The uniqueness of information and communication technologies (ICT) holds considerable potential. As a result, cybercriminals are increasingly focusing on them, exposing states, companies, organizations and private individuals to considerable risk. This requires a high level of security and data protection.
In this context, it is a question of fundamentally protection, without which no realistic security for information and communication technologies can be implemented. In this case, the system cannot be considered as a whole. Rather, it is a construct of many small subsystems that process and store information or data and are in direct exchange with many other subsystems. These include servers, applications and operating systems, cloud services and end devices.
All of these information and communication channels require a security strategy tailored to your subsystems in order to protect their data flow optimally.