ΠΠΎΠ΄ΡΡΠ΄ΡΠΈΠΊ ΡΠ°Π·Π²Π΅Π΄ΡΠΎΠΎΠ±ΡΠ΅ΡΡΠ²Π° Π‘Π¨Π Π½Π°Π½ΡΠ» ΡΠΏΠ΅ΡΠΈΠ°Π»ΠΈΡΡΠ° ΠΏΠΎΒ ΠΊΠΈΠ±Π΅ΡΠ²ΠΎΠΉΠ½Π΅ ΠΈΠ·Β Π¦Π Π£
ΠΠ΅Π΄ΡΡΠΈΠΉ ΡΠΏΠ΅ΡΠΈΠ°Π»ΠΈΡΡ ΠΡΠ½Π³Π»ΠΈ ΠΏΠΎ ΠΊΠΈΠ±Π΅ΡΠ²ΠΎΠΉΠ½Π΅ ΠΈ Π²Π½Π΅Π΄ΡΠ΅Π½ΠΈΡ Π½ΠΎΠ²ΡΡ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΠΈΠΉ, Π²Π»Π°Π΄Π΅Π»Π΅Ρ Nightwing: ΡΠ²ΡΠ·ΠΈ Ρ ΠΠ΅ΠΌΠΏΠ°ΡΡΠΈΠ΅ΠΉ Π‘Π¨Π ΠΈ Π΄ΠΈΡΠ΅ΠΊΡΠΎΡΠΎΠΌ Π¦Π Π£ ΠΠ΅ΡΠ½ΡΠΎΠΌ, ΠΎΠ±Π·ΠΎΡ Π΄Π΅ΡΡΠ΅Π»ΡΠ½ΠΎΡΡΠΈ ΠΈ ΠΊΠ»ΡΡΠ΅Π²ΡΡ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ ΠΊΠΈΠ±Π΅ΡΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΈ
AIΒ & MLΒ Are Transforming OTΒ Cybersecurity
Who βknewβ βthat βthe βsaviors βofΒ βourβ βindustrial βcontrolβ βsystemsβ βand βcritical βinfrastructureβ βwould βcomeβ βinΒ βthe βform βofβΒ βAIβΒ βand βMLβΒ βalgorithms? Traditional βsecurityβ βmeasures, βwith βtheir βquaint βrule-basedβ βapproaches,β βare βapparentlyβ βsoΒ βlastβ βcentury. βEnter βAIΒ βand βML,β βtheβ βknightsβ βinΒ βshiningβ βarmor, βreadyβ βtoΒ βtackleβ βtheβ βever-evolving βcyberβ βthreats βthat βour βpoor, βdefenselessβ βOTΒ βsystemsβ βface.
Theseβ βmagical βtechnologies βcanβ βestablish βbaselinesβ βofΒ βnormal βbehavior βandβ βdetectβ βanomalies βwithβ βthe βprecisionβ βofΒ βaΒ βseasoned βdetective. βTheyβ βcanβ βsift βthroughβ βmountains βofβΒ βdata, βfinding βthose βpesky βattackβ βindicatorsβ βthatβ βmere βmortalsβ βwould βmiss.β βAnd βletβsβ βnotβ βforget βtheirβ βability βtoΒ βautomate βthreat βdetectionβ βand βincidentβ βresponse,β βbecause βwho βneedsβ βhuman βinterventionβ βanyway?
Supervised βlearning, βunsupervised βlearning,β βdeepβ βlearningβohΒ βmy!β βThese βtechniquesβ βare βlike βthe βSwiss βArmyβ βknivesβ βofΒ βcybersecurity,β βeach βoneβ βmore βimpressive βthan βthe βlast.β βSure,β βthereβ βare βaβΒ βfew βminorβ βhiccups, βlikeβ βtheβ βlack βofβΒ βhigh-quality βlabeled βdata βand βtheβ βcomplexity βofβΒ βmodelingβ βOTΒ βenvironments, βbutβ βwhoβs βworriedβ βabout βthat?
