{"id":17147,"date":"2021-06-07T11:25:42","date_gmt":"2021-06-07T09:25:42","guid":{"rendered":"https:\/\/zema.de\/?post_type=dt_portfolio&#038;p=17147"},"modified":"2021-06-08T11:36:12","modified_gmt":"2021-06-08T09:36:12","slug":"industrial-it-security","status":"publish","type":"dt_portfolio","link":"https:\/\/zema.de\/fr\/projekt\/industrial-it-security\/","title":{"rendered":"S\u00e9curit\u00e9 informatique industrielle"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"ult-spacer spacer-69e0d03577402\" data-id=\"69e0d03577402\" data-height=\"30\" data-height-mobile=\"30\" data-height-tab=\"30\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><div class=\"hr-thin style-line\" style=\"width: 100%;border-top-width: 1px;\"><\/div><div class=\"ult-spacer spacer-69e0d03577458\" data-id=\"69e0d03577458\" data-height=\"30\" data-height-mobile=\"30\" data-height-tab=\"30\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><div class=\"dt-fancy-separator h1-size\" style=\"width: 100%;\"><div class=\"dt-fancy-title\"><span class=\"separator-holder separator-left\"><\/span>S\u00e9curit\u00e9 informatique industrielle \u2013 \u00c9laboration d\u2019une approche globale de la gestion de la s\u00e9curit\u00e9 pour la production num\u00e9rique<span class=\"separator-holder separator-right\"><\/span><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12 vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"ult-spacer spacer-69e0d03577b2d\" data-id=\"69e0d03577b2d\" data-height=\"30\" data-height-mobile=\"30\" data-height-tab=\"30\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>texte<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"ult-spacer spacer-69e0d03578189\" data-id=\"69e0d03578189\" data-height=\"30\" data-height-mobile=\"30\" data-height-tab=\"30\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><div class=\"hr-thin style-line\" style=\"width: 100%;border-top-width: 1px;\"><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpb_animate_when_almost_visible wpb_slideInUp slideInUp\"><div class=\"right wpb_column vc_column_container vc_col-sm-8 vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"ult-spacer spacer-69e0d035786b8\" data-id=\"69e0d035786b8\" data-height=\"30\" data-height-mobile=\"30\" data-height-tab=\"30\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon {\n  width: 128px;\n  height: 128px;\n  line-height: 128px;\n  font-size: 64px;\n  border-radius: 200px;\n  margin: 90px 0px 0px 60px;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon .icon-inner {\n  min-width: 128px;\n  min-height: 128px;\n  border-radius: 200px;\n}\n@media all and (-ms-high-contrast: none) {\n  .icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon .icon-inner {\n    height: 128px;\n  }\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon .dt-hover-icon {\n  line-height: 128px;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon:before,\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon:after,\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon .icon-inner:before,\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon .icon-inner:after {\n  min-width: 100%;\n  min-height: 100%;\n  padding: inherit;\n  border-radius: inherit;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-border-on:before {\n  border-width: 2px;\n  border-style: solid;\n}\n.dt-icon-border-dashed.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-border-on:before {\n  border-style: dashed;\n}\n.dt-icon-border-dotted.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-border-on:before {\n  border-style: dotted;\n}\n.dt-icon-border-double.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-border-on:before {\n  border-style: double;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-border-dashed.dt-icon-border-on:before {\n  border-style: dashed;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-border-dotted.dt-icon-border-on:before {\n  border-style: dotted;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-border-double.dt-icon-border-on:before {\n  border-style: double;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-hover-border-on:after {\n  border-width: 2px;\n  border-style: solid;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-border-dashed.dt-icon-hover-border-on:after {\n  border-style: dashed;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-border-dotted.dt-icon-hover-border-on:after {\n  border-style: dotted;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-border-double.dt-icon-hover-border-on:after {\n  