{"id":13551,"date":"2021-01-15T12:25:28","date_gmt":"2021-01-15T11:25:28","guid":{"rendered":"https:\/\/magazine.swissinformatics.org\/fortbildungssystem-fur-it-experten\/"},"modified":"2022-07-02T11:52:26","modified_gmt":"2022-07-02T09:52:26","slug":"relevant-software","status":"publish","type":"post","link":"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/","title":{"rendered":"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz"},"content":{"rendered":"<p>Die Digitalisierung von Prozessen in allen Branchen und in der Verwaltung schreitet mit grosser Dynamik voran. Es entstehen laufend neue M\u00f6glichkeiten, neue Prozesse, neue Abh\u00e4ngigkeiten, neue Risiken. Altes wird obsolet und der dynamische \u00abStand der Technik\u00bb immer relevanter und herausfordernder.<\/p>\n<p>Dies f\u00fchrte und f\u00fchrt zur Forderung, dass bereits in der Grundschule nicht nur IT-Anwenderwissen vermittelt werden soll. Auch sogenannte \u00abComputational Skills\u00bb \u2013 das Verstehen und gar Entwickeln von Algorithmen und Datenstrukturen \u2013 sollen in den obligatorischen und sekund\u00e4ren Schulen im Lehrplan integriert werden. Das finden wir unterst\u00fctzenswert und relevant f\u00fcr eine m\u00f6glichst gute \u00abdigitale M\u00fcndigkeit\u00bb im Zeitalter der anzustreben-den \u00abCyber-Souver\u00e4nit\u00e4t\u00bb.<\/p>\n<p>Die Frage kann man mit einer Analogie aus dem medizinischen Bereich analysieren: Ist jeder mit dem Grundschulwissen \u00fcber den menschlichen K\u00f6rper, m\u00f6gliche Krankheitsbilder und Behandlungsmethoden bef\u00e4higt, medizinische Diagnosen und Behandlungen durchzuf\u00fchren? Hier lautet die Antwort klar: Nein. Aber alle sollen in Trivialf\u00e4llen wie Schnupfen oder Grippe sich selbst helfen k\u00f6nnen und \u2013 besonders wichtig \u2014 gen\u00fcgend Wissen haben, um im Rahmen eines Grundverst\u00e4ndnisses zwischen Trivial-f\u00e4llen und ernsthafteren Symptomen unterscheiden zu k\u00f6nnen.<\/p>\n<p><a href=\"https:\/\/magazine.swissinformatics.org\/relevant-software\/security-development-lifecycle-fridelrickenbacher-fsie-2-2\/\" rel=\"attachment wp-att-13621\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-13621\" src=\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2021\/01\/security-development-lifecycle-fridelrickenbacher-fsie-2.png\" alt=\"\" width=\"400\" height=\"439\" srcset=\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2021\/01\/security-development-lifecycle-fridelrickenbacher-fsie-2.png 553w, https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2021\/01\/security-development-lifecycle-fridelrickenbacher-fsie-2-273x300.png 273w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p><strong>Fig 1. Secure Software Development Lifecycle<\/strong><\/p>\n<p><a href=\"https:\/\/magazine.swissinformatics.org\/relevant-software\/security-development-lifecycle-fridelrickenbacher-fsie-3\/\" rel=\"attachment wp-att-13625\">. <\/a><a href=\"https:\/\/magazine.swissinformatics.org\/relevant-software\/fridl-image-2\/\" rel=\"attachment wp-att-13625\"><img decoding=\"async\" class=\"alignnone wp-image-13637 size-mh-magazine-content\" src=\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2021\/01\/Fridl-Image-678x340.jpg\" alt=\"\" width=\"678\" height=\"340\" \/><\/a><\/p>\n<p><strong>Fig.2 Security Development Lifecycle (SOL)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Zur\u00fcck in die IT-Welt: Wenn wir eine sichere und verl\u00e4ssliche IT-Infrastruktur wollen, dann m\u00fcssen wir vermutlich auch hier die nicht-trivialen Arbeiten den gut ausgebildeten oder h\u00f6her spezialisierten Experten \u00fcberlassen, Profis mit gr\u00f6sseren methodischen und Best-Practice-basierten Erfahrungen. Also muss die eingangs gestellte Frage auch mit Nein beantwortet werden.<\/p>\n<p>Es ergeben sich aber damit sofort Folgefragen: Wie kann in Digitalisierungsfragen zwischen trivial und nicht-trivial unterschieden werden?<\/p>\n<p>Hat die Schweiz ein ausreichendes Bildungs- und vor allem auch Weiter- und Fortbildungssystem f\u00fcr IT-Experten?