AIΒ βand βMLβΒ βareβ βbeing βseamlesslyβ βintegrated βintoβ βOTΒ βsecurity βsolutions, βpromising βaβΒ βfutureβ βwhere βcyber-riskβ βvisibility βandβ βprotection βare βasΒ βeasy βasβΒ βpie.β βSo,β βhereβs βtoβΒ βour βnewβ βAIΒ βoverlordsβmayβ βtheyβ βkeep βourβ βOTΒ βsystems βsafe βwhile βweβΒ βsit βbackβ βandβ βmarvel βatΒ βtheirβ βbrilliance.
πOperational βTechnologyβ β(OT) βsystems βlike βthoseβ βusedβ βinΒ βindustrialβ βcontrol βsystemsβ βand βcritical βinfrastructure βare βincreasinglyβ βbeingβ βtargeted βbyβΒ βcyber βthreats.
πTraditionalβ βrule-based βsecurity βsolutions βare βinadequateβ βforβ βdetectingβ βsophisticated βattacksβ βand βanomaliesβ βinΒ βOTβΒ βenvironments.
πArtificialβ βIntelligence β(AI)β βand βMachine βLearning β(ML) βtechnologiesβ βare βbeingβ βleveragedβ βtoΒ βprovide βmoreβ βeffective βcybersecurityβ βfor βOTΒ βsystems:
πAI/ML βcanβ βestablishβ βaccurate βbaselinesβ βofΒ βnormalβ βOTΒ βsystem βbehavior βand βdetectβ βdeviationsβ βindicative βofβΒ βcyber βthreats.
πAI/MLβ βalgorithms βcan βanalyze βlarge βvolumesβ βofβΒ βOTβΒ βdata βfromβ βdisparate βsourcesβ βtoΒ βidentifyβ βsubtleβ βattack βindicatorsβ βthat βhumans βmay βmiss.
πAI/ML βenablesβ βautomated βthreatβ βdetection,β βfaster βincident βresponse,β βand βpredictiveβ βmaintenance βtoΒ βimprove βOTβΒ βsystemβ βresilience.
πSupervised βlearningβ βmodels βtrainedβ βonΒ βknown βthreat βdata βtoβΒ βdetectβ βmalware βandβ βmalicious βactivityβ βpatterns.
πUnsupervised βlearning βfor βanomaly βdetectionβ βbyβΒ βidentifyingβ βdeviations βfromβ βnormal βOTβΒ βasset βbehaviorβ βprofiles.
πDeepβ βlearning βmodelsβ βlike βneural βnetworks βand βgraphβ βneural βnetworksβ βforβ βmore βadvanced βthreatβ βdetection.
πChallenges βremainβ βinΒ βtraining βeffective βAI/MLβ βmodelsβ βdue βtoβΒ βlack βofβΒ βhigh-quality βlabeled βOTΒ βdata βandβ βtheβ βcomplexity βofβΒ βmodeling βOTβΒ βenvironments.
πAI/ML βcapabilities βare βbeing βintegratedβ βintoβ βOTβΒ βsecurity βmonitoringβ βand βassetβ βmanagement βsolutionsβ βtoβΒ βenhance βcyber-riskβ βvisibility βand βprotection
Why Bother with Cybersecurity? Just Let Event Logs DoΒ All the Work, Google said
ByΒ βleveraging Windowsβ βEvent βLogs βand βintegrating βwithβ βadvanced βdetectionβ βsystems,β βorganizations βcan βbetterβ βprotect βthemselvesβ βagainst βthe βgrowing βthreatβ βofβΒ βbrowser βdataβ βtheft.