border-style: double;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-hover-on:hover {\n  font-size: 64px;\n}\n#page .icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-hover-on:hover .soc-font-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-hover-on:hover .soc-font-icon,\n#page .icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-hover-on:hover .soc-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-hover-on:hover .soc-icon {\n  color: #fff;\n  background: none;\n}\n#page .icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-hover-on:not(:hover) .soc-font-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-hover-on:not(:hover) .soc-font-icon,\n#page .icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-hover-on:not(:hover) .soc-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-hover-on:not(:hover) .soc-icon,\n#page .icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-hover-off .soc-font-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-hover-off .soc-font-icon,\n#page .icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-hover-off .soc-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .text-icon.dt-icon-hover-off .soc-icon {\n  color: #ffffff;\n  background: none;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e.layout-1 {\n  grid-template-columns: 128px minmax(0,1fr);\n  grid-column-gap: 60px;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e.layout-2 {\n  grid-template-columns: minmax(0,1fr) 128px;\n  grid-column-gap: 60px;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e.layout-2 .text-icon {\n  margin-left: 0;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e.layout-3 {\n  grid-template-columns: 128px minmax(0,1fr);\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e.layout-3 .dt-text-title {\n  margin-left: 0px;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .dt-text-title,\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .dt-text-title a {\n  color: #558398;\n  background: none;\n  font-weight: bold;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .dt-text-title {\n  margin-bottom: 10px;\n}\n.icon-with-text-shortcode.icon-text-id-4416f49e264b7b2178112f8a40dc6a7e .dt-text-desc {\n  margin-bottom: 30px;\n}<\/style><div class=\"icon-with-text-shortcode  icon-text-id-4416f49e264b7b2178112f8a40dc6a7e layout-2\" ><span   class=\"text-icon dt-icon-bg-on dt-icon-hover-off\" ><span class=\"icon-inner\"><i class=\"dt-regular-icon soc-icon Defaults-exclamation\"><\/i><i class=\"dt-hover-icon soc-icon Defaults-exclamation\"><\/i><\/span><\/span><h3 class=\"dt-text-title\"  >probl\u00e9matique<\/h3><div class=\"dt-text-desc\">Avec le d\u00e9veloppement futur dans le cadre de l'industrie 4.0, la mise en r\u00e9seau des composants individuels continue d'augmenter fortement, car les syst\u00e8mes cyber-physiques interagissent de plus en plus de mani\u00e8re autonome les uns avec les autres. Les failles de s\u00e9curit\u00e9 ou les vuln\u00e9rabilit\u00e9s des syst\u00e8mes de production sous la forme d'erreurs de conception, de mise en \u0153uvre et de configuration peuvent donc avoir des cons\u00e9quences dramatiques sur l'ensemble de l'application connect\u00e9e. Les points faibles offrent un potentiel d'acc\u00e8s non autoris\u00e9s et d'interventions ind\u00e9sirables dans le syst\u00e8me de production et peuvent par exemple conduire \u00e0 une production d\u00e9fectueuse, \u00e0 l'arr\u00eat de l'installation ou m\u00eame \u00e0 des dommages corporels.<\/div><\/div><div class=\"hr-thin style-dotted\" style=\"width: 100%;border-top-width: 1px;\"><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4 vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"ult-spacer spacer-69e0d03578a13\" data-id=\"69e0d03578a13\" data-height=\"105\" data-height-mobile=\"105\" data-height-tab=\"105\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpb_animate_when_almost_visible wpb_slideInUp slideInUp\"><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"ult-spacer spacer-69e0d03578e56\" data-id=\"69e0d03578e56\" data-height=\"95\" data-height-mobile=\"95\" data-height-tab=\"95\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-8\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"ult-spacer spacer-69e0d03579002\" data-id=\"69e0d03579002\" data-height=\"30\" data-height-mobile=\"30\" data-height-tab=\"30\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon {\n  width: 128px;\n  height: 128px;\n  line-height: 128px;\n  font-size: 64px;\n  border-radius: 200px;\n  margin: 120px 60px 0px 