Categories
Pages
-

IT Center Blog

Kategorie: ‘IT-Security’

Firewalls – The OSI Model

November 6th, 2024 | by

Source: Freepik

Welcome to the third and final part of our blog series on firewalls! In the first post we looked at the role of firewalls, and in the second we looked at the types of firewalls. In this post, we take a look at the OSI model (Open Systems Interconnection Model) and the different levels at which firewalls can operate.

Read the rest of this entry »

The Impact of Social Media on It Security

November 4th, 2024 | by
Einfluss von social media auf die IT-Sicherheit

Source: Freepik

Nowadays, almost everyone can be found on one or more social media platforms and runs one or more profiles, some of them for personal and others for professional purposes. Some use them to network, share photos of special events or stay in touch with their friends. Others use them to promote their company, association or organization. Although social networks offer numerous benefits and have become an integral part of our everyday lives, they also pose a number of risks, particularly in terms of IT security. In this post, we would like to highlight the various aspects of the impact of social media on IT security and provide an insight into how these challenges can be overcome.

 

 

Read the rest of this entry »

Halloween: The Nightmares of Cyber Security

October 31st, 2024 | by
Three carved halloween pumpkins

Source: Freepik

Fear. A feeling that probably all of us are familiar with. Especially around Halloween, the potential for scares increases. Be it the fear of disguised, made-up figures or even the worry that your sensitive data will fall into the hands of unauthorized persons. Perhaps it’s no coincidence that October of all months is IT Security Month? In this article, we take a look at a few “IT horror stories”, how you can protect yourself from them and share some interesting figures.

 

Read the rest of this entry »

Email Security – Evaluation and Application of the SPF Policy

October 28th, 2024 | by
Symbolic image of the evaluation and application of the SPF policy

Source: Own illustration

In this post of our email security series, we would like to inform you about an upcoming tightening of the SPF policy that will apply to RWTH Aachen University as of November 28, 2024. The change will prevent RWTH email addresses from being used as sender addresses by mail servers outside of RWTH Aachen University in the future. This will further increase email security at our university. Please note that this article is mainly intended for mail administrators of RWTH institutions.

Read the rest of this entry »

Basics at RWTH: E-Mail

October 18th, 2024 | by
Vectors using email and communication icons with a large letter icon in the background.

Source: Freepik

As part of our blog series “Basics at RWTH”, today we are introducing you to the RWTH e-mail service, which is essential for your daily communication in everyday university life. We have compiled the most important information for you so that you can get started quickly and easily with your e-mail inbox – if you haven’t already done so.

 

Read the rest of this entry »

Types of Firewalls

October 16th, 2024 | by
Firewall

Source: Freepik

In the first part of our blog series, we covered the basics of firewalls: what they are, how they work, and why they are essential for network security. Today, we will take a closer look at the different types of firewalls used in IT-Security.

 

Read the rest of this entry »

IT Professionals Day: Invisible Heroes

September 16th, 2024 | by
Two men with laptops in the office

Source: Freepik

On September 17, 2024, we are celebrating IT Professionals Day – a global day of honor that puts the spotlight on all those people who often work behind the scenes but are indispensable to the functioning of our digital world. At the IT Center of RWTH Aachen University, we would like to use this occasion to pay well-deserved tribute to the IT professionals, the invisible heroes, who work behind the scenes every day.

 

Read the rest of this entry »

Security in E-mail Traffic 3: LDAP Address Book

September 11th, 2024 | by
Isometric hacking password stealing icon with 3d computer key and warning notification vector illustration

Source: Freepik

The LDAP address book (LDAP = Lightweight Directory Access Protocol) is a type of database or directory that an email application queries via a predefined path (server name, port, branch/search base) in order to find out the user certificate of an email address, for example. If such an LDAP address book is integrated into your own email application, encrypted emails can be sent directly, for example, provided the recipients have published their user certificate in the LDAP address book. Not every e-mail has to be sent encrypted, but you can select this option if you wish and after successful setup. Read more about the encryption of emails in part 2 of the blog series.

 

Read the rest of this entry »

Security in E-mail Traffic 2: Encryption

September 4th, 2024 | by
Vector graphic with computer and lock and mail icons

Source: Freepik

It regularly happens that personal data or other sensitive information such as temporary passwords, application documents etc. need to be transmitted quickly. The choice often falls on the exchange by e-mail. However, this data must be protected against unauthorized access by third parties. In order to still be able to use e-mail, the e-mails must be encrypted. We will show you how this works in the following blog post, along with other relevant information on the subject. Go back to the first blog post in our series to read more about digital signatures.

Read the rest of this entry »

Security in E-mail Traffic 1: Digital Signing

August 28th, 2024 | by
Vector graphic with user, certificate, and seal symbol

Source: Freepik

Did you know that in June 2024, more than 80% of all incoming emails at RWTH Aachen University were identified as suspicious by the email security defense systems? [1] You may now be thinking of terms such as phishing emails or spam emails.

At some point, every recipient of an email asks themselves the question: How do I know whether the sender address is trustworthy and genuine? On the other hand, every sender asks themselves at some point: How do I know whether my email has demonstrably reached the recipient unchanged? One answer to this is: Always sign emails digitally! We would like to take a closer look at this process with you in the following blog post.

Read the rest of this entry »