Technical βKeypoints
πWindowsβ βEvent βLogs: The βmethod βleverages βWindowsβ βEventβ βLogs βtoβΒ βdetect βsuspiciousβ βactivities βthat βmay βindicate βbrowserβ βdataβ βtheft.β βThis βincludesβ βmonitoring βspecificβ βevent βIDsβ βandβ βpatterns βthatβ βare βindicative βofΒ βmalicious βbehavior.
πEventβ βIDs: βKeyβ βeventβ βIDs βtoΒ βmonitorβ βinclude βEventβ βIDΒ β4688 βtoΒ βTracksβ βprocessβ βcreation, βwhichβ βcan βhelpβ βidentify βwhen βaΒ βbrowser βorβΒ βrelatedβ βprocess βisβΒ βstarted; βEventβ βIDΒ β5145 βtoΒ βMonitors βfileβ βaccess,β βwhichβ βcan βbeβΒ βused βtoβΒ βdetect βunauthorizedβ βaccessβ βtoΒ βbrowserβ βdata βfiles; βand βEvent βIDβΒ β4663 βtoβΒ βTracksβ βobject βaccess, βusefulβ βfor βidentifyingβ βattempts βtoΒ βread βorβΒ βmodifyβ βbrowser βdataβ βfiles.
πBehavioral βAnalysis: Theβ βapproach βinvolves βanalyzing βthe βbehaviorβ βofβΒ βprocesses βandβ βtheir βinteractionsβ βwith βbrowser βdata βfiles. βThisβ βincludesβ βlookingβ βfor βunusualβ βpatterns βsuchβ βasΒ βprocessesβ βthatβ βdoΒ βnotβ βtypically βaccess βbrowser βdata βfilesβ βsuddenly βdoingβ βso,β βhigh βfrequency βofβΒ βaccess βtoβΒ βbrowser βdata βfiles βbyβΒ βnon-browserβ βprocesses.
πIntegration βwithβ βSIEM: βTheβ βmethod βcan βbeΒ βintegrated βwithβ βSecurityβ βInformation βandβ βEvent βManagementβ β(SIEM) βsystems βtoΒ βautomate βtheβ βdetectionβ βandβ βalerting βprocess.β βThis βallowsβ βfor βreal-timeβ βmonitoringβ βand βquickerβ βresponse βtoΒ βpotential βdata βtheftβ βincidents.
πMachine βLearning:β βTheβ βuse βofΒ βmachineβ βlearning βmodelsβ βtoΒ βenhance βdetection βcapabilitiesβ βbyβΒ βidentifying βanomaliesβ βand βpatternsβ βthat βare βnot βeasily βdetectableβ βthroughβ βrule-based βsystemsβ βalone.
Impact βonβΒ βIndustries
πEnhanced βSecurity βPosture: ByΒ βimplementing βthisβ βdetectionβ βmethod,β βorganizations βcanβ βsignificantly βenhanceβ βtheir βsecurityβ βpostureβ βagainst βbrowserβ βdata βtheft. βThis βisΒ βparticularlyβ βimportant βforβ βindustriesβ βthat βhandle βsensitiveβ βinformation, βsuchβ βasΒ βfinance, βhealthcare, βandβ βlegalβ βsectors.
πCompliance βandβ βRegulatory βRequirements: Manyβ βindustries βare βsubject βtoΒ βstrictβ βcomplianceβ βand βregulatoryβ βrequirements βregardingβ βdata βprotection. βThis βmethod βhelpsβ βorganizationsβ βmeetβ βthese βrequirementsβ βbyΒ βprovidingβ βaΒ βrobustβ βmechanismβ βfor βdetectingβ βand βpreventing βdata βbreaches.
πIncident βResponse:β βThe βabilityβ βtoβΒ βdetect βbrowser βdataβ βtheft βinβΒ βreal-time βallows βfor βquickerβ βincidentβ βresponse, βminimizingβ βthe βpotentialβ βdamage βand βreducing βthe βtimeβ βattackersβ βhave βaccessβ βtoΒ βsensitiveβ βdata.
