Categories
Pages
-

IT Center Blog

Kategorie: ‘IT-Security’

Security in E-mail Traffic 2: Encryption

September 4th, 2024 | by
Vector graphic with computer and lock and mail icons

Source: Freepik

It regularly happens that personal data or other sensitive information such as temporary passwords, application documents etc. need to be transmitted quickly. The choice often falls on the exchange by e-mail. However, this data must be protected against unauthorized access by third parties. In order to still be able to use e-mail, the e-mails must be encrypted. We will show you how this works in the following blog post, along with other relevant information on the subject. Go back to the first blog post in our series to read more about digital signatures.

Read the rest of this entry »

Security in E-mail Traffic 1: Digital Signing

August 28th, 2024 | by
Vector graphic with user, certificate, and seal symbol

Source: Freepik

Did you know that in June 2024, more than 80% of all incoming emails at RWTH Aachen University were identified as suspicious by the email security defense systems? [1] You may now be thinking of terms such as phishing emails or spam emails.

At some point, every recipient of an email asks themselves the question: How do I know whether the sender address is trustworthy and genuine? On the other hand, every sender asks themselves at some point: How do I know whether my email has demonstrably reached the recipient unchanged? One answer to this is: Always sign emails digitally! We would like to take a closer look at this process with you in the following blog post.

Read the rest of this entry »

The Role of Firewalls in Network Security

August 21st, 2024 | by
chart network security

Source: Freepik

In a world that is increasingly characterised by digital connectivity, network security is becoming an essential issue. A fundamental but often misunderstood component of network security is the firewall. Most of you have probably heard the term before. In this blog post, we’ll take a closer look at the role of firewalls, their importance in network security and how they help to prevent threats. Read the rest of this entry »

Data Privacy on the Internet: Protect Your Privacy

August 12th, 2024 | by
Vector standing on Laptop with lock icon

Source: Freepik

In our digital age, digital data has become the most valuable asset. Every click, every search query, every ‘Like’ are collected and analysed. For many companies, this data is of inestimable value, for example in order to better understand target groups, place personalised advertising, etc. However, while companies can use this data to boost their business, criminals also have a keen interest in such data, as any of this information can potentially be used to cause harm. From identity theft to financial losses – the risks are numerous. Protecting your own data is therefore more important than ever before. In this blog post, we would like to give you a few suggestions on how you can protect your privacy on the internet.

Read the rest of this entry »

Basics at RWTH: IdM Selfservice

July 31st, 2024 | by
Laptop with ID card, lock and security symbol image

Source: Freepik

The IdM Selfservice is the first port of call when it comes to accounts and passwords. The token manager, which you need to set up multi-factor authentication, is also integrated there. This makes Selfservice the heart of your data management. And because it is so important, we would like to introduce you to Selfservice and its navigation points.

 

Read the rest of this entry »

Increased Cyber Security at RWTH Through MFA Introduction

July 29th, 2024 | by
Security concept illustration of people holding a chain

Source: Freepik

Universities are increasingly becoming the target of cyber attacks. According to the Federal Office for Information Security (BSI), the current threat level is higher than ever before [1]. In view of this growing threat and the increasing number of corresponding attacks, the Ministry of Culture and Science (MKW) of the state of North Rhine-Westphalia (NRW) published an Agreement on Cyber Security at Universities (VzC) at the end of 2023. With a total of 12 measures, this serves as a basis for securing university networks. At the same time, the BSI regularly recommends targeted measures to defend against threats.

Against this backdrop, the specific protection of RWTH Aachen University’s IT infrastructure is increasingly indispensable.

 

Read the rest of this entry »

Ethical Hacking: Hacking for More Security

July 19th, 2024 | by
A woman focused on computer code, engaged in hacking activities.

Source: Freepik

Imagine you let someone deliberately try to break into your house to test your security system. Sounds strange, doesn’t it? But that’s exactly what ethical hackers do in the digital space. They try to break into systems – with permission, of course – to uncover security vulnerabilities before they can be exploited by criminals. In this article, you will learn everything you need to know about ethical hacking, the important role it plays in IT security and how it is used in practice.

 

Read the rest of this entry »

Help, My Email Password Was Compromised!

July 17th, 2024 | by
Laptop with spam pop-ups

Source: Freepik

In the digital world, email accounts are a central part of our lives. If your email password has been compromised, it can have serious consequences: A hacked email account gives cybercriminals the opportunity to send phishing emails with fraudulent links to your family members, friends and addressees in your name.

In this article, you will learn how you can better protect your accounts and devices to prevent them from being compromised.

Read the rest of this entry »

Archer: Error Detection for HPC

July 12th, 2024 | by

The world of high-performance computing is developing rapidly and computing capacities are reaching new heights. In this context, tools for error detection and correction are essential to ensure the reliability of applications. One such tool is Archer, which was specially developed to detect data races in OpenMP programmes.

 

Read the rest of this entry »

Exam Scan – Digital Inspection

July 8th, 2024 | by
Moodle Monday

Source: Own Illustration

Digital inspections offer a number of advantages: They save resources by reducing the use of staff, students can participate remotely and receive a copy of the exam without additional effort, which they are allowed to request in accordance with the Higher Education Act in NRW.

In order to be able to use these advantages for paper pencil exams, the IT Center, CLS and the Chair of Controlling at RWTH Aachen University have developed Exam Scan, a Moodle plugin that prepares such exams for digital viewing.

Read the rest of this entry »