0px;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon .icon-inner {\n  min-width: 128px;\n  min-height: 128px;\n  border-radius: 200px;\n}\n@media all and (-ms-high-contrast: none) {\n  .icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon .icon-inner {\n    height: 128px;\n  }\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon .dt-hover-icon {\n  line-height: 128px;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon:before,\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon:after,\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon .icon-inner:before,\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon .icon-inner:after {\n  min-width: 100%;\n  min-height: 100%;\n  padding: inherit;\n  border-radius: inherit;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-border-on:before {\n  border-width: 2px;\n  border-style: solid;\n}\n.dt-icon-border-dashed.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-border-on:before {\n  border-style: dashed;\n}\n.dt-icon-border-dotted.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-border-on:before {\n  border-style: dotted;\n}\n.dt-icon-border-double.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-border-on:before {\n  border-style: double;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-border-dashed.dt-icon-border-on:before {\n  border-style: dashed;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-border-dotted.dt-icon-border-on:before {\n  border-style: dotted;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-border-double.dt-icon-border-on:before {\n  border-style: double;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-hover-border-on:after {\n  border-width: 2px;\n  border-style: solid;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-border-dashed.dt-icon-hover-border-on:after {\n  border-style: dashed;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-border-dotted.dt-icon-hover-border-on:after {\n  border-style: dotted;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-border-double.dt-icon-hover-border-on:after {\n  border-style: double;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-hover-on:hover {\n  font-size: 64px;\n}\n#page .icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-hover-on:hover .soc-font-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-hover-on:hover .soc-font-icon,\n#page .icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-hover-on:hover .soc-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-hover-on:hover .soc-icon {\n  color: #fff;\n  background: none;\n}\n#page .icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-hover-on:not(:hover) .soc-font-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-hover-on:not(:hover) .soc-font-icon,\n#page .icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-hover-on:not(:hover) .soc-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-hover-on:not(:hover) .soc-icon,\n#page .icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-hover-off .soc-font-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-hover-off .soc-font-icon,\n#page .icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-hover-off .soc-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .text-icon.dt-icon-hover-off .soc-icon {\n  color: #ffffff;\n  background: none;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d.layout-1 {\n  grid-template-columns: 128px minmax(0,1fr);\n  grid-column-gap: 60px;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d.layout-2 {\n  grid-template-columns: minmax(0,1fr) 128px;\n  grid-column-gap: 0px;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d.layout-2 .text-icon {\n  margin-left: 0;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d.layout-3 {\n  grid-template-columns: 128px minmax(0,1fr);\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d.layout-3 .dt-text-title {\n  margin-left: 60px;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .dt-text-title,\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .dt-text-title a {\n  color: #558398;\n  background: none;\n  font-weight: bold;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .dt-text-title {\n  margin-bottom: 10px;\n}\n.icon-with-text-shortcode.icon-text-id-f7baab0287299ec0f1f4687bbb71a86d .dt-text-desc {\n  margin-bottom: 30px;\n}<\/style><div class=\"icon-with-text-shortcode  icon-text-id-f7baab0287299ec0f1f4687bbb71a86d layout-1\" ><span   class=\"text-icon dt-icon-bg-on dt-icon-hover-off\" ><span class=\"icon-inner\"><i class=\"dt-regular-icon soc-icon icomoon-the7-font-the7-map-02\"><\/i><i class=\"dt-hover-icon soc-icon icomoon-the7-font-the7-map-02\"><\/i><\/span><\/span><h3 class=\"dt-text-title\"  >Objectif<\/h3><div class=\"dt-text-desc\">Le projet Industrial IT-Security comprend le d\u00e9veloppement d\u2019un concept global de gestion de la s\u00e9curit\u00e9 pour la production num\u00e9rique et fait partie du programme de doctorat \u00abNum\u00e9risation de la production\u00bb de l\u2019Universit\u00e9 de la Sarre.