πCost βSavings: βEarly βdetection βandβ βpreventionβ βofβΒ βdata βtheftβ βcan βleadβ βtoΒ βsignificantβ βcostβ βsavings βbyβΒ βavoiding βthe βfinancial βand βreputationalβ βdamage βassociatedβ βwithβ βdata βbreaches.
πTrust βandβ βReputation: βForβ βindustries βthat βrely βheavilyβ βonβΒ βcustomer βtrust,β βsuch βasβΒ βe-commerce βand βonline βservices, βdemonstratingβ βaβΒ βstrong βcommitmentβ βtoΒ βdataβ βsecurity βcan βenhance βreputation βandβ βcustomerβ βconfidence.
Databricks AIΒ Security Framework (DASF)
The βDatabricksβ βAIΒ βSecurity βFramework β(DASF), βohβΒ βwhat βaβΒ βtreasureβ βtrove βofΒ βwisdomβ βitΒ βis,β βbestows βupon βusΒ βtheβ βgrandβ βillusion βofβΒ βcontrol βinβΒ βthe βwild βwest βofΒ βAIβΒ βsystems.β βItβs βaβΒ βveritable βchecklistβ βofΒ β53 βsecurity βrisks βthatβ βcouldβ βtotallyβ βhappen, βbutβ βyou βknow,β βonly βifβΒ βyouβreβ βunlucky βorβΒ βsomething.
Letβs βdive βinto βthe βrivetingβ βaspects βthisβ βanalysisβ βwill βcover, βshallβΒ βwe?
πSecurity βRisksβ βIdentification: βHere, βweβll βpretendβ βtoβΒ βbeΒ βshockedβ βatΒ βtheβ βdiscovery βofΒ βvulnerabilities βinΒ βAIβΒ βsystems.β βItβs βnotβ βlike βweβΒ βever βthought βthese βsystems βwereβ βbulletproof,β βright?
πControlβ βMeasures: βThisβ βisΒ βwhereβ βweΒ βgetβ βtoβΒ βplay βheroβ βbyΒ βimplementing βthose β53 βmagicalβ βsteps βthatβ βpromiseβ βtoΒ βkeep βtheβ βAIΒ βboogeymanβ βatΒ βbay.
πDeployment βModels: Weβll βexploreβ βtheβ βvarious βwaysβ βAIΒ βcanβ βbeΒ βunleashed βupon βthe βworld,β βbecauseβ βwhy βnotβ βmake βthingsβ βmore βcomplicated?
πIntegration βwith βExisting βSecurityβ βFrameworks:β βBecauseβ βreinventing βtheβ βwheel βisβΒ βsoΒ βlastβ βmillennium,β βweβll βseeβ βhow βDASF βplays βnice βwithβ βother βframeworks.
πPracticalβ βImplementation: Thisβ βisΒ βwhere βweβΒ βroll βupβΒ βour βsleeves βand βgetβ βtoβΒ βwork, βapplyingβ βthe βframeworkβ βwith βthe βsame βenthusiasm βasβΒ βaβΒ βkid βdoingβ βchores.
And βwhy,β βyou βask, βisΒ βthis βanalysisβ βaβΒ βgodsendβ βfor βsecurityβ βprofessionals βandβ βother βspecialists?β βWell,β βitβs βnotβ βlike βthey βhave βanything βbetterβ βtoΒ βdoβΒ βthanβ βread βthrough βanotherβ βset βofβΒ βguidelines, βright? βPlus, βitβsβ βalwaysβ βfun βtoβΒ βalign βwithβ βregulatory βrequirementsβitβs βlike βplaying βaβΒ βgameβ βofΒ βlegalβ βTwister.
