Schlagwort: ‘Cybersicherheit’
Ethical Hacking: Hacking for More Security
![A woman focused on computer code, engaged in hacking activities.](https://blog.rwth-aachen.de/itc/files/2024/07/Ethical-Hacking-1-300x200.png)
Source: Freepik
Imagine you let someone deliberately try to break into your house to test your security system. Sounds strange, doesn’t it? But that’s exactly what ethical hackers do in the digital space. They try to break into systems – with permission, of course – to uncover security vulnerabilities before they can be exploited by criminals. In this article, you will learn everything you need to know about ethical hacking, the important role it plays in IT security and how it is used in practice.
World Backup Day: Security Through Data Backup
![Person holding laptop with cloud icons in background](https://blog.rwth-aachen.de/itc/files/2024/02/Bild1-300x200.png)
Source: Freepik
March 31st is World Backup Day – a day to remind us how important it is to protect our digital data. In an increasingly connected world where our personal and business data is stored digitally, backing up this data is crucial to protect it from loss or cyber threats.
Spoofing: An Underestimated Threat
![Businessman with megaphone that says "Lie"](https://blog.rwth-aachen.de/itc/files/2024/03/Bild1-1-300x200.png)
Source: Freepik
In the world of IT security, there are a variety of threats that can affect companies and individuals alike. One of these threats that is often underestimated is spoofing. Spoofing is a technique where the attacker attempts to disguise their true identity in order to gain access to sensitive information. In doing so, they attempt to cause damage or pretend to be a trustworthy source. In this blog post, we will take a closer look at the technique of spoofing, show the different forms it can take and explain how companies and individuals can protect themselves against spoofing attacks.
Romance Without Risk: IT Security
![Two vectors hugging](https://blog.rwth-aachen.de/itc/files/2024/02/Blog-Layout-300x200.png)
Source: Freepik
Valentine’s Day, a time of love and affection, brings with it not only romantic gestures but also potential online threats. In a world where digital connections are just as important as personal relationships; it is crucial to protect your own data.
In this article, you can find out how to order flowers online, buy Valentine’s Day gifts and use online dating platforms while staying digitally safe. Take care, friends!
Data Protection Day: Our Privacy
![Data Security Icons](https://blog.rwth-aachen.de/itc/files/2024/01/Blog-Layout-300x200.png)
Source: Own illustration
On January 28, we celebrate European Data Protection Day to draw attention to the importance of data protection. This annual event is a reminder of the fundamental right to privacy and highlights efforts to strengthen the protection of personal data.
Cluster security – MFA Now Mandatory
![Lock with security icons around it](https://blog.rwth-aachen.de/itc/files/2024/01/Bild1-300x199.jpg)
Source: Freepik
In May 2020, several supercomputers in Europe were attacked by hackers. They used compromised accounts of users on external systems. To prevent such attacks, the introduction of multi-factor authentication on the HPC cluster is an important step.
New Year’s Resolutions for More IT Security
![Empty list for New Year's resolutions](https://blog.rwth-aachen.de/itc/files/2024/01/stillleben-mit-neujahrsvorsaetzen-1-300x200.jpg)
Source: Freepik
For many, it’s part of the New Year’s ritual: New Year’s resolutions! According to Statista, the top three resolutions in Germany this year include saving more money, doing more sport, and eating more healthily. 17% of respondents even said they wanted to spend less time on social networks. When using social media, however, it is also important to make the user experience itself as secure as possible.
In the following blog post, we introduce you to five resolutions that will help you increase your IT security and support your approach to IT.
Security Mechanisms Unravelled: MFA
![Laptop surrounded by security icons](https://blog.rwth-aachen.de/itc/files/2023/12/Blog-Layout-1-1-300x200.png)
Source: Freepik
Multifactor-authentication (MFA) is a security method that enables access to digital resources such as devices, networks or online services by combining multiple authentication factors. Essentially, MFA requires at least two independent confirmations of a user’s identity to access the resource.
Multifactor Authentication in IdM Selfservice
IT security is a major and important topic at RWTH Aachen University and the IT Center.
![Data protection title with a big blue digital lock on a dark blue background.](https://blog.rwth-aachen.de/itc/files/2023/06/10819-1-300x300.jpg)
Source: Freepik
Already in 2021, it was reported that the introduction of multifactor-authentication (Mfa) would provide systems with greater security against unauthorized access.
In order to offer the MFA protection to further services the IdM Selfservice is now equipped with the so-called “MFA Tokenmanager”.