Skip to main content

2024 | OriginalPaper | Buchkapitel

2. Technische Grundlagen

verfasst von : Matthias Janetschek, Pascal Schöttle

Erschienen in: Digitalwirtschaft

Verlag: Springer Fachmedien Wiesbaden

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Zusammenfassung

Dieses Kapitel bietet einen umfassenden Überblick über die technischen Grundlagen, die die moderne digitale Welt und die Digitalwirtschaft prägen. Es konzentriert sich auf Schlüsseltechnologien und Konzepte wie Internettechnologien, Cloud-Computing, künstliche Intelligenz, maschinelles Lernen, Blockchain und IT-Sicherheit. Die Leser:innen erhalten ein fundiertes Verständnis für die Technologien, die die digitale Landschaft prägen. Dieses Wissen dient als Grundlage für ein tieferes Verständnis der Konzepte, die in den folgenden Kapiteln diskutiert werden.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abramova, S., Schöttle, P., & Böhme, R. (2017). Mixing coins of different quality: A game-theoretic approach. In M. Brenner et al. (Hrsg.), Financial cryptography and data security (FC 2017. Lecture notes in computer science, Bd. 10323).CrossRef Abramova, S., Schöttle, P., & Böhme, R. (2017). Mixing coins of different quality: A game-theoretic approach. In M. Brenner et al. (Hrsg.), Financial cryptography and data security (FC 2017. Lecture notes in computer science, Bd. 10323).CrossRef
Zurück zum Zitat Anderson, R. (2001). Why information security is hard – An economic perspective. In ACSAC ’01: Proceedings of the 17th annual computer security applications conference (S. 358–365). ACM. Anderson, R. (2001). Why information security is hard – An economic perspective. In ACSAC ’01: Proceedings of the 17th annual computer security applications conference (S. 358–365). ACM.
Zurück zum Zitat Anderson, R. (2008). Security engineering: A guide to building dependable distributed systems. Wiley. Anderson, R. (2008). Security engineering: A guide to building dependable distributed systems. Wiley.
Zurück zum Zitat Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610–613.CrossRef Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610–613.CrossRef
Zurück zum Zitat Atzei, N., Bartoletti, M., & Cimoli, T. (2017). A survey of attacks on Ethereum smart contracts (SoK). Springer. Atzei, N., Bartoletti, M., & Cimoli, T. (2017). A survey of attacks on Ethereum smart contracts (SoK). Springer.
Zurück zum Zitat Baumhauer, T., Schöttle, P., & Zeppelzauer, M. (2022). Machine unlearning: Linear filtration for logit-based classifiers. Machine Learning, 111, 3203–3226.CrossRef Baumhauer, T., Schöttle, P., & Zeppelzauer, M. (2022). Machine unlearning: Linear filtration for logit-based classifiers. Machine Learning, 111, 3203–3226.CrossRef
Zurück zum Zitat Bertoncello, M., & Wee, D. (2015). Ten ways autonomous driving could redefine the automotive world. McKinsey & Company. Bertoncello, M., & Wee, D. (2015). Ten ways autonomous driving could redefine the automotive world. McKinsey & Company.
Zurück zum Zitat Bishop, M. (2003). Computer security: Art and science. Addison-Wesley. Bishop, M. (2003). Computer security: Art and science. Addison-Wesley.
Zurück zum Zitat Böhme, R., & Moore, T. (2009). The iterated weakest link: A model of adaptive security investment (Bd. 9). WEIS. Böhme, R., & Moore, T. (2009). The iterated weakest link: A model of adaptive security investment (Bd. 9). WEIS.
Zurück zum Zitat Böhme, R., Christin, N., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, technology, and governance. Journal of economic Perspectives, 29(2), 213–238.CrossRef Böhme, R., Christin, N., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, technology, and governance. Journal of economic Perspectives, 29(2), 213–238.CrossRef
Zurück zum Zitat Bostrom, N. (2014). Superintelligence: Paths, dangers, strategies. Oxford University Press. Bostrom, N. (2014). Superintelligence: Paths, dangers, strategies. Oxford University Press.
