{"id":13545,"date":"2021-01-15T12:25:28","date_gmt":"2021-01-15T11:25:28","guid":{"rendered":"https:\/\/magazine.swissinformatics.org\/?p=13545"},"modified":"2022-07-02T11:54:13","modified_gmt":"2022-07-02T09:54:13","slug":"relevant-software","status":"publish","type":"post","link":"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/","title":{"rendered":"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz"},"content":{"rendered":"<p>The digitization of processes in all industries and in administration is progressing with great momentum. New opportunities, new processes, new dependencies, new risks are constantly emerging. Old things are becoming obsolete and the dynamic &#8220;state of the art&#8221; is becoming increasingly relevant and challenging.<\/p>\n<p>This has led and continues to lead to the demand that not only IT user knowledge should be taught as early as elementary school. So-called &#8220;computational skills&#8221; &#8211; understanding and even developing algorithms and data structures &#8211; should also be integrated into the curriculum in compulsory and secondary schools. We find this worthy of support and relevant for the best possible &#8220;digital maturity&#8221; in the age of the &#8220;cyber sovereignty&#8221; to be strived for.<\/p>\n<p>The question can be analyzed with an analogy from the medical field: Is anyone with elementary school knowledge of the human body, possible disease patterns and treatment methods competent to perform medical diagnoses and treatments? Here the answer is clearly: No. But everyone should be able to help themselves in trivial cases such as a cold or the flu and &#8211; especially important &#8211; have enough knowledge to be able to distinguish between trivial cases and more serious symptoms within the framework of a basic understanding.<\/p>\n<p><a href=\"https:\/\/magazine.swissinformatics.org\/relevant-software\/security-development-lifecycle-fridelrickenbacher-fsie-2\/\" rel=\"attachment wp-att-13621\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-13621\" src=\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2021\/01\/security-development-lifecycle-fridelrickenbacher-fsie-2.png\" alt=\"\" width=\"400\" height=\"439\" srcset=\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2021\/01\/security-development-lifecycle-fridelrickenbacher-fsie-2.png 553w, https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2021\/01\/security-development-lifecycle-fridelrickenbacher-fsie-2-273x300.png 273w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p><strong>Fig 1. Secure Software Development Lifecycle<\/strong><\/p>\n<p><a href=\"https:\/\/magazine.swissinformatics.org\/relevant-software\/security-development-lifecycle-fridelrickenbacher-fsie\/\" rel=\"attachment wp-att-13625\">. <\/a><a href=\"https:\/\/magazine.swissinformatics.org\/relevant-software\/fridl-image\/\" rel=\"attachment wp-att-13625\"><img decoding=\"async\" class=\"alignnone wp-image-13637 size-mh-magazine-content\" src=\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2021\/01\/Fridl-Image-678x340.jpg\" alt=\"\" width=\"678\" height=\"340\" \/><\/a><\/p>\n<p><strong>Fig.2 Security Development Lifecycle (SOL)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Back to the IT world: If we want a secure and reliable IT infrastructure, then we probably have to leave the non-trivial work to the well-trained or more highly specialized experts here as well, professionals with greater methodological and best-practice-based experience. So the question posed at the beginning must also be answered in the negative.<\/p>\n<p>But this immediately raises follow-up questions: How can we distinguish between trivial and non-trivial in digitization issues?<\/p>\n<p>Does Switzerland have an adequate education and, above all, continuing education and training system for IT experts?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The digitization of processes in all industries and in administration is progressing with great momentum. New opportunities, new processes, new dependencies, new risks are constantly emerging. Old things are becoming obsolete and the dynamic &#8220;state of the art&#8221; is becoming increasingly relevant and challenging. This has led and continues to lead to the demand that [&hellip;]<\/p>\n","protected":false},"author":373,"featured_media":9268,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1244,355],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz - SI Digital Magazine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz - SI Digital Magazine\" \/>\n<meta property=\"og:description\" content=\"The digitization of processes in all industries and in administration is progressing with great momentum. New opportunities, new processes, new dependencies, new risks are constantly emerging. Old things are becoming obsolete and the dynamic &#8220;state of the art&#8221; is becoming increasingly relevant and challenging. This has led and continues to lead to the demand that [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/\" \/>\n<meta property=\"og:site_name\" content=\"SI Digital Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-15T11:25:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-02T09:54:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2018\/06\/Privacy_Security_ReadersColumn_Winter.png\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"344\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Fridel Rickenbacher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SIGesellschaft\" \/>\n<meta name=\"twitter:site\" content=\"@SIGesellschaft\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fridel Rickenbacher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/\"},\"author\":{\"name\":\"Fridel Rickenbacher\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/d91ec7e916aec5aa29446429cb30a02e\"},\"headline\":\"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz\",\"datePublished\":\"2021-01-15T11:25:28+00:00\",\"dateModified\":\"2022-07-02T09:54:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/\"},\"wordCount\":310,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\"},\"articleSection\":[\"\u2022 Viewpoint \u2022\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/\",\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/\",\"name\":\"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz - SI