InΒ βallβ βseriousness, βthis βanalysis βwill βbeβΒ βasβΒ βbeneficialβ βasΒ βaβΒ βscreen βdoorβ βonΒ βaβΒ βsubmarineβ βfor βthoseβ βlooking βtoΒ βsafeguard βtheir βAIβΒ βassets. βByβΒ βfollowingβ βthe βDASF, βorganizationsβ βcan βpretendβ βtoΒ βhave βaΒ βhandleβ βonβΒ βthe βfuture,β βsecure βinβΒ βthe βknowledge βthat βtheyβve βdoneβ βtheβ βbare βminimumβ βtoΒ βprotectβ βtheir βAIΒ βsystems βfrom βtheβ βbig,β βbadβ βworld βoutβ βthere.
-----
This βdocumentβ βprovides βanβΒ βin-depthβ βanalysis βofβΒ βthe βDASF, βexploring βits βstructure,β βrecommendations, βandβ βtheβ βpractical βapplications βitβΒ βoffers βtoβΒ βorganizations βimplementing βAIΒ βsolutions.β βThisβ βanalysis βnotβ βonly βservesβ βasΒ βaΒ βquality βexamination βbutβ βalsoβ βhighlights βitsβ βsignificance βandβ βpractical βbenefits βfor βsecurity βexpertsβ βandβ βprofessionalsβ βacross βdifferentβ βsectors. βByβΒ βimplementing βtheβ βguidelinesβ βand βcontrolsβ βrecommended βbyΒ βthe βDASF, βorganizationsβ βcan βsafeguardβ βtheirβ βAIΒ βassets βagainstβ βemerging βthreatsβ βand βvulnerabilities.
Unpacking βinΒ βmoreβ βdetail
Databricks AIΒ Security Framework (DASF)
Π€ΡΠ΅ΠΉΠΌΠ²ΠΎΡΠΊ βDatabricksβ βAIΒ βSecurity β(DASF) βΠ΄Π°ΡΠΈΡ βΠ½Π°ΠΌβ βΠ³ΡΠ°Π½Π΄ΠΈΠΎΠ·Π½ΡΡ βΠΈΠ»Π»ΡΠ·ΠΈΡβ βΠΊΠΎΠ½ΡΡΠΎΠ»Ρβ βΠ½Π°Π΄ βΡΠΈΡΡΠ΅ΠΌΠ°ΠΌΠΈ βΠΈΡΠΊΡΡΡΡΠ²Π΅Π½Π½ΠΎΠ³ΠΎβ βΠΈΠ½ΡΠ΅Π»Π»Π΅ΠΊΡΠ° βΠ½Π°βΒ βΠ΄ΠΈΠΊΠΎΠΌ βΠ·Π°ΠΏΠ°Π΄Π΅. βΠΡΠΎ βΠ½Π°ΡΡΠΎΡΡΠΈΠΉβ βΠΊΠΎΠ½ΡΡΠΎΠ»ΡΠ½ΡΠΉβ βΡΠΏΠΈΡΠΎΠΊ βΠΈΠ·βΒ β53 βΡΠ³ΡΠΎΠ·β βΠ±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ, βΠΊΠΎΡΠΎΡΡΠ΅ βΠ²ΠΏΠΎΠ»Π½Π΅ βΠΌΠΎΠ³ΡΡ βΠ²ΠΎΠ·Π½ΠΈΠΊΠ½ΡΡΡ,β βΠ½ΠΎβΒ βΡΠΎΠ»ΡΠΊΠΎ βΠ²βΒ βΡΠΎΠΌ βΡΠ»ΡΡΠ°Π΅,β βΠ΅ΡΠ»ΠΈ βΠ²Π°ΠΌ βΠ½Π΅Β βΠΏΠΎΠ²Π΅Π·ΡΡ βΠΎΡΠ΅Π½Ρβ βΡΠΈΠ»ΡΠ½ΠΎ.