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Die Digitalisierung von Prozessen in allen Branchen und in der Verwaltung schreitet mit grosser Dynamik voran. Es entstehen laufend neue M\u00f6glichkeiten, neue Prozesse, neue Abh\u00e4ngigkeiten, neue Risiken. Altes wird obsolet und der dynamische \u00abStand der Technik\u00bb immer relevanter und herausfordernder. Dies f\u00fchrte und f\u00fchrt zur Forderung, dass bereits in der Grundschule nicht nur IT-Anwenderwissen vermittelt [&hellip;]<\/p>\n","protected":false},"author":373,"featured_media":10780,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1245,423],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz - SI Digital Magazine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz - SI Digital Magazine\" \/>\n<meta property=\"og:description\" content=\"Die Digitalisierung von Prozessen in allen Branchen und in der Verwaltung schreitet mit grosser Dynamik voran. Es entstehen laufend neue M\u00f6glichkeiten, neue Prozesse, neue Abh\u00e4ngigkeiten, neue Risiken. Altes wird obsolet und der dynamische \u00abStand der Technik\u00bb immer relevanter und herausfordernder. Dies f\u00fchrte und f\u00fchrt zur Forderung, dass bereits in der Grundschule nicht nur IT-Anwenderwissen vermittelt [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/\" \/>\n<meta property=\"og:site_name\" content=\"SI Digital Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-15T11:25:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-02T09:52:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2018\/06\/Privacy_Security_ReadersColumn_Winter.png\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"344\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Fridel Rickenbacher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SIGesellschaft\" \/>\n<meta name=\"twitter:site\" content=\"@SIGesellschaft\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fridel Rickenbacher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/\"},\"author\":{\"name\":\"Fridel Rickenbacher\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/d91ec7e916aec5aa29446429cb30a02e\"},\"headline\":\"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz\",\"datePublished\":\"2021-01-15T11:25:28+00:00\",\"dateModified\":\"2022-07-02T09:52:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/\"},\"wordCount\":290,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\"},\"articleSection\":[\"\u2022 Standpunkt \u2022\",\"Technologie\"],\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/\",\"url\":\"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/\",\"name\":\"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz - SI Digital Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#website\"},\"datePublished\":\"2021-01-15T11:25:28+00:00\",\"dateModified\":\"2022-07-02T09:52:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/magazine.swissinformatics.org\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#website\",\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/\",\"name\":\"SI Digital Magazine\",\"description\":\"News - Nachrichten - Nouvelles - Notizie\",\"publisher\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/magazine.swissinformatics.org\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\",\"name\":\"Swiss Informatics Society\",\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg\",\"contentUrl\":\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg\",\"width\":1441,\"height\":1081,\"caption\":\"Swiss Informatics Society\"},\"image\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts\",\"https:\/\/twitter.com\/SIGesellschaft\",\"https:\/\/www.youtube.com\/channel\/UCYUEr1Qkbri9GDTa84z415g\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/d91ec7e916aec5aa29446429cb30a02e\",\"name\":\"Fridel Rickenbacher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b77c2a771a27a1d05f0432a015e8cc54?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b77c2a771a27a1d05f0432a015e8cc54?s=96&d=mm&r=g\",\"caption\":\"Fridel Rickenbacher\"},\"description\":\"Fridel Rickenbacher ist Mitbegr\u00fcnder, DPO CISO und Verwaltungsrat der MIT-GROUP f\u00fcr \u00abEmpowering for the 4th Industrial Revolution\u00bb. Redaktion SwissICT.ch und Experten-Gruppen in den Bereichen CyberSecurity, Privacy, Auditing, Information Ethics, digitale Gesellschaft u.a.