{"id":3024,"date":"2023-11-20T14:29:32","date_gmt":"2023-11-20T13:29:32","guid":{"rendered":"https:\/\/www.cyberagentur.de\/projects\/critical-infrastructure-protection-hsk\/"},"modified":"2026-04-28T11:07:20","modified_gmt":"2026-04-28T09:07:20","slug":"hsk","status":"publish","type":"project","link":"https:\/\/www.cyberagentur.de\/en\/programs\/hsk\/","title":{"rendered":"Critical Infrastructure Protection (HSK)"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-left is-style-subheadline-small\">Existential Risks from Cyber and Information Space &#8211; High Security in Security-Critical and Defense-Relevant Scenarios (HSK)<\/h2>\n  <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n<h3 class=\"wp-block-heading has-text-align-left\">Background<\/h3>\n\n<p>IT infrastructures are of critical importance to society today. The currently discussed draft of the new KRITIS umbrella law emphasizes the relevance of critical infrastructures in cyber and information space. <\/p>\n\n<p>Targeted attacks on these structures pose a potential threat to internal and external security. The task of HSK is to research new innovative approaches for the future protection of critical infrastructures. Within the program, an intra- and inter-perspective is adopted, whereby elements of the system, the system itself and the connection of systems represent explorative objects of investigation.<\/p>\n\n<h3 class=\"wp-block-heading has-text-align-left\">Aim<\/h3>\n\n<p>The aim of the program is to develop new capabilities for operational cyber security in order to prepare the authorities in the area of internal and external security in Germany for future threats in the digital space. These capabilities focus on problems and issues within four pillars (prevention, detection, response, and attribution) in operational cyber security. Specifically, HSK will contribute to basic research in the field of:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>automated vulnerability identification in particularly security-sensitive systems and their closure (e.g. triggered by cyber attacks on government networks),<\/li>\n\n\n\n<li>focusing and harmonizing response and forensics during cyber attacks, and <\/li>\n\n\n\n<li>establishing and ensuring unambiguity and indisputability in the attribution of cyber attacks.<\/li>\n<\/ul>\n\n<h3 class=\"wp-block-heading has-text-align-left\">Disruptive Risk Research <\/h3>\n\n<p>The disruptive nature of the program results from the combination of research into the four different pillars and creates different and diverse research approaches and methods for potential contractors.<\/p>\n\n<p>Particularly disruptive approaches and basic research needs can be found in the area of attribution and require the combination of social and natural science disciplines.<\/p>\n\n<h3 class=\"wp-block-heading has-text-align-left\">Further links <\/h3>\n\n<p>Project pages of the contractors: <a href=\"https:\/\/omen.cs.uni-magdeburg.de\/itiamsl\/deutsch\/attribut\/index.html\">ATTRIBUT<\/a>, <a href=\"https:\/\/sovereign-project.de\/\">SOVEREIGN<\/a> <\/p>\n\n<p><\/p>\n\n<p><\/p>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Existential Risks from Cyber and Information Space &#8211; High Security in Security-Critical and Defense-Relevant Scenarios (HSK) Background IT infrastructures are of critical importance to society today. The currently discussed draft of the new KRITIS umbrella law emphasizes the relevance of critical infrastructures in cyber and information space. Targeted attacks on these structures pose a potential [&hellip;]<\/p>\n","protected":false},"featured_media":2953,"template":"","class_list":["post-3024","project","type-project","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Critical Infrastructure Protection (HSK) - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/hsk\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical Infrastructure Protection (HSK) - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"Existential Risks from Cyber and Information Space &#8211; High Security in Security-Critical and Defense-Relevant Scenarios (HSK) Background IT infrastructures are of critical importance to society today. The currently discussed draft of the new KRITIS umbrella law emphasizes the relevance of critical infrastructures in cyber and information space. Targeted attacks on these structures pose a potential [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/programs\/hsk\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T09:07:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/08\/HSK.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2304\" \/>\n\t<meta property=\"og:image:height\" content=\"1792\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/hsk\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/hsk\\\/\",\"name\":\"Critical Infrastructure Protection (HSK) - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/hsk\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/hsk\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/HSK.jpg\",\"datePublished\":\"2023-11-20T13:29:32+00:00\",\"dateModified\":\"2026-04-28T09:07:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/hsk\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/hsk\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/hsk\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/HSK.jpg\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/HSK.jpg\",\"width\":2304,\"height\":1792,\"caption\":\"HSK\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/hsk\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Critical Infrastructure Protection (HSK)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical Infrastructure Protection (HSK) - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/programs\/hsk\/","og_locale":"en_GB","og_type":"article","og_title":"Critical Infrastructure Protection (HSK) - Cyberagentur","og_description":"Existential Risks from Cyber and Information Space &#8211; High Security in Security-Critical and Defense-Relevant Scenarios (HSK) Background IT infrastructures are of critical importance to society today. The currently discussed draft of the new KRITIS umbrella law emphasizes the relevance of critical infrastructures in cyber and information space. Targeted attacks on these structures pose a potential [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/programs\/hsk\/","og_site_name":"Cyberagentur","article_modified_time":"2026-04-28T09:07:20+00:00","og_image":[{"width":2304,"height":1792,"url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/08\/HSK.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/programs\/hsk\/","url":"https:\/\/www.cyberagentur.de\/en\/programs\/hsk\/","name":"Critical Infrastructure Protection (HSK) - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/programs\/hsk\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/programs\/hsk\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2024\/08\/HSK.jpg","datePublished":"2023-11-20T13:29:32+00:00","dateModified":"2026-04-28T09:07:20+00:00","breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/programs\/hsk\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/programs\/hsk\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cyberagentur.de\/en\/programs\/hsk\/#primaryimage","url":"\/wp-content\/uploads\/2024\/08\/HSK.jpg","contentUrl":"\/wp-content\/uploads\/2024\/08\/HSK.jpg","width":2304,"height":1792,"caption":"HSK"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/programs\/hsk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Critical Infrastructure Protection (HSK)"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme\/3024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/project"}],"version-history":[{"count":3,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme\/3024\/revisions"}],"predecessor-version":[{"id":4155,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme\/3024\/revisions\/4155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media\/2953"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=3024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}