Categories
Pages
-

IT Center Blog

Schlagwort: ‘Cybersicherheit’

Security Mechanisms Unravelled: MFA

January 3rd, 2024 | by
Laptop surrounded by security icons

Source: Freepik

Multifactor-authentication (MFA) is a security method that enables access to digital resources such as devices, networks or online services by combining multiple authentication factors. Essentially, MFA requires at least two independent confirmations of a user’s identity to access the resource.

