],"wp:attachment":[{"href":"https:\/\/www.tele-online.com\/us\/wp-json\/wp\/v2\/media?parent=70263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tele-online.com\/us\/wp-json\/wp\/v2\/categories?post=70263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tele-online.com\/us\/wp-json\/wp\/v2\/tags?post=70263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}