{"id":2476,"date":"2017-07-31T18:48:52","date_gmt":"2017-07-31T16:48:52","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=2476"},"modified":"2023-06-08T15:34:47","modified_gmt":"2023-06-08T13:34:47","slug":"social-engineering-firewall-rules-for-your-brain-part-2","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/07\/31\/social-engineering-firewall-rules-for-your-brain-part-2\/","title":{"rendered":"Social Engineering: Firewall-Rules for your brain \u2013 Part 2"},"content":{"rendered":"<p>In the first part of this series you learned which behavioral patterns are usually used to influence humans. Those patterns are the basis of a Social Engineering attack and can usually be detected by a trained person. In the second part we will examine much more sophisticated influencing techniques. Those techniques are very tricky to detect and form a higher threat for your brain\u2019s internal firewall.<\/p>\n<p><!--more--><\/p>\n<h1>Advanced Influencing Techniques<\/h1>\n<h3>Framing<\/h3>\n<p><u><\/u>The <em>Framing<\/em>-technique is based on current studies conducted by the University of California, Berkeley. Researchers from the <em>International Science Institute<\/em> discovered with the help of brain scans and experiments that language (to be precise words) automatically creates frames in our brains. Those frames are used to put physical experiences and stored knowledge in relation. The last sentence sounds very abstract, we will try to fetch the concept with the help of two examples:<\/p>\n<figure id=\"attachment_2478\" aria-describedby=\"caption-attachment-2478\" style=\"width: 458px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_framing.jpeg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2478\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/07\/31\/social-engineering-firewall-rules-for-your-brain-part-2\/03_framing\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_framing.jpeg\" data-orig-size=\"1490,516\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"03_framing\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_framing-1024x355.jpeg\" class=\"wp-image-2478\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_framing-300x104.jpeg\" alt=\"\" width=\"458\" height=\"141\"><\/a><figcaption id=\"caption-attachment-2478\" class=\"wp-caption-text\">Framing Experiments 1 &amp; 2<\/figcaption><\/figure>\n<p><strong>Experiment 1:<\/strong> After reading all words on the left side, probands did <u>walk slower<\/u> than their counterparts that read the right side. Words belonging to the domain of \u201caging\u201d, trigger frames in brain areas responsible for physical experiences.<\/p>\n<p><strong>Experiment 2:<\/strong> After reading both sentences, all probands were one day later asked if they could recount the content of the first sentence. Most of them answered that John <u>used a hammer<\/u> to hit the nail. Based on the stored knowledge, \u201cin 99% we use a hammer to hit a nail\u201d, an association of John using a hammer was trigged by reading the words \u201chitting\u201d and \u201cnail\u201d.<\/p>\n<p><strong>Use Case:<\/strong> Donald Trump is using framing frequently to manipulate the public opinion. In his 2016 presidential campaign for example, Trump used frames that stimulate brain areas responsible for disgust while talking about his fellow campaigners or opponents. In contrast he used frames that describe him as very clean (clean == trust worthy\/good character) when talking about himself.<\/p>\n<figure id=\"attachment_2479\" aria-describedby=\"caption-attachment-2479\" style=\"width: 479px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_framing_trump.jpeg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2479\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/07\/31\/social-engineering-firewall-rules-for-your-brain-part-2\/03_framing_trump\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_framing_trump.jpeg\" data-orig-size=\"1504,595\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"03_framing_trump\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_framing_trump-1024x405.jpeg\" class=\"wp-image-2479\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_framing_trump-300x119.jpeg\" alt=\"\" width=\"479\" height=\"186\"><\/a><figcaption id=\"caption-attachment-2479\" class=\"wp-caption-text\">Donald Trump using framing to manipulate the public opinion<\/figcaption><\/figure>\n<p>Also he introduced the word <em>fake-news<\/em> to English speaking countries. <em>Fake-news<\/em> is a metaphorical mapping that links an idea (news) to an adjective (to fake). Such a mapping is an incredible strong frame, its usage restricts the influence of the media and can\u2019t be negated. When you read the sentence \u201cdon\u2019t think of a pink cow\u201d, you will automatically activate the frame in your brain. The same happens when the media is trying to say that they are not fake-news; They propagate the term and enhance its effect through <em>hebbian learning<\/em>.