<br \/>\nDe plus amples informations sur ce projet ainsi que sur tous les autres projets du Coll\u00e8ge de promotion sont disponibles \u00e0 l'adresse suivante: https:\/\/www.pk-digprod.de.<\/div><a href=\"https:\/\/www.pk-digprod.de\" class=\"anchor-link  default-btn-shortcode dt-btn dt-btn-s link-hover-off full-width-btn\"><span>vers le site web du projet<\/span><\/a><\/div><div class=\"hr-thin style-dotted\" style=\"width: 100%;border-top-width: 1px;\"><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpb_animate_when_almost_visible wpb_slideInUp slideInUp\"><div class=\"right wpb_column vc_column_container vc_col-sm-8 vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"ult-spacer spacer-69e0d035795b5\" data-id=\"69e0d035795b5\" data-height=\"30\" data-height-mobile=\"30\" data-height-tab=\"30\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon {\n  width: 128px;\n  height: 128px;\n  line-height: 128px;\n  font-size: 64px;\n  border-radius: 200px;\n  margin: 150px 0px 0px 60px;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon .icon-inner {\n  min-width: 128px;\n  min-height: 128px;\n  border-radius: 200px;\n}\n@media all and (-ms-high-contrast: none) {\n  .icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon .icon-inner {\n    height: 128px;\n  }\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon .dt-hover-icon {\n  line-height: 128px;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon:before,\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon:after,\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon .icon-inner:before,\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon .icon-inner:after {\n  min-width: 100%;\n  min-height: 100%;\n  padding: inherit;\n  border-radius: inherit;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-border-on:before {\n  border-width: 2px;\n  border-style: solid;\n}\n.dt-icon-border-dashed.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-border-on:before {\n  border-style: dashed;\n}\n.dt-icon-border-dotted.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-border-on:before {\n  border-style: dotted;\n}\n.dt-icon-border-double.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-border-on:before {\n  border-style: double;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-border-dashed.dt-icon-border-on:before {\n  border-style: dashed;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-border-dotted.dt-icon-border-on:before {\n  border-style: dotted;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-border-double.dt-icon-border-on:before {\n  border-style: double;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-hover-border-on:after {\n  border-width: 2px;\n  border-style: solid;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-border-dashed.dt-icon-hover-border-on:after {\n  border-style: dashed;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-border-dotted.dt-icon-hover-border-on:after {\n  border-style: dotted;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-border-double.dt-icon-hover-border-on:after {\n  border-style: double;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-hover-on:hover {\n  font-size: 64px;\n}\n#page .icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-hover-on:hover .soc-font-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-hover-on:hover .soc-font-icon,\n#page .icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-hover-on:hover .soc-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-hover-on:hover .soc-icon {\n  color: #fff;\n  background: none;\n}\n#page .icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-hover-on:not(:hover) .soc-font-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-hover-on:not(:hover) .soc-font-icon,\n#page .icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-hover-on:not(:hover) .soc-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-hover-on:not(:hover) .soc-icon,\n#page .icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-hover-off .soc-font-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-hover-off .soc-font-icon,\n#page .icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-hover-off .soc-icon,\n#phantom .icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .text-icon.dt-icon-hover-off .soc-icon {\n  color: #ffffff;\n  background: none;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e.layout-1 {\n  grid-template-columns: 128px minmax(0,1fr);\n  grid-column-gap: 60px;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e.layout-2 {\n  grid-template-columns: minmax(0,1fr) 128px;\n  grid-column-gap: 60px;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e.layout-2 .text-icon {\n  margin-left: 0;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e.layout-3 {\n  grid-template-columns: 128px minmax(0,1fr);\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e.layout-3 .dt-text-title {\n  margin-left: 0px;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .dt-text-title,\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .dt-text-title a {\n  color: #558398;\n  background: none;\n  font-weight: bold;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .dt-text-title {\n  margin-bottom: 10px;\n}\n.icon-with-text-shortcode.icon-text-id-ad1ec14ff0e1a45051eda937a570159e .dt-text-desc {\n  margin-bottom: 30px;\n}<\/style><div class=\"icon-with-text-shortcode  icon-text-id-ad1ec14ff0e1a45051eda937a570159e layout-2\" ><span   class=\"text-icon dt-icon-bg-on dt-icon-hover-off\" ><span class=\"icon-inner\"><i class=\"dt-regular-icon soc-icon icomoon-font-awesome-14x14-map-signs\"><\/i><i class=\"dt-hover-icon soc-icon icomoon-font-awesome-14x14-map-signs\"><\/i><\/span><\/span><h3 class=\"dt-text-title\"  >Proc\u00e9dure \u00e0 suivre<\/h3><div class=\"dt-text-desc\">analyse<br \/>\nEtude et analyse de technologies de communication s\u00e9lectionn\u00e9es. L'accent est mis sur PROFINET et OPC-UA. L'analyse des risques porte sur l'\u00e9tablissement des protocoles et les services associ\u00e9s.<\/p>\n<p>\u00e9largissement<br \/>\nL'environnement de test existant sera \u00e9tendu \u00e0 d'autres composants industriels afin de pouvoir analyser \u00e0 la fois l'\u00e9tat de la technique et les installations Industrie 4.0 \u00e9mergentes.<\/p>\n<p>D\u00e9tection des anomalies<br \/>\nD\u00e9veloppement d'un syst\u00e8me de d\u00e9tection et de surveillance des anomalies pour la protection contre les cyberattaques. Le d\u00e9roulement de la communication est v\u00e9rifi\u00e9 en temps r\u00e9el et les informations sur les anomalies sont visualis\u00e9es de mani\u00e8re appropri\u00e9e.<\/p>\n<p>Sp\u00e9cification de test &amp; Ex\u00e9cution du test<br \/>\nR\u00e9alisation d'essais sur la base d'un processus de production r\u00e9el. Les r\u00e9sultats permettent de formuler des recommandations d'action pour les futurs syst\u00e8mes d'automatisation Industrie 4.0.<\/div><\/div><div class=\"hr-thin style-dotted\" style=\"width: 100%;border-top-width: 1px;\"><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4 vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"ult-spacer spacer-69e0d0357985b\" data-id=\"69e0d0357985b\" data-height=\"140\" data-height-mobile=\"140\" data-height-tab=\"140\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpb_animate_when_almost_visible wpb_slideInUp slideInUp\"><div class=\"wpb_column vc_column_container vc_col-sm-6 vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6 vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.shortcode-single-image-wrap.shortcode-single-image-c03b8283ca36e89f2974074eaea73f2f.enable-bg-rollover .rollover i,\n.shortcode-single-image-wrap.shortcode-single-image-c03b8283ca36e89f2974074eaea73f2f.enable-bg-rollover .rollover-video i {\n  background: -webkit-linear-gradient();\n  background: linear-gradient();\n}\n.shortcode-single-image-wrap.shortcode-single-image-c03b8283ca36e89f2974074eaea73f2f .rollover-icon {\n  font-size: 32px;\n  color: #ffffff;\n  min-width: 44px;\n  min-height: 44px;\n  line-height: 44px;\n  border-radius: 100px;\n  border-style: solid;\n  border-width: 0px;\n}\n.