Zurück zum Zitat Brynjolfsson, E., & McAfee, A. (2014). The second machine age: Work, progress, and prosperity in a time of brilliant technologies. W. W. Norton & Company. Brynjolfsson, E., & McAfee, A. (2014). The second machine age: Work, progress, and prosperity in a time of brilliant technologies. W. W. Norton & Company.
Zurück zum Zitat Buterin, V. (2013). Ethereum: A next-generation smart contract and decentralized application platform. White paper (Ethereum Foundation). Buterin, V. (2013). Ethereum: A next-generation smart contract and decentralized application platform. White paper (Ethereum Foundation).
Zurück zum Zitat Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet. Academic Press. Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet. Academic Press.
Zurück zum Zitat Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey. Mobile Networks and Applications, 19(2), 171–209.CrossRef Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey. Mobile Networks and Applications, 19(2), 171–209.CrossRef
Zurück zum Zitat Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. IEEE Access. Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. IEEE Access.
Zurück zum Zitat Crawford, K., & Calo, R. (2016). There is a blind spot in AI research. Nature, 538(7625), 311–313.CrossRef Crawford, K., & Calo, R. (2016). There is a blind spot in AI research. Nature, 538(7625), 311–313.CrossRef
Zurück zum Zitat Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media.CrossRef Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media.CrossRef
Zurück zum Zitat Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.CrossRef Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.CrossRef
Zurück zum Zitat Domingos, P. (2012). A few useful things to know about machine learning. Communications of the ACM, 55(10), 78–87.CrossRef Domingos, P. (2012). A few useful things to know about machine learning. Communications of the ACM, 55(10), 78–87.CrossRef
Zurück zum Zitat Doshi-Velez, F., & Kim, B. (2017). Towards a rigorous science of interpretable machine learning. arXiv preprint, arXiv, 1702.08608. Doshi-Velez, F., & Kim, B. (2017). Towards a rigorous science of interpretable machine learning. arXiv preprint, arXiv, 1702.08608.
Zurück zum Zitat Eskandari, S., Salehi, M., Gu, W. C., & Clark, J. (2021). SoK: Oracles from the ground truth to market manipulation, ACM. Eskandari, S., Salehi, M., Gu, W. C., & Clark, J. (2021). SoK: Oracles from the ground truth to market manipulation, ACM.
Zurück zum Zitat Esteva, A., Robicquet, A., Ramsundar, B., Kuleshov, V., DePristo, M., Chou, K., Cui, C., Corrado, G., Thrun, S., & Dean, J. (2019). A guide to deep learning in healthcare. Nature Medicine, 25(1), 24–29.CrossRef Esteva, A., Robicquet, A., Ramsundar, B., Kuleshov, V., DePristo, M., Chou, K., Cui, C., Corrado, G., Thrun, S., & Dean, J. (2019). A guide to deep learning in healthcare. Nature Medicine, 25(1), 24–29.CrossRef
Zurück zum Zitat Gollmann, D. (2011). Computer security. Wiley. Gollmann, D. (2011). Computer security. Wiley.
Zurück zum Zitat Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT Press. Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT Press.
Zurück zum Zitat Gordon, L. A., & Loeb, M. P. (2002). The economics of information security investment. ACM Transactions on Information and System Security (TISSEC), 5(4), 438–457.CrossRef Gordon, L. A., & Loeb, M. P. (2002). The economics of information security investment. ACM Transactions on Information and System Security (TISSEC), 5(4), 438–457.CrossRef
Zurück zum Zitat Gumm, H. P., Sommer, M., Hesse, W., Seeger, B., & Taentzer, G. (2013). Einfuhrung in die Informatik. Oldenbourg Wissenschaftsverlag Verlag.CrossRef Gumm, H. P., Sommer, M., Hesse, W., Seeger, B., & Taentzer, G. (2013). Einfuhrung in die Informatik. Oldenbourg Wissenschaftsverlag Verlag.CrossRef
Zurück zum Zitat Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to elliptic curve cryptography (Springer Professional Computing). Springer. Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to elliptic curve cryptography (Springer Professional Computing). Springer.