<\/p>\n<h3>Micro-Expressions<\/h3>\n<p><em>Micro-Expressions<\/em> can also be used very well for manipulation. In 1972 Dr. Paul Ekman identified six expressions connected to universal feelings. Those expressions are deeply anchored in the human brain, their simple imitation will arise the connected feeling. Try to imitate the <em>micro-expressions<\/em> linked to anger (press your lips together and make a raging look with your eyes) and you will automatically feel anger growing in your stomach.<\/p>\n<figure id=\"attachment_2480\" aria-describedby=\"caption-attachment-2480\" style=\"width: 565px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_micro_1.jpeg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2480\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/07\/31\/social-engineering-firewall-rules-for-your-brain-part-2\/03_micro_1\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_micro_1.jpeg\" data-orig-size=\"1511,605\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"03_micro_1\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_micro_1-1024x410.jpeg\" class=\"wp-image-2480\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_micro_1-300x120.jpeg\" alt=\"\" width=\"565\" height=\"268\"><\/a><figcaption id=\"caption-attachment-2480\" class=\"wp-caption-text\">Six micro-expression linked to universal feelings<\/figcaption><\/figure>\n<p>Researchers also discovered that humans are subconsciously mirroring the <em>micro-expressions<\/em> of other humans for the fraction of a second. In Social Engineering this finding can be utilized to trigger feelings in your victim by employing <em>micro-expressions<\/em>. After seeing a tv-fundraiser for kids&nbsp;in Africa, you probably feel some kind of grief because your brain is automatically mirroring the&nbsp;<em>micro-expressions<\/em> of the (sad) kids shown in the video.<\/p>\n<figure id=\"attachment_2481\" aria-describedby=\"caption-attachment-2481\" style=\"width: 520px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_micro_2.jpeg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2481\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/07\/31\/social-engineering-firewall-rules-for-your-brain-part-2\/03_micro_2\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_micro_2.jpeg\" data-orig-size=\"1496,569\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"03_micro_2\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_micro_2-1024x389.jpeg\" class=\"wp-image-2481\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_micro_2-300x114.jpeg\" alt=\"\" width=\"520\" height=\"213\"><\/a><figcaption id=\"caption-attachment-2481\" class=\"wp-caption-text\">Micro-expressions for detecting a liar<\/figcaption><\/figure>\n<p><strong>Use Case:<\/strong> By reading the <em>micro-expressions<\/em> of your victim, you can identify their state of mind, e.g. fear. Depending on the situation, this can be used to enhance (or to weaken) your victims feelings by triggering more fear with your words or body language.<\/p>\n<h3>Quick Rapport<\/h3>\n<p>The goal of every Social Engineer is to <em>build rapport quickly<\/em>. Rapport is a relationship with mutual interaction and can be seen as an excellent entry point for further attacks. One of the leading experts on rapport, Dr. Milton Erickson, had fallen ill with polio as a child. As a result of his illness he had to spent years in bed and could often only observe people. He recognized that people who like it each other start to mirror themselves after time. For example they adjust their body language of breathing pattern to match their partner.<\/p>\n<p>The following figure illustrates recommended tactics by Dr. Erickson to build quick rapport:<\/p>\n<figure id=\"attachment_2482\" aria-describedby=\"caption-attachment-2482\" style=\"width: 517px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_rapport.jpeg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2482\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/07\/31\/social-engineering-firewall-rules-for-your-brain-part-2\/03_rapport\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_rapport.jpeg\" data-orig-size=\"1494,547\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"03_rapport\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_rapport-1024x375.jpeg\" class=\"wp-image-2482\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_rapport-300x110.jpeg\" alt=\"\" width=\"517\" height=\"176\"><\/a><figcaption id=\"caption-attachment-2482\" class=\"wp-caption-text\">Methods for quick rapport&nbsp;Dr. Milton Erickson<\/figcaption><\/figure>\n<p><strong>Use Case<\/strong>: To build rapport quickly a Social Engineering tries to mimic discreetly his victim in a personal conversation. In advance he could also have found out the needs of his victim which he will try to target.