\",\"url\":\"https:\/\/magazine.swissinformatics.org\/de\/author\/fridel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz - SI Digital Magazine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/","og_locale":"de_DE","og_type":"article","og_title":"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz - SI Digital Magazine","og_description":"Die Digitalisierung von Prozessen in allen Branchen und in der Verwaltung schreitet mit grosser Dynamik voran. Es entstehen laufend neue M\u00f6glichkeiten, neue Prozesse, neue Abh\u00e4ngigkeiten, neue Risiken. Altes wird obsolet und der dynamische \u00abStand der Technik\u00bb immer relevanter und herausfordernder. Dies f\u00fchrte und f\u00fchrt zur Forderung, dass bereits in der Grundschule nicht nur IT-Anwenderwissen vermittelt [&hellip;]","og_url":"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/","og_site_name":"SI Digital Magazine","article_publisher":"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts","article_published_time":"2021-01-15T11:25:28+00:00","article_modified_time":"2022-07-02T09:52:26+00:00","og_image":[{"width":612,"height":344,"url":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2018\/06\/Privacy_Security_ReadersColumn_Winter.png","type":"image\/png"}],"author":"Fridel Rickenbacher","twitter_card":"summary_large_image","twitter_creator":"@SIGesellschaft","twitter_site":"@SIGesellschaft","twitter_misc":{"Verfasst von":"Fridel Rickenbacher","Gesch\u00e4tzte Lesezeit":"1 Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/#article","isPartOf":{"@id":"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/"},"author":{"name":"Fridel Rickenbacher","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/d91ec7e916aec5aa29446429cb30a02e"},"headline":"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz","datePublished":"2021-01-15T11:25:28+00:00","dateModified":"2022-07-02T09:52:26+00:00","mainEntityOfPage":{"@id":"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/"},"wordCount":290,"commentCount":0,"publisher":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization"},"articleSection":["\u2022 Standpunkt \u2022","Technologie"],"inLanguage":"de-DE","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/","url":"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/","name":"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz - SI Digital Magazine","isPartOf":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#website"},"datePublished":"2021-01-15T11:25:28+00:00","dateModified":"2022-07-02T09:52:26+00:00","breadcrumb":{"@id":"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/magazine.swissinformatics.org\/de\/relevant-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/magazine.swissinformatics.org\/en\/"},{"@type":"ListItem","position":2,"name":"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz"}]},{"@type":"WebSite","@id":"https:\/\/magazine.swissinformatics.org\/en\/#website","url":"https:\/\/magazine.swissinformatics.org\/en\/","name":"SI Digital Magazine","description":"News - Nachrichten - Nouvelles - Notizie","publisher":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/magazine.swissinformatics.org\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization","name":"Swiss Informatics Society","url":"https:\/\/magazine.swissinformatics.org\/en\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/","url":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg","contentUrl":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg","width":1441,"height":1081,"caption":"Swiss Informatics Society"},"image":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts","https:\/\/twitter.com\/SIGesellschaft","https:\/\/www.youtube.com\/channel\/UCYUEr1Qkbri9GDTa84z415g"]},{"@type":"Person","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/d91ec7e916aec5aa29446429cb30a02e","name":"Fridel Rickenbacher","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b77c2a771a27a1d05f0432a015e8cc54?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b77c2a771a27a1d05f0432a015e8cc54?s=96&d=mm&r=g","caption":"Fridel Rickenbacher"},"description":"Fridel Rickenbacher ist Mitbegr\u00fcnder, DPO CISO und Verwaltungsrat der MIT-GROUP f\u00fcr \u00abEmpowering for the 4th Industrial Revolution\u00bb. Redaktion SwissICT.ch und Experten-Gruppen in den Bereichen CyberSecurity, Privacy, Auditing, Information Ethics, digitale Gesellschaft u.a.","url":"https:\/\/magazine.swissinformatics.org\/de\/author\/fridel\/"}]}},"_links":{"self":[{"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/posts\/13551"}],"collection":[{"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/users\/373"}],"replies":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/comments?post=13551"}],"version-history":[{"count":0,"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/posts\/13551\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/media\/10780"}],"wp:attachment":[{"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/media?parent=13551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/categories?post=13551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/de\/wp-json\/wp\/v2\/tags?post=13551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}