Zurück zum Zitat Hastie, T., Tibshirani, R., & Friedman, J. (2009). The elements of statistical learning. Springer. Hastie, T., Tibshirani, R., & Friedman, J. (2009). The elements of statistical learning. Springer.
Zurück zum Zitat Herold, H., Lurz, B., Wohlrab, J., & Hopf, M. (2012). Grundlagen der Informatik (3., akt. Aufl.). Pearson Studium München. Herold, H., Lurz, B., Wohlrab, J., & Hopf, M. (2012). Grundlagen der Informatik (3., akt. Aufl.). Pearson Studium München.
Zurück zum Zitat Howard, J. D., & Longstaff, T. A. (1998). A common language for computer security incidents. Sandia Report. Howard, J. D., & Longstaff, T. A. (1998). A common language for computer security incidents. Sandia Report.
Zurück zum Zitat Hutter, F., Kotthoff, L., & Vanschoren, J. (2019). Automated machine learning: Methods, systems, challenges. Springer.CrossRef Hutter, F., Kotthoff, L., & Vanschoren, J. (2019). Automated machine learning: Methods, systems, challenges. Springer.CrossRef
Zurück zum Zitat King, S., & Nadal, S. (2012). PPCoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper. King, S., & Nadal, S. (2012). PPCoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper.
Zurück zum Zitat Kurose, J., & Ross, K. (2014): Computernetzwerke (6., akt. Aufl.). Pearson Studium München. Kurose, J., & Ross, K. (2014): Computernetzwerke (6., akt. Aufl.). Pearson Studium München.
Zurück zum Zitat LeCun, Y., Bottou, L., Bengio, Y., & Haffner, P. (1998). Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11), 2278–2324.CrossRef LeCun, Y., Bottou, L., Bengio, Y., & Haffner, P. (1998). Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11), 2278–2324.CrossRef
Zurück zum Zitat Luckin, R., Holmes, W., Griffiths, M., & Forcier, L. B. (2016). Intelligence unleashed. An argument for AI in Education. Pearson. Luckin, R., Holmes, W., Griffiths, M., & Forcier, L. B. (2016). Intelligence unleashed. An argument for AI in Education. Pearson.
Zurück zum Zitat Mee, V., Tryfonas, T., & Sfakianakis, A. (2014). Understanding the challenges of cyber forensics investigations: A survey of U.K. Law Enforcement Agencies. Journal of Forensic Sciences, 59(4), 875–882. Mee, V., Tryfonas, T., & Sfakianakis, A. (2014). Understanding the challenges of cyber forensics investigations: A survey of U.K. Law Enforcement Agencies. Journal of Forensic Sciences, 59(4), 875–882.
Zurück zum Zitat Mell, P., & Grance, T. (2011). SP 800-145. The NIST definition of cloud computing (Technical Report). National Institute of Standards & Technology. Mell, P., & Grance, T. (2011). SP 800-145. The NIST definition of cloud computing (Technical Report). National Institute of Standards & Technology.
Zurück zum Zitat Menzel, M., Tran, V. T., Eitel, A., Domingues, S., & Ott, I. (2018) State of the art in distributed ledger technology research in business and economics: A content-analysis approach. Journal of Business Economics. Menzel, M., Tran, V. T., Eitel, A., Domingues, S., & Ott, I. (2018) State of the art in distributed ledger technology research in business and economics: A content-analysis approach. Journal of Business Economics.