<\/p>\n<h3>NLP<\/h3>\n<p>Embedded commands are a technique from <em>NLP<\/em> (Neuro-linguistic Programming), comparable to a SQL-injection via language. In <em>NLP<\/em> you try to conceal commands by constructing sentences with a special syntax or by emphasizing words particularly. A lot of experts see <em>NLP<\/em> as a pseudoscience, but in advertising NLP is often employed with success \u2013 you have to decide on your own.<\/p>\n<figure id=\"attachment_2483\" aria-describedby=\"caption-attachment-2483\" style=\"width: 464px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_nlp.jpeg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2483\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/07\/31\/social-engineering-firewall-rules-for-your-brain-part-2\/03_nlp\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_nlp.jpeg\" data-orig-size=\"1504,607\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"03_nlp\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_nlp-1024x413.jpeg\" class=\"wp-image-2483\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/03_nlp-300x121.jpeg\" alt=\"\" width=\"464\" height=\"196\"><\/a><figcaption id=\"caption-attachment-2483\" class=\"wp-caption-text\">Two examples of NLP<\/figcaption><\/figure>\n<p><strong>Use Case:<\/strong> In the figure above on the right side, <em>NLP<\/em> is used to extract a password from a victim via vishing. When you express a command in the German language you lower your voice at the end of the command. An attacker with enough practice will try to accommodate his speech pattern to inject the command \u201cgive password\u201d in your subconscious by lower his voice at the red words.<\/p>\n<p>&nbsp;<\/p>\n<h1>Final thoughts<\/h1>\n<p>In a nutshell, Social Engineering is a powerful weapon to attack secure systems. Employees have to be educated about the topic &#8211; pointedly said they need to get their brain\u2019s firewall up and running with the right set of <em>drop-<\/em> and <em>reject-rules<\/em>. This blog post can be seen as a basic entry into Social Engineering, but in practice you need experience to identify a sophisticated Social Engineering attack. In a corporate environment you additionally need predefined guidelines that handle certain potential Social Engineering situations, like only opening e-mail-attachments in a sandboxed offline environment. Employees have to stick to those guidelines and must be aware of potential risks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the first part of this series you learned which behavioral patterns are usually used to influence humans. Those patterns are the basis of a Social Engineering attack and can usually be detected by a trained person. In the second part we will examine much more sophisticated influencing techniques. Those techniques are very tricky to [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26,651],"tags":[],"ppma_author":[723],"class_list":["post-2476","post","type-post","status-publish","format-standard","hentry","category-secure-systems","category-system-designs"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":2442,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/07\/28\/social-engineering-firewall-rules-for-your-brain-part-1\/","url_meta":{"origin":2476,"position":0},"title":"Social Engineering: Firewall-Rules for your brain \u2013 Part 1","author":"Simon Schuster","date":"28. July 2017","format":false,"excerpt":"Humans can be regarded as one of the biggest weaknesses for secure systems. Their interaction with technology and awareness for information security makes them usually the \u201cweak link\u201d for gaining access to enterprise networks and private information. From an attackers point of view the investment of using a human to\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/01_Communication_Model_Barnlund-300x153.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/01_Communication_Model_Barnlund-300x153.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/01_Communication_Model_Barnlund-300x153.jpeg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":3867,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/07\/social-engineering-hacking-the-human-os\/","url_meta":{"origin":2476,"position":1},"title":"Social Engineering &#8211; Hacking the human OS","author":"Benjamin Kowatsch","date":"7. August 2018","format":false,"excerpt":"Abstract Nowadays, our secure systems are already sophisticated and perform well. In addition, research on subjects such as quantum computers ensures continuous improvement. However, even with a completely secure system, we humans pose the most significant threat. Social engineers prey on this to conduct illegal activities. For early detection and\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":8720,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/09\/03\/social-engineering-learn-from-the-best\/","url_meta":{"origin":2476,"position":2},"title":"Social Engineering \u2013 Learn From the Best!","author":"Gisela Kollotzek","date":"3. September 