Digital Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#website\"},\"datePublished\":\"2021-01-15T11:25:28+00:00\",\"dateModified\":\"2022-07-02T09:54:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/magazine.swissinformatics.org\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#website\",\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/\",\"name\":\"SI Digital Magazine\",\"description\":\"Articles from the Swiss Informatics Society (Blog)\",\"publisher\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/magazine.swissinformatics.org\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\",\"name\":\"Swiss Informatics Society\",\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg\",\"contentUrl\":\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg\",\"width\":1441,\"height\":1081,\"caption\":\"Swiss Informatics Society\"},\"image\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts\",\"https:\/\/twitter.com\/SIGesellschaft\",\"https:\/\/www.youtube.com\/channel\/UCYUEr1Qkbri9GDTa84z415g\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/d91ec7e916aec5aa29446429cb30a02e\",\"name\":\"Fridel Rickenbacher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b77c2a771a27a1d05f0432a015e8cc54?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b77c2a771a27a1d05f0432a015e8cc54?s=96&d=mm&r=g\",\"caption\":\"Fridel Rickenbacher\"},\"description\":\"Fridel Rickenbacher ist Mitbegr\u00fcnder, DPO CISO und Verwaltungsrat der MIT-GROUP f\u00fcr \u00abEmpowering for the 4th Industrial Revolution\u00bb. Redaktion SwissICT.ch und Experten-Gruppen in den Bereichen CyberSecurity, Privacy, Auditing, Information Ethics, digitale Gesellschaft u.a.\",\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/author\/fridel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz - SI Digital Magazine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/","og_locale":"en_US","og_type":"article","og_title":"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz - SI Digital Magazine","og_description":"The digitization of processes in all industries and in administration is progressing with great momentum. New opportunities, new processes, new dependencies, new risks are constantly emerging. Old things are becoming obsolete and the dynamic &#8220;state of the art&#8221; is becoming increasingly relevant and challenging. This has led and continues to lead to the demand that [&hellip;]","og_url":"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/","og_site_name":"SI Digital Magazine","article_publisher":"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts","article_published_time":"2021-01-15T11:25:28+00:00","article_modified_time":"2022-07-02T09:54:13+00:00","og_image":[{"width":612,"height":344,"url":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2018\/06\/Privacy_Security_ReadersColumn_Winter.png","type":"image\/png"}],"author":"Fridel Rickenbacher","twitter_card":"summary_large_image","twitter_creator":"@SIGesellschaft","twitter_site":"@SIGesellschaft","twitter_misc":{"Written by":"Fridel Rickenbacher","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/#article","isPartOf":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/"},"author":{"name":"Fridel Rickenbacher","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/d91ec7e916aec5aa29446429cb30a02e"},"headline":"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz","datePublished":"2021-01-15T11:25:28+00:00","dateModified":"2022-07-02T09:54:13+00:00","mainEntityOfPage":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/"},"wordCount":310,"commentCount":0,"publisher":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization"},"articleSection":["\u2022 Viewpoint \u2022","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/","url":"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/","name":"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz - SI Digital Magazine","isPartOf":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#website"},"datePublished":"2021-01-15T11:25:28+00:00","dateModified":"2022-07-02T09:54:13+00:00","breadcrumb":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/magazine.swissinformatics.org\/en\/relevant-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/magazine.swissinformatics.org\/en\/"},{"@type":"ListItem","position":2,"name":"Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz"}]},{"@type":"WebSite","@id":"https:\/\/magazine.swissinformatics.org\/en\/#website","url":"https:\/\/magazine.swissinformatics.org\/en\/","name":"SI Digital Magazine","description":"Articles from the Swiss Informatics Society (Blog)","publisher":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/magazine.swissinformatics.org\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization","name":"Swiss Informatics Society","url":"https:\/\/magazine.swissinformatics.org\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/","url":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg","contentUrl":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg","width":1441,"height":1081,"caption":"Swiss Informatics Society"},"image":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts","https:\/\/twitter.com\/SIGesellschaft","https:\/\/www.youtube.com\/channel\/UCYUEr1Qkbri9GDTa84z415g"]},{"@type":"Person","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/d91ec7e916aec5aa29446429cb30a02e","name":"Fridel Rickenbacher","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b77c2a771a27a1d05f0432a015e8cc54?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b77c2a771a27a1d05f0432a015e8cc54?s=96&d=mm&r=g","caption":"Fridel Rickenbacher"},"description":"Fridel Rickenbacher ist Mitbegr\u00fcnder, DPO CISO und Verwaltungsrat der MIT-GROUP f\u00fcr \u00abEmpowering for the 4th Industrial Revolution\u00bb. Redaktion SwissICT.ch und Experten-Gruppen in den Bereichen CyberSecurity, Privacy, Auditing, Information Ethics, digitale Gesellschaft u.a.","url":"https:\/\/magazine.swissinformatics.org\/en\/author\/fridel\/"}]}},"_links":{"self":[{"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/posts\/13545"}],"collection":[{"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/users\/373"}],"replies":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/comments?post=13545"}],"version-history":[{"count":0,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/posts\/13545\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/media\/9268"}],"wp:attachment":[{"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/media?parent=13545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/categories?post=13545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/tags?post=13545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}