ΠΠ°Π²Π°ΠΉΡΠ΅β βΡΠ³Π»ΡΠ±ΠΈΠΌΡΡβ βΠ²Β βΠΈΠ½ΡΠ΅ΡΠ΅ΡΠ½ΡΠ΅β βΠ°ΡΠΏΠ΅ΠΊΡΡ, βΠΊΠΎΡΠΎΡΡΠ΅β βΠ±ΡΠ΄ΡΡ βΡΠ°ΡΡΠΌΠΎΡΡΠ΅Π½Ρβ βΠ²βΒ βΡΡΠΎΠΌ βΠ°Π½Π°Π»ΠΈΠ·Π΅:
πΠΡΡΠ²Π»Π΅Π½ΠΈΠ΅β βΡΠ³ΡΠΎΠ· βΠ±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ: ΠΠ΄Π΅ΡΡ βΠΌΡΒ βΡΠ΄Π΅Π»Π°Π΅ΠΌ βΠ²ΠΈΠ΄,β βΡΡΠΎ βΡΠΎΠΊΠΈΡΠΎΠ²Π°Π½Ρβ βΠΎΠ±Π½Π°ΡΡΠΆΠ΅Π½ΠΈΠ΅ΠΌβ βΡΡΠ·Π²ΠΈΠΌΠΎΡΡΠ΅ΠΉ βΠ²Β βΡΠΈΡΡΠ΅ΠΌΠ°Ρ β βΠΈΡΠΊΡΡΡΡΠ²Π΅Π½Π½ΠΎΠ³ΠΎ βΠΈΠ½ΡΠ΅Π»Π»Π΅ΠΊΡΠ°.β βΠΡΒ βΠΆΠ΅ βΠ½ΠΈΠΊΠΎΠ³Π΄Π° βΠ½Π΅βΒ βΠ΄ΡΠΌΠ°Π»ΠΈ,β βΡΡΠΎ βΡΡΠΈβ βΡΠΈΡΡΠ΅ΠΌΡ βΠΏΡΠ»Π΅Π½Π΅ΠΏΡΠΎΠ±ΠΈΠ²Π°Π΅ΠΌΡΠ΅,β βΠ²Π΅ΡΠ½ΠΎ?
π ΠΠ΅ΡΡ βΠΊΠΎΠ½ΡΡΠΎΠ»Ρ: βΠΠ΄Π΅ΡΡ βΠΌΡΒ βΠ½Π°ΡΠΈΠ½Π°Π΅ΠΌβ βΠΈΠ³ΡΠ°ΡΡβ βΠ²Β βΠ³Π΅ΡΠΎΡ,β βΡΠ΅Π°Π»ΠΈΠ·ΡΡ βΡΠ΅βΒ βΠ²ΠΎΠ»ΡΠ΅Π±Π½ΡΠ΅ βΡΠ°Π³ΠΈ, βΠΊΠΎΡΠΎΡΡΠ΅ βΠΎΠ±Π΅ΡΠ°ΡΡ βΠ΄Π΅ΡΠΆΠ°ΡΡβ βΠΠ-Π±ΡΠ³ΠΈΠΌΠ΅Π½Π°β βΠ²βΒ βΡΡΡΠ°Ρ Π΅.
π ΠΠΎΠ΄Π΅Π»ΠΈ βΡΠ°Π·Π²ΡΡΡΡΠ²Π°Π½ΠΈΡ:β βΠΡΒ βΡΠ°ΡΡΠΌΠΎΡΡΠΈΠΌβ βΡΠ°Π·Π»ΠΈΡΠ½ΡΠ΅ βΡΠΏΠΎΡΠΎΠ±Ρ,β βΡβΒ βΠΏΠΎΠΌΠΎΡΡΡ βΠΊΠΎΡΠΎΡΡΡ β βΠΠΒ βΠΌΠΎΠΆΠ΅Ρ βΡΠ°ΡΠΏΡΠΎΡΡΡΠ°Π½ΠΈΡΡΡΡ βΠΏΠΎΒ βΠΌΠΈΡΡ,β βΠΏΡΠΎΡΡΠΎ βΡΡΠΎΠ±Ρβ βΠ½Π΅βΒ βΡΡΠ»ΠΎΠΆΠ½ΠΈΡΡ βΡΠΈΡΡΠ°ΡΠΈΡ, βΠ½Π΅βΒ βΠ·ΡΡΒ βΠΆβ βΠ°Π²ΡΠΎΡΡ βΠ΄Π΅Π»Π°Π»ΠΈ βΡΡΠΎΡ βΡΡΠ΅ΠΉΠΌΠ²ΠΎΡΠΊ.