2019","format":false,"excerpt":"It isn\u2019t always necessary to attack by technical means to collect information or to penetrate a system. In many cases, it\u2019s more effective to exploit the human risk factor. To successfully protect yourself and your company from social engineering, you\u2019ve to understand how a social engineer works. And the best\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5163,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/02\/24\/migrating-to-kubernetes-part-1-introduction\/","url_meta":{"origin":2476,"position":3},"title":"Migrating to Kubernetes Part 1 &#8211; Introduction","author":"Can Kattwinkel","date":"24. February 2019","format":false,"excerpt":"Written by: Pirmin Gersbacher, Can Kattwinkel, Mario Sallat Introduction The great challenge of collaborative working in a software developer team is to enable a high level of developer activity while ensuring a high product quality. In order to achieve this often CI\/CD processes are utilized. Talking about modern development techniques\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/02\/pexels-photo-379964.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/02\/pexels-photo-379964.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/02\/pexels-photo-379964.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/02\/pexels-photo-379964.jpeg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/02\/pexels-photo-379964.jpeg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":1751,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/12\/22\/snakes-exploring-pipelines-a-system-engineering-and-management-project-4\/","url_meta":{"origin":2476,"position":4},"title":"Snakes exploring Pipelines &#8211; A \u201cSystem Engineering and Management\u201d Project","author":"Yann Loic Philippczyk","date":"22. December 2016","format":false,"excerpt":"Part 3: Coding Guidelines This series of blog entries describes a student project focused on developing an application by using methods like pair programming, test driven development and deployment pipelines. An important part of any professional software development process (like ours :D ) are coding guidelines and methodologies, so we\u2019ll\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"As a visualization of badly developed code: Spaghetti-snakes Source: http:\/\/lh5.ggpht.com\/-Nb0b-coQ1tU\/UsZSC0STOKI\/AAAAAAAAu2I\/F2ehNp977Ww\/narcisse-snake-pits-6%25255B2%25255D.jpg?imgmax=800","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/12\/spaghettiSnakes.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/12\/spaghettiSnakes.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/12\/spaghettiSnakes.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/12\/spaghettiSnakes.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":25560,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/08\/07\/high-availability-and-reliability-in-cloud-computing-ensuring-seamless-operation-despite-the-threat-of-black-swan-events\/","url_meta":{"origin":2476,"position":5},"title":"High Availability and Reliability in Cloud Computing: Ensuring Seamless Operation Despite the Threat of Black Swan Events","author":"mk306","date":"7. August 2023","format":false,"excerpt":"Introduction Nowadays cloud computing has become the backbone of many businesses, offering unparalleled flexibility, scalability and cost-effectiveness. According to O\u2019Reilly\u2019s Cloud Adoption report from 2021, more than 90% of organizations rely on the cloud to run their critical applications and services\u00a0[1]. High availability and reliability of cloud computing systems has\u2026","rel":"","context":"In &quot;Cloud Technologies&quot;","block_context":{"text":"Cloud Technologies","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/cloud-technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/CrossRegion.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/CrossRegion.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/CrossRegion.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/CrossRegion.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":723,"user_id":7,"is_guest":0,"slug":"ss403","display_name":"Simon Schuster","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/47396ece860a3e99df4acda4484c73d3bde2f449a1f16047493496bb9e935660?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/2476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=2476"}],"version-history":[{"count":8,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/2476\/revisions"}],"predecessor-version":[{"id":24719,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/2476\/revisions\/24719"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=2476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=2476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=2476"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=2476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}