Zurück zum Zitat Mirkovic, J., & Reiher, P. (2011). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39–53.CrossRef Mirkovic, J., & Reiher, P. (2011). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39–53.CrossRef
Zurück zum Zitat Moore, T., Clayton, R., & Anderson, R. (2009). The economics of online crime. The Journal of Economic Perspectives, 23(3), 3–20.CrossRef Moore, T., Clayton, R., & Anderson, R. (2009). The economics of online crime. The Journal of Economic Perspectives, 23(3), 3–20.CrossRef
Zurück zum Zitat Möser, M., Böhme, R., & Breuker, D. (2013, September). An inquiry into money laundering tools in the Bitcoin ecosystem. In 2013 APWG eCrime researchers summit (S. 1–14). IEEE. Möser, M., Böhme, R., & Breuker, D. (2013, September). An inquiry into money laundering tools in the Bitcoin ecosystem. In 2013 APWG eCrime researchers summit (S. 1–14). IEEE.
Zurück zum Zitat Mougayar, W. (2016). The business blockchain: Promise, practice, and application of the next internet technology. Wiley. Mougayar, W. (2016). The business blockchain: Promise, practice, and application of the next internet technology. Wiley.
Zurück zum Zitat Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Whitepaper. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Whitepaper.
Zurück zum Zitat Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton University Press. Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton University Press.
Zurück zum Zitat NIST. (2013). Digital Signature Standard (DSS) (FIPS PUB 186-4). Federal Information Processing Standards Publication. NIST. (2013). Digital Signature Standard (DSS) (FIPS PUB 186-4). Federal Information Processing Standards Publication.
Zurück zum Zitat Pfleeger, C. P., & Pfleeger, S. L. (2011). Analyzing computer security: A threat/vulnerability/countermeasure approach. Prentice Hall. Pfleeger, C. P., & Pfleeger, S. L. (2011). Analyzing computer security: A threat/vulnerability/countermeasure approach. Prentice Hall.
Zurück zum Zitat Probst, C. W., Hunker, J., Gollmann, D., & Bishop, M. (2007). Aspects of insider threats. Insider Threats in Cyber Security, (S. 15–36). Springer. Probst, C. W., Hunker, J., Gollmann, D., & Bishop, M. (2007). Aspects of insider threats. Insider Threats in Cyber Security, (S. 15–36). Springer.
Zurück zum Zitat Rescorla, E. (2018). The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446, RFC Editor. Internet Engineering Task Force (IETF). Rescorla, E. (2018). The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446, RFC Editor. Internet Engineering Task Force (IETF).
Zurück zum Zitat Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.CrossRef Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.CrossRef
Zurück zum Zitat Rosenfeld, M. (2011). Overview of colored coins. White Paper. Rosenfeld, M. (2011). Overview of colored coins. White Paper.
Zurück zum Zitat Rumelhart, D. E., Hinton, G. E., & Williams, R. J. (1986). Learning representations by back-propagating errors. Nature, 323, 533–536.CrossRef Rumelhart, D. E., Hinton, G. E., & Williams, R. J. (1986). Learning representations by back-propagating errors. Nature, 323, 533–536.CrossRef
Zurück zum Zitat Russell, S., & Norvig, P. (2016). Artificial intelligence: A modern approach. Pearson. Russell, S., & Norvig, P. (2016). Artificial intelligence: A modern approach. Pearson.
Zurück zum Zitat Samsinger, M., Merkle, F., Schöttle, P., & Pevny, T. (2021). When should you defend your classifier? In B. Bošanský, C. Gonzalez, S. Rass, & A. Sinha (Hrsg.), Decision and game theory for security (GameSec 2021. Lecture notes in computer science, Bd. 13061). Springer.CrossRef Samsinger, M., Merkle, F., Schöttle, P., & Pevny, T. (2021). When should you defend your classifier? In B. Bošanský, C. Gonzalez, S. Rass, & A. Sinha (Hrsg.), Decision and game theory for security (GameSec 2021. Lecture notes in computer science, Bd. 13061). Springer.CrossRef
Zurück zum Zitat Samuel, A. (1959). Some studies in machine learning using the game of checkers. IBM Journal of Research and Development. Samuel, A. (1959). Some studies in machine learning using the game of checkers. IBM Journal of Research and Development.
Zurück zum Zitat Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. Wiley. Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. Wiley.
Zurück zum Zitat Schneier, B. (2008). Attack trees. In Schneier on security. Wiley. Schneier, B. (2008). Attack trees. In Schneier on security. Wiley.
