Categories
Pages
-

IT Center Blog

Kategorie: ‘IT-Security’

The Role of Firewalls in Network Security

August 21st, 2024 | by
chart network security

Source: Freepik

In a world that is increasingly characterised by digital connectivity, network security is becoming an essential issue. A fundamental but often misunderstood component of network security is the firewall. Most of you have probably heard the term before. In this blog post, we’ll take a closer look at the role of firewalls, their importance in network security and how they help to prevent threats. Read the rest of this entry »

Data Privacy on the Internet: Protect Your Privacy

August 12th, 2024 | by
Vector standing on Laptop with lock icon

Source: Freepik

In our digital age, digital data has become the most valuable asset. Every click, every search query, every ‘Like’ are collected and analysed. For many companies, this data is of inestimable value, for example in order to better understand target groups, place personalised advertising, etc. However, while companies can use this data to boost their business, criminals also have a keen interest in such data, as any of this information can potentially be used to cause harm. From identity theft to financial losses – the risks are numerous. Protecting your own data is therefore more important than ever before. In this blog post, we would like to give you a few suggestions on how you can protect your privacy on the internet.

Read the rest of this entry »

Basics at RWTH: IdM Selfservice

July 31st, 2024 | by
Laptop with ID card, lock and security symbol image

Source: Freepik

The IdM Selfservice is the first port of call when it comes to accounts and passwords. The token manager, which you need to set up multi-factor authentication, is also integrated there. This makes Selfservice the heart of your data management. And because it is so important, we would like to introduce you to Selfservice and its navigation points.

 

Read the rest of this entry »

Increased Cyber Security at RWTH Through MFA Introduction

July 29th, 2024 | by
Security concept illustration of people holding a chain

Source: Freepik

Universities are increasingly becoming the target of cyber attacks. According to the Federal Office for Information Security (BSI), the current threat level is higher than ever before [1]. In view of this growing threat and the increasing number of corresponding attacks, the Ministry of Culture and Science (MKW) of the state of North Rhine-Westphalia (NRW) published an Agreement on Cyber Security at Universities (VzC) at the end of 2023. With a total of 12 measures, this serves as a basis for securing university networks. At the same time, the BSI regularly recommends targeted measures to defend against threats.

Against this backdrop, the specific protection of RWTH Aachen University’s IT infrastructure is increasingly indispensable.

 

Read the rest of this entry »

Ethical Hacking: Hacking for More Security

July 19th, 2024 | by
A woman focused on computer code, engaged in hacking activities.

Source: Freepik

Imagine you let someone deliberately try to break into your house to test your security system. Sounds strange, doesn’t it? But that’s exactly what ethical hackers do in the digital space. They try to break into systems – with permission, of course – to uncover security vulnerabilities before they can be exploited by criminals. In this article, you will learn everything you need to know about ethical hacking, the important role it plays in IT security and how it is used in practice.

 

Read the rest of this entry »

Help, My Email Password Was Compromised!

July 17th, 2024 | by
Laptop with spam pop-ups

Source: Freepik

In the digital world, email accounts are a central part of our lives. If your email password has been compromised, it can have serious consequences: A hacked email account gives cybercriminals the opportunity to send phishing emails with fraudulent links to your family members, friends and addressees in your name.

In this article, you will learn how you can better protect your accounts and devices to prevent them from being compromised.

Read the rest of this entry »

Archer: Error Detection for HPC

July 12th, 2024 | by

The world of high-performance computing is developing rapidly and computing capacities are reaching new heights. In this context, tools for error detection and correction are essential to ensure the reliability of applications. One such tool is Archer, which was specially developed to detect data races in OpenMP programmes.

 

Read the rest of this entry »

Exam Scan – Digital Inspection

July 8th, 2024 | by
Moodle Monday

Source: Own Illustration

Digital inspections offer a number of advantages: They save resources by reducing the use of staff, students can participate remotely and receive a copy of the exam without additional effort, which they are allowed to request in accordance with the Higher Education Act in NRW.

In order to be able to use these advantages for paper pencil exams, the IT Center, CLS and the Chair of Controlling at RWTH Aachen University have developed Exam Scan, a Moodle plugin that prepares such exams for digital viewing.

Read the rest of this entry »

ZKI – From Project to Working Group

July 5th, 2024 | by
Surreal photo: Finger click on cloud in the sky

Source: Pixabay

As a partner, the IT Center actively supports the design of digitalisation processes at RWTH Aachen University. This also includes the use of cloud services and the correspondingly increasing needs of teaching staff, researchers and students at RWTH Aachen University. The flexibility and scalability of cloud services can be a means of meeting the ever more rapidly changing IT requirements of users.

 

Read the rest of this entry »

Information for Employees – Security of Webex

June 24th, 2024 | by
Green lock on a black circuit board

Source: Freepik

The communication and collaboration tool Webex has been in use at RWTH Aachen University since November 2023. This is currently being criticized due to security incidents (German only).

As IT security is a very high priority for RWTH, the issue is being taken very seriously by both the IT Center as a whole and the relevant specialist department.

Following discussions with the manufacturer Cisco and our own intensive investigation, we were able to establish that RWTH and its Webex users are not affected by the security incidents.

The necessary security precautions had already been implemented at RWTH before Webex was introduced.

Read the rest of this entry »