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-c03b8283ca36e89f2974074eaea73f2f .rollover-icon {\n  background: rgba(255,255,255,0.3);\n  box-shadow: none;\n}<\/style><div class=\"shortcode-single-image-wrap shortcode-single-image-c03b8283ca36e89f2974074eaea73f2f alignnone  enable-bg-rollover dt-icon-bg-off\" style=\"margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; width:250px;\"><div class=\"shortcode-single-image\"><div class=\"fancy-media-wrap  layzr-bg\" style=\"\"><img decoding=\"async\" class=\"preload-me lazy-load aspect\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%20250%20174&#39;%2F%3E\" data-src=\"https:\/\/zema.de\/wp-content\/uploads\/2020\/07\/bmbf_logo-250x174.jpg\" data-srcset=\"https:\/\/zema.de\/wp-content\/uploads\/2020\/07\/bmbf_logo-250x174.jpg 250w, https:\/\/zema.de\/wp-content\/uploads\/2020\/07\/bmbf_logo-500x348.jpg 500w\" loading=\"eager\" sizes=\"(max-width: 250px) 100vw, 250px\" width=\"250\" height=\"174\"  data-dt-location=\"https:\/\/zema.de\/fr\/projekt\/newip\/bmbf_logo\/\" style=\"--ratio: 250 \/ 174;\" alt=\"\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>S\u00e9curit\u00e9 informatique industrielle \u2013 \u00c9laboration d\u2019un concept global de gestion de la s\u00e9curit\u00e9 pour la production num\u00e9rique Texte D\u00e9finition du probl\u00e8meL\u2019\u00e9volution future de l\u2019industrie 4.0 continue d\u2019accro\u00eetre consid\u00e9rablement la connectivit\u00e9 des diff\u00e9rents composants, \u00e9tant donn\u00e9 que les syst\u00e8mes cyberphysiques interagissent de plus en plus de mani\u00e8re autonome. Les failles de s\u00e9curit\u00e9 ou les vuln\u00e9rabilit\u00e9s des syst\u00e8mes de production sous la forme d'erreurs de conception, d'impl\u00e9mentation et de configuration peuvent donc avoir des...<\/p>","protected":false},"author":14,"featured_media":17161,"comment_status":"closed","ping_status":"closed","template":"","dt_portfolio_category":[49],"dt_portfolio_tags":[],"class_list":["post-17147","dt_portfolio","type-dt_portfolio","status-publish","has-post-thumbnail","hentry","dt_portfolio_category-industrial-security","dt_portfolio_category-49","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EU-Forschungsprojekt Industrial IT-Security - ZeMA gGmbH Saarbr\u00fccken<\/title>\n<meta name=\"description\" content=\"BEAT\u00b2 - Wie dielektrische Elastomeren als Antrieb f\u00fcr Basslautsprecher enormes Marktpotenzial und neue Gesch\u00e4ftsfelder er\u00f6ffnen k\u00f6nnen. \u25b6Erfahren Sie mehr!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/zema.de\/fr\/projekt\/industrial-it-security\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EU-Forschungsprojekt Industrial IT-Security - ZeMA gGmbH Saarbr\u00fccken\" \/>\n<meta property=\"og:description\" content=\"BEAT\u00b2 - Wie dielektrische Elastomeren als Antrieb f\u00fcr Basslautsprecher enormes Marktpotenzial und neue Gesch\u00e4ftsfelder er\u00f6ffnen k\u00f6nnen. \u25b6Erfahren Sie mehr!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zema.de\/fr\/projekt\/industrial-it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"fl.zema.de\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-08T09:36:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/zema.de\/wp-content\/uploads\/2021\/06\/security_laptop_symbols_quadratisch.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/zema.de\\\/projekt\\\/industrial-it-security\\\/\",\"url\":\"https:\\\/\\\/zema.de\\\/projekt\\\/industrial-it-security\\\/\",\"name\":\"EU-Forschungsprojekt Industrial IT-Security - ZeMA gGmbH Saarbr\u00fccken\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zema.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/zema.de\\\/projekt\\\/industrial-it-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/zema.de\\\/projekt\\\/industrial-it-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zema.de\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/security_laptop_symbols_quadratisch.jpg\",\"datePublished\":\"2021-06-07T09:25:42+00:00\",\"dateModified\":\"2021-06-08T09:36:12+00:00\",\"description\":\"BEAT\u00b2 - Wie dielektrische Elastomeren als Antrieb f\u00fcr Basslautsprecher enormes Marktpotenzial und neue Gesch\u00e4ftsfelder er\u00f6ffnen k\u00f6nnen. \u25b6Erfahren Sie mehr!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/zema.de\\\/projekt\\\/industrial-it-security\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/zema.de\\\/projekt\\\/industrial-it-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/zema.de\\\/projekt\\\/industrial-it-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/zema.de\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/security_laptop_symbols_quadratisch.jpg\",\"contentUrl\":\"https:\\\/\\\/zema.de\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/security_laptop_symbols_quadratisch.jpg\",\"width\":1280,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/zema.de\\\/projekt\\\/industrial-it-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/zema.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Portfolio\",\"item\":\"https:\\\/\\\/zema.de\\\/projekt\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Industrial IT-Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/zema.de\\\/#website\",\"url\":\"https:\\\/\\\/zema.de\\\/\",\"name\":\"fl.zema.de\",\"description\":\"Zentrum f\u00fcr Mechatronik und Automatisierungstechnik\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/zema.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EU-Forschungsprojekt Industrial IT-Security - ZeMA gGmbH Saarbr\u00fccken","description":"BEAT\u00b2 - Wie dielektrische Elastomeren als Antrieb f\u00fcr Basslautsprecher enormes Marktpotenzial und neue Gesch\u00e4ftsfelder er\u00f6ffnen k\u00f6nnen. \u25b6Erfahren Sie mehr!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zema.de\/fr\/projekt\/industrial-it-security\/","og_locale":"fr_FR","og_type":"article","og_title":"EU-Forschungsprojekt Industrial IT-Security - ZeMA gGmbH Saarbr\u00fccken","og_description":"BEAT\u00b2 - Wie dielektrische Elastomeren als Antrieb f\u00fcr Basslautsprecher enormes Marktpotenzial und neue Gesch\u00e4ftsfelder er\u00f6ffnen k\u00f6nnen. \u25b6Erfahren Sie mehr!","og_url":"https:\/\/zema.de\/fr\/projekt\/industrial-it-security\/","og_site_name":"fl.zema.de","article_modified_time":"2021-06-08T09:36:12+00:00","og_image":[{"width":1280,"height":1280,"url":"https:\/\/zema.de\/wp-content\/uploads\/2021\/06\/security_laptop_symbols_quadratisch.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/zema.de\/projekt\/industrial-it-security\/","url":"https:\/\/zema.de\/projekt\/industrial-it-security\/","name":"EU-Forschungsprojekt Industrial IT-Security - ZeMA gGmbH Saarbr\u00fccken","isPartOf":{"@id":"https:\/\/zema.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/zema.de\/projekt\/industrial-it-security\/#primaryimage"},"image":{"@id":"https:\/\/zema.de\/projekt\/industrial-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/zema.de\/wp-content\/uploads\/2021\/06\/security_laptop_symbols_quadratisch.jpg","datePublished":"2021-06-07T09:25:42+00:00","dateModified":"2021-06-08T09:36:12+00:00","description":"BEAT\u00b2 - Wie dielektrische Elastomeren als Antrieb f\u00fcr Basslautsprecher enormes Marktpotenzial und neue Gesch\u00e4ftsfelder er\u00f6ffnen k\u00f6nnen. \u25b6Erfahren Sie mehr!","breadcrumb":{"@id":"https:\/\/zema.de\/projekt\/industrial-it-security\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zema.de\/projekt\/industrial-it-security\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/zema.de\/projekt\/industrial-it-security\/#primaryimage","url":"https:\/\/zema.de\/wp-content\/uploads\/2021\/06\/security_laptop_symbols_quadratisch.jpg","contentUrl":"https:\/\/zema.de\/wp-content\/uploads\/2021\/06\/security_laptop_symbols_quadratisch.jpg","width":1280,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/zema.de\/projekt\/industrial-it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/zema.de\/"},{"@type":"ListItem","position":2,"name":"Portfolio","item":"https:\/\/zema.de\/projekt\/"},{"@type":"ListItem","position":3,"name":"Industrial IT-Security"}]},{"@type":"WebSite","@id":"https:\/\/zema.de\/#website","url":"https:\/\/zema.de\/","name":"fl.zema.de","description":"Zentrum f\u00fcr Mechatronik und Automatisierungstechnik","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zema.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/zema.de\/fr\/wp-json\/wp\/v2\/dt_portfolio\/17147","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zema.de\/fr\/wp-json\/wp\/v2\/dt_portfolio"}],"about":[{"href":"https:\/\/zema.de\/fr\/wp-json\/wp\/v2\/types\/dt_portfolio"}],"author":[{"embeddable":true,"href":"https:\/\/zema.de\/fr\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/zema.de\/fr\/wp-json\/wp\/v2\/comments?post=17147"}],"version-history":[{"count":5,"href":"https:\/\/zema.de\/fr\/wp-json\/wp\/v2\/dt_portfolio\/17147\/revisions"}],"predecessor-version":[{"id":17174,"href":"https:\/\/zema.de\/fr\/wp-json\/wp\/v2\/dt_portfolio\/17147\/revisions\/17174"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zema.de\/fr\/wp-json\/wp\/v2\/media\/17161"}],"wp:attachment":[{"href":"https:\/\/zema.de\/fr\/wp-json\/wp\/v2\/media?parent=17147"}],"wp:term":[{"taxonomy":"dt_portfolio_category","embeddable":true,"href":"https:\/\/zema.de\/fr\/wp-json\/wp\/v2\/dt_portfolio_category?post=17147"},{"taxonomy":"dt_portfolio_tags","embeddable":true,"href":"https:\/\/zema.de\/fr\/wp-json\/wp\/v2\/dt_portfolio_tags?post=17147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}