Zurück zum Zitat Schwartz, D., Youngs, N., & Britto, A. (2014). The ripple protocol consensus algorithm. White Paper. Schwartz, D., Youngs, N., & Britto, A. (2014). The ripple protocol consensus algorithm. White Paper.
Zurück zum Zitat Searle, J. (1980). Minds, brains, and programs. Behavioral and Brain Sciences. Searle, J. (1980). Minds, brains, and programs. Behavioral and Brain Sciences.
Zurück zum Zitat Stallings, W., & Brown, L. (2012). Computer security: Principles and practice. Pearson. Stallings, W., & Brown, L. (2012). Computer security: Principles and practice. Pearson.
Zurück zum Zitat Stallings. (2022). Cryptography and network security: Principles and practice (8th ed.). Pearson. Stallings. (2022). Cryptography and network security: Principles and practice (8th ed.). Pearson.
Zurück zum Zitat Stevens, T., Ophoff, J., & Van Belle, J. P. (2012). The impact of personal dispositions on information security awareness and behavior. Computers & Security, 31(6), 820–830. Stevens, T., Ophoff, J., & Van Belle, J. P. (2012). The impact of personal dispositions on information security awareness and behavior. Computers & Security, 31(6), 820–830.
Zurück zum Zitat Stoll, C., Klaaßen, L., & Gallersdörfer, U. (2019). The carbon footprint of bitcoin. Joule. Stoll, C., Klaaßen, L., & Gallersdörfer, U. (2019). The carbon footprint of bitcoin. Joule.
Zurück zum Zitat Sutton, R. S., & Barto, A. G. (2018). Reinforcement learning: An introduction. MIT Press. Sutton, R. S., & Barto, A. G. (2018). Reinforcement learning: An introduction. MIT Press.
Zurück zum Zitat Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media. Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media.
Zurück zum Zitat Szabo, N. (1997). Formalizing and securing relationships on public networks. First Monday. Szabo, N. (1997). Formalizing and securing relationships on public networks. First Monday.
Zurück zum Zitat Tanenbaum, A., & Steen, M. (2008). Verteilte Systeme: Prinzipien und Paradigmen (2. Aufl.). Pearson Studium München. Tanenbaum, A., & Steen, M. (2008). Verteilte Systeme: Prinzipien und Paradigmen (2. Aufl.). Pearson Studium München.
Zurück zum Zitat Tanenbaum, A., & Wetherall, D. (2012). Computernetzwerke (5., akt. Aufl.). Pearson Studium München. Tanenbaum, A., & Wetherall, D. (2012). Computernetzwerke (5., akt. Aufl.). Pearson Studium München.
Zurück zum Zitat Tapscott, D., & Tapscott, A. (2016). Blockchain revolution: How the technology behind bitcoin is changing money, business, and the world. Penguin Portfolio. Tapscott, D., & Tapscott, A. (2016). Blockchain revolution: How the technology behind bitcoin is changing money, business, and the world. Penguin Portfolio.
Zurück zum Zitat Topol, E. (2019). Deep medicine: How artificial intelligence can make healthcare human again. Basic Books. Topol, E. (2019). Deep medicine: How artificial intelligence can make healthcare human again. Basic Books.
Zurück zum Zitat Turing, A. (1950). Computing machinery and intelligence. Mind. Turing, A. (1950). Computing machinery and intelligence. Mind.
Zurück zum Zitat Zhou, W., & Leckie, C. (2010). A peer-to-peer collaborative intrusion detection system (Network security, S. 351–358). Zhou, W., & Leckie, C. (2010). A peer-to-peer collaborative intrusion detection system (Network security, S. 351–358).
Zurück zum Zitat Zohar, A. (2015). Bitcoin: Under the hood. ACM. Zohar, A. (2015). Bitcoin: Under the hood. ACM.
Metadaten
Titel
Technische Grundlagen
verfasst von
Matthias Janetschek
Pascal Schöttle
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-658-45724-2_2

Premium Partner