Schlagwort: ‘Cyber Security’
Ethical Hacking: Hacking for More Security
![A woman focused on computer code, engaged in hacking activities.](https://blog.rwth-aachen.de/itc/files/2024/07/Ethical-Hacking-1-300x200.png)
Source: Freepik
Imagine you let someone deliberately try to break into your house to test your security system. Sounds strange, doesn’t it? But that’s exactly what ethical hackers do in the digital space. They try to break into systems – with permission, of course – to uncover security vulnerabilities before they can be exploited by criminals. In this article, you will learn everything you need to know about ethical hacking, the important role it plays in IT security and how it is used in practice.
Security Mechanisms Unravelled: MFA
![Laptop surrounded by security icons](https://blog.rwth-aachen.de/itc/files/2023/12/Blog-Layout-1-1-300x200.png)
Source: Freepik
Multifactor-authentication (MFA) is a security method that enables access to digital resources such as devices, networks or online services by combining multiple authentication factors. Essentially, MFA requires at least two independent confirmations of a user’s identity to access the resource.
Cybersecurity 101: Protecting the Digital Footprint in the Digital Age
![Three footprints with blue digital background](https://blog.rwth-aachen.de/itc/files/2023/06/Bild1-2-300x169.png)
Source: Own Illustration
In today’s digital age, our lives are increasingly intertwined with the online world. From social media profiles to online banking accounts, we leave a digital footprint that can be vulnerable to cyber threats. Protecting our digital presence and maintaining online privacy is more important now than ever. In this blog post, we’ll go over the basics of cybersecurity and provide practical tips for protecting your digital footprint.
Threat Hunting – Tracking Down Threats
![Illustration of a laptop with a magnifying glass. The magnifying glass makes security incidents visible.](https://blog.rwth-aachen.de/itc/files/2022/12/IT-Center-Blog-Threat-Hunting-300x169.png)
Threat Hunters uncover security risks before they are detected by the system.
Source: Own illustration
After sneaking into a network, attackers can remain undetected for months, collecting data, searching for sensitive material, or acquiring credentials. They can then use this information to roam around the IT infrastructure, to observe it and to snatch even more data. The more data is tapped, the more severe the consequences of the attack may be. To identify such attacks as early as possible, a good defence strategy is essential. An important part of such a strategy is so-called Threat Hunting. Read the rest of this entry »
Cyber-Security-Awareness-Training at RWTH – a Review
![Padlock in front of world map](https://blog.rwth-aachen.de/itc/files/2022/08/cyber-security-gf19f89a47_1920-300x180.jpg)
Source: Pixabay
No more simulated phishing emails in your inbox? No more access to the eLearning program for employees of the RWTH? That can only mean one thing: the cyber security awareness training at RWTH Aachen University ended for the time being on May 09, 2022.
Today we look back on the training and share the results with you. Read the rest of this entry »