πΠΠ½ΡΠ΅Π³ΡΠ°ΡΠΈΡβ βΡβΒ βΡΡΡΠ΅ΡΡΠ²ΡΡΡΠΈΠΌΠΈ βΠΏΠ»Π°ΡΡΠΎΡΠΌΠ°ΠΌΠΈβ βΠ±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ: βΠΠΎΡΠΊΠΎΠ»ΡΠΊΡβ βΠΈΠ·ΠΎΠ±ΡΠ΅ΡΠ°ΡΡ βΠ²Π΅Π»ΠΎΡΠΈΠΏΠ΅Π΄ βΡΡΠ°Π»ΠΎ βΠΌΠΎΠ΄Π½ΡΠΌ βΡΠΎΠ»ΡΠΊΠΎβ βΠ²βΒ βΠΏΡΠΎΡΠ»ΠΎΠΌ βΡΡΡΡΡΠ΅Π»Π΅ΡΠΈΠΈ,β βΠΌΡΒ βΠΏΠΎΡΠΌΠΎΡΡΠΈΠΌ,β βΠΊΠ°ΠΊ βDASF βΠ±ΡΠ΄Π΅Ρ βΡΠΎΡΠ΅ΡΠ°ΡΡΡΡ βΡβΒ βΠ΄ΡΡΠ³ΠΈΠΌΠΈβ βΠΏΠ»Π°ΡΡΠΎΡΠΌΠ°ΠΌΠΈ.
πΠΡΠ°ΠΊΡΠΈΡΠ΅ΡΠΊΠ°Ρβ βΡΠ΅Π°Π»ΠΈΠ·Π°ΡΠΈΡ: βΠΠΌΠ΅Π½Π½ΠΎβ βΠ·Π΄Π΅ΡΡ βΠΌΡβΒ βΠ·Π°ΡΡΡΠΈΠ²Π°Π΅ΠΌ βΡΡΠΊΠ°Π²Π°β βΠΈβΒ βΠΏΡΠΈΡΡΡΠΏΠ°Π΅ΠΌ βΠΊβΒ βΡΠ°Π±ΠΎΡΠ΅, βΠΏΡΠΈΠΌΠ΅Π½ΡΡ βΠΏΠ»Π°ΡΡΠΎΡΠΌΡ βΡΒ βΡΠ°ΠΊΠΈΠΌβΒ βΠΆΠ΅ βΡΠ½ΡΡΠ·ΠΈΠ°Π·ΠΌΠΎΠΌ,β βΡβΒ βΠΊΠ°ΠΊΠΈΠΌ βΡΠ΅Π±ΡΠ½ΠΎΠΊ βΠ²ΡΠΏΠΎΠ»Π½ΡΠ΅Ρβ βΠ΄ΠΎΠΌΠ°ΡΠ½ΡΡ βΡΠ°Π±ΠΎΡΡ.
-----
ΠβΒ βΡΡΠΎΠΌ βΠ΄ΠΎΠΊΡΠΌΠ΅Π½ΡΠ΅ βΠΏΡΠ΅Π΄ΡΡΠ°Π²Π»Π΅Π½ βΠ°Π½Π°Π»ΠΈΠ·β βDASF,β βΠΈΠ·ΡΡΠ°Π΅ΡΡΡ βΠ΅Π³ΠΎβ βΡΡΡΡΠΊΡΡΡΠ°, βΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΠΈΠΈβ βΠΈΒ βΠΏΡΠ°ΠΊΡΠΈΡΠ΅ΡΠΊΠΈΠ΅ βΠΏΡΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΡ, βΠΊΠΎΡΠΎΡΡΠ΅ βΠΎΠ½βΒ βΠΏΡΠ΅Π΄Π»Π°Π³Π°Π΅Ρβ βΠΎΡΠ³Π°Π½ΠΈΠ·Π°ΡΠΈΡΠΌ, βΠ²Π½Π΅Π΄ΡΡΡΡΠΈΠΌβ βΡΠ΅ΡΠ΅Π½ΠΈΡ βΠ²βΒ βΠΎΠ±Π»Π°ΡΡΠΈ βΠΈΡΠΊΡΡΡΡΠ²Π΅Π½Π½ΠΎΠ³ΠΎ βΠΈΠ½ΡΠ΅Π»Π»Π΅ΠΊΡΠ°. βΠΡΠΎΡ βΠ°Π½Π°Π»ΠΈΠ·β βΠ½Π΅βΒ βΡΠΎΠ»ΡΠΊΠΎβ βΡΠ»ΡΠΆΠΈΡ βΠΊΠ°ΡΠ΅ΡΡΠ²Π΅Π½Π½ΠΎΠΉβ βΡΠΊΡΠΏΠ΅ΡΡΠΈΠ·ΠΎΠΉ, βΠ½ΠΎβΒ βΡΠ°ΠΊΠΆΠ΅ βΠΏΠΎΠ΄ΡΡΡΠΊΠΈΠ²Π°Π΅Ρβ βΠ΅Π³ΠΎβ βΠ²Π°ΠΆΠ½ΠΎΡΡΡ βΠΈβΒ βΠΏΡΠ°ΠΊΡΠΈΡΠ΅ΡΠΊΡΡ βΠΏΠΎΠ»ΡΠ·Ρ βΠ΄Π»Ρ βΡΠΊΡΠΏΠ΅ΡΡΠΎΠ² βΠΏΠΎβΒ βΠ±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ βΠΈβΒ βΠΏΡΠΎΡΠ΅ΡΡΠΈΠΎΠ½Π°Π»ΠΎΠ²β βΠΈΠ·Β βΡΠ°Π·Π»ΠΈΡΠ½ΡΡ βΡΠ΅ΠΊΡΠΎΡΠΎΠ².β βΠΠ½Π΅Π΄ΡΡΡ βΡΡΠΊΠΎΠ²ΠΎΠ΄ΡΡΠΈΠ΅β βΠΏΡΠΈΠ½ΡΠΈΠΏΡ βΠΈΒ βΡΡΠ΅Π΄ΡΡΠ²Π° βΠΊΠΎΠ½ΡΡΠΎΠ»Ρ,β βΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄ΠΎΠ²Π°Π½Π½ΡΠ΅β βDASF, βΠΎΡΠ³Π°Π½ΠΈΠ·Π°ΡΠΈΠΈβ βΠΌΠΎΠ³ΡΡ βΠ·Π°ΡΠΈΡΠΈΡΡβ βΡΠ²ΠΎΠΈ βΠ°ΠΊΡΠΈΠ²Ρ βΠΈΡΠΊΡΡΡΡΠ²Π΅Π½Π½ΠΎΠ³ΠΎ βΠΈΠ½ΡΠ΅Π»Π»Π΅ΠΊΡΠ° βΠΎΡβΒ βΠ²ΠΎΠ·Π½ΠΈΠΊΠ°ΡΡΠΈΡ β βΡΠ³ΡΠΎΠ· βΠΈβΒ βΡΡΠ·Π²ΠΈΠΌΠΎΡΡΠ΅ΠΉ.
ΠΠΎΠ΄ΡΠΎΠ±Π½ΡΠΉ βΡΠ°Π·Π±ΠΎΡ