{"id":184,"date":"2024-04-16T09:50:29","date_gmt":"2024-04-16T07:50:29","guid":{"rendered":"https:\/\/cyber.ddev.site\/wp\/focal-points\/secure-systems\/"},"modified":"2026-02-04T10:44:44","modified_gmt":"2026-02-04T09:44:44","slug":"cybersicherheit-komplexer-systeme","status":"publish","type":"page","link":"https:\/\/www.cyberagentur.de\/en\/focal-points\/cybersicherheit-komplexer-systeme\/","title":{"rendered":"Cybersecurity of complex systems"},"content":{"rendered":"\n<p class=\"has-text-align-center is-style-subtitle-hight-space\">The fact is that the security of modern digital infrastructures is no longer determined by individual system components, but by the interaction of highly networked, dynamic and adaptive systems. Government institutions, armed forces and critical infrastructures are increasingly operating in system landscapes whose complexity overwhelms traditional security approaches. Attacks exploit not only technical vulnerabilities, but also systemic dependencies, emergent effects and unforeseen interactions. Cybersecurity must therefore be rethought: as the ability to understand complex systems holistically, analyze them with foresight and protect them adaptively.   <\/p>\n<div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-default ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default ce-frame--with-icon has-background has-white-background-color align wp-block-cyberagentur-frame has-background has-white-background-color\">\n    \n    <div class=\"ce-frame__content\">\n            <div class=\"ce-frame__content__wrapper\">\n          <div class=\"ce-frame__icon ce-frame__icon--mobile\">\n        \n    <\/div>\n      \n      <div class=\"ce-frame__content__row\">\n              <div class=\"ce-frame__icon\">\n        \n    <\/div>\n          <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left\">Our topics in this focus area<\/h2>\n\n\n  <div class=\"ce-faqaccordions wp-block-cyberagentur-faqaccordions accordion\" id=\"69f2607199e61\">\n  <div class=\"accordion-item\" id=\"emergente-digitale-systeme-fuer-verwaltung-und-streitkraefte\">\n  <h3 class=\"accordion-header\">\n    <button class=\"accordion-button collapsed\" arial-label=\"Expand entry\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#69f2607199e61_5700\" aria-expanded=\"false\" aria-controls=\"69f2607199e61_5700\">\n      <span>Emergent digital systems for administration and armed forces<\/span>\n    <\/button>\n  <\/h3>\n  <div id=\"69f2607199e61_5700\" class=\"accordion-collapse collapse \" data-bs-parent=\"\">\n    <div class=\"accordion-body\">\n    <p>The cyber security of the federal administration, the armed forces, civil defence and other organizations with security tasks requires new ways of thinking and system approaches. Cyber systems and networks of these institutions are to be further developed through disruptive research in the areas of cyber transcendence &#8211; as the ability for independent functional development &#8211; and cyber symbiosis &#8211; as cooperative interaction with other systems and actors &#8211; so that they can act not only vigilantly, but also context-sensitively and proactively. The aim is to generate cooperative system behaviour independently and to proactively identify and neutralize threats.  <\/p>\n\n    <\/div>\n  <\/div>\n<\/div><div class=\"accordion-item\" id=\"praediktive-und-kognitive-systeme\">\n  <h3 class=\"accordion-header\">\n    <button class=\"accordion-button collapsed\" arial-label=\"Expand entry\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#69f2607199e61_5699\" aria-expanded=\"false\" aria-controls=\"69f2607199e61_5699\">\n      <span>Predictive and cognitive systems<\/span>\n    <\/button>\n  <\/h3>\n  <div id=\"69f2607199e61_5699\" class=\"accordion-collapse collapse \" data-bs-parent=\"\">\n    <div class=\"accordion-body\">\n    <p>The effective management of complex (crisis and operational) situations requires in-depth situational awareness. However, enabling precise situational awareness through the intelligent combination and synthesizing interpretation of data from various sources, e.g. real-time sensor data with OSINT data and expert knowledge, requires further research. Innovative approaches must be used to develop systems that combine data-based predictions with professional intuition in order to support informed, situation-appropriate decisions and reliable forecasts of future developments.   <\/p>\n\n    <\/div>\n  <\/div>\n<\/div><div class=\"accordion-item\" id=\"schutz-kritischer-infrastrukturen-2\">\n  <h3 class=\"accordion-header\">\n    <button class=\"accordion-button collapsed\" arial-label=\"Expand entry\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#69f2607199e61_5698\" aria-expanded=\"false\" aria-controls=\"69f2607199e61_5698\">\n      <span>Critical infrastructure protection<\/span>\n    <\/button>\n  <\/h3>\n  <div id=\"69f2607199e61_5698\" class=\"accordion-collapse collapse \" data-bs-parent=\"\">\n    <div class=\"accordion-body\">\n    <p>Critical infrastructures are the backbone of a state and its society. In Germany, this includes basic services such as electricity, water and food supplies as well as sectors such as media and culture. A failure of these infrastructures ranges from short-term disruptions to existential threats to the German state system. Due to the constantly growing number of critical infrastructures, the primary aim is to research holistic solutions in order to guarantee adaptability to different sectors. Research will be conducted into how the complexity of critical infrastructures can be represented. Furthermore, dependencies within and between infrastructures are to be mapped. The aim is also to develop technical measures to protect systems from complexity-related attacks.      <\/p>\n\n    <\/div>\n  <\/div>\n<\/div><div class=\"accordion-item\" id=\"unbemannte-systeme-und-robotik\">\n  <h3 class=\"accordion-header\">\n    <button class=\"accordion-button collapsed\" arial-label=\"Expand entry\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#69f2607199e61_5853\" aria-expanded=\"false\" aria-controls=\"69f2607199e61_5853\">\n      <span>Unmanned systems and robotics<\/span>\n    <\/button>\n  <\/h3>\n  <div id=\"69f2607199e61_5853\" class=\"accordion-collapse collapse \" data-bs-parent=\"\">\n    <div class=\"accordion-body\">\n    <p>With the increasing spread of unmanned, semi-autonomous and highly automated systems, the demands on their cyber security are also growing. The focus here is on reliable and protected communication in heterogeneous networks and swarms, robust adaptability to demanding operating environments such as crisis or disaster areas and consistent protection against manipulation, unauthorized access and unauthorized data leakage. <\/p>\n\n    <\/div>\n  <\/div>\n<\/div>\n  <\/div>\n<\/div>\n      <\/div>\n    <\/div>\n    <\/div>\n    \n<\/div><div class=\"ce-panel-buttons is-layout-constrained alignfull ce-panel-buttons__columns-3 ce-panel-buttons--default has-background has-white-background-color align align is-style-less-space wp-block-cyberagentur-panelbuttons has-background has-white-background-color\">\n  <div class=\"ce-panel-buttons__content\">\n    <div class=\"acf-innerblocks-container\">\n<div class=\"ce-panel-button ce--dark-mode ce-panel-button--default align align wp-block-cyberagentur-panelbutton\">\n      <div class=\"ce-panel-button__background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1919\" src=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg 2560w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-300x225.jpg 300w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1024x768.jpg 1024w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-768x576.jpg 768w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1536x1151.jpg 1536w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-2048x1535.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/>\n    <\/div>\n  <a class='ce-panel-button__content-link' href='https:\/\/www.cyberagentur.de\/en\/programs\/' target='_self' aria-label='go to  Programs'>  <h2 class=\"title\">Programs<\/h2>\n  <p>in this focus<\/p>\n   \n  <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n    <div class=\"wp-block-button is-style-simple\">\n      <span class='wp-block-button__link wp-element-button' >Learn more<\/span>\n     \n    <\/div>\n  <\/div> <\/a>\n\n<\/div>\n\n<div class=\"ce-panel-button ce--dark-mode ce-panel-button--default align align wp-block-cyberagentur-panelbutton\">\n      <div class=\"ce-panel-button__background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1919\" src=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg 2560w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-300x225.jpg 300w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1024x768.jpg 1024w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-768x576.jpg 768w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1536x1151.jpg 1536w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-2048x1535.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/>\n    <\/div>\n  <a class='ce-panel-button__content-link' href='https:\/\/www.cyberagentur.de\/en\/awarded\/' target='_self' aria-label='go to  Awards'>  <h2 class=\"title\">Awards<\/h2>\n  <p>in this focus<\/p>\n   \n  <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n    <div class=\"wp-block-button is-style-simple\">\n      <span class='wp-block-button__link wp-element-button' >Learn more<\/span>\n     \n    <\/div>\n  <\/div> <\/a>\n\n<\/div>\n\n<div class=\"ce-panel-button ce--dark-mode ce-panel-button--default align align wp-block-cyberagentur-panelbutton\">\n      <div class=\"ce-panel-button__background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1919\" src=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg 2560w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-300x225.jpg 300w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1024x768.jpg 1024w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-768x576.jpg 768w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1536x1151.jpg 1536w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-2048x1535.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/>\n    <\/div>\n  <a class='ce-panel-button__content-link' href='https:\/\/www.cyberagentur.de\/en\/karriere\/' target='_self' aria-label='go to  Vacancies'>  <h2 class=\"title\">Vacancies<\/h2>\n  <p><\/p>\n   \n  <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n    <div class=\"wp-block-button is-style-simple\">\n      <span class='wp-block-button__link wp-element-button' >Learn more<\/span>\n     \n    <\/div>\n  <\/div> <\/a>\n\n<\/div>\n<\/div>\n  <\/div>\n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-right ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default has-background has-purple-misty-background-color align is-style-default wp-block-cyberagentur-frame has-background has-purple-misty-background-color\">\n    \n    <div class=\"ce-frame__content\">\n            <div class=\"ce-frame__background\">\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/Fragezeichen_space_white.svg\" class=\"attachment-full size-full\" alt=\"\" \/>\n    <\/div>    \n    <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left\">Questions about this focus?<\/h2>\n\n\n\n<p>Write us an e-mail: <br\/><a href=\"mailto:&#115;&#105;&#99;h&#101;&#114;&#101;&#45;s&#121;&#115;t&#101;&#109;&#101;&#64;&#99;y&#98;er&#97;&#103;&#101;n&#116;u&#114;&#46;&#100;&#101;\">&#115;ic&#104;&#101;&#114;&#101;&#45;&#115;&#121;&#115;&#116;&#101;m&#101;&#64;&#99;y&#98;er&#97;g&#101;nt&#117;&#114;&#46;d&#101;<\/a><\/p>\n\n<\/div>\n    <\/div>\n    \n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-default ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default has-background has-white-background-color align wp-block-cyberagentur-frame has-background has-white-background-color\">\n    \n    <div class=\"ce-frame__content\">\n            \n    <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left is-style-subtitle is-style-subheadline\">Also interesting<\/h2>\n\n\n<div class=\"ce-focusmenu ce-focusmenu--2columns has-background has-white-background-color align wp-block-cyberagentur-focusmenu has-background has-white-background-color\">\n    <ul class=\"ce-panelmenu\">\n        <li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/secure-society\/\" aria-label=\"go to  Secure society\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2024\/04\/CA_Icon_Sichere-Gesellschaft.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Secure society<\/h3>\n      <p>So that we are safe in the digital world of the day after tomorrow.<\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li><li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/schluesseltechnologien\/\" aria-label=\"go to  Key technologies\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2024\/04\/CA_Icon_Schluesseltechnologien-2.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Key technologies<\/h3>\n      <p>The impact is coming. Let&#8217;s make use of it. <\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li><li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/vertrauenswuerdige-technische-wertschoepfungsketten\/\" aria-label=\"go to  Trustworthy technical value chains\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2026\/04\/CA_Icon_VerTechWK_final.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Trustworthy technical value chains<\/h3>\n      <p>So that citizens in Germany can have confidence in digital solutions.<\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li>\n    <\/ul>\n<\/div>\n<\/div>\n    <\/div>\n    \n<\/div>","protected":false},"excerpt":{"rendered":"<p>The fact is that the security of modern digital infrastructures is no longer determined by individual system components, but by the interaction of highly networked, dynamic and adaptive systems. Government institutions, armed forces and critical infrastructures are increasingly operating in system landscapes whose complexity overwhelms traditional security approaches. Attacks exploit not only technical vulnerabilities, but [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":3321,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-184","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity of complex systems - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/cybersicherheit-komplexer-systeme\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity of complex systems - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"The fact is that the security of modern digital infrastructures is no longer determined by individual system components, but by the interaction of highly networked, dynamic and adaptive systems. Government institutions, armed forces and critical infrastructures are increasingly operating in system landscapes whose complexity overwhelms traditional security approaches. Attacks exploit not only technical vulnerabilities, but [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/cybersicherheit-komplexer-systeme\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-04T09:44:44+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/cybersicherheit-komplexer-systeme\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/cybersicherheit-komplexer-systeme\\\/\",\"name\":\"Cybersecurity of complex systems - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"datePublished\":\"2024-04-16T07:50:29+00:00\",\"dateModified\":\"2026-02-04T09:44:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/cybersicherheit-komplexer-systeme\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/cybersicherheit-komplexer-systeme\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/cybersicherheit-komplexer-systeme\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Focal points\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity of complex systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity of complex systems - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/focal-points\/cybersicherheit-komplexer-systeme\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersecurity of complex systems - Cyberagentur","og_description":"The fact is that the security of modern digital infrastructures is no longer determined by individual system components, but by the interaction of highly networked, dynamic and adaptive systems. Government institutions, armed forces and critical infrastructures are increasingly operating in system landscapes whose complexity overwhelms traditional security approaches. Attacks exploit not only technical vulnerabilities, but [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/focal-points\/cybersicherheit-komplexer-systeme\/","og_site_name":"Cyberagentur","article_modified_time":"2026-02-04T09:44:44+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/cybersicherheit-komplexer-systeme\/","url":"https:\/\/www.cyberagentur.de\/en\/focal-points\/cybersicherheit-komplexer-systeme\/","name":"Cybersecurity of complex systems - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"datePublished":"2024-04-16T07:50:29+00:00","dateModified":"2026-02-04T09:44:44+00:00","breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/cybersicherheit-komplexer-systeme\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/focal-points\/cybersicherheit-komplexer-systeme\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/cybersicherheit-komplexer-systeme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Focal points","item":"https:\/\/www.cyberagentur.de\/en\/focal-points\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity of complex systems"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/comments?post=184"}],"version-history":[{"count":16,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/184\/revisions"}],"predecessor-version":[{"id":6213,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/184\/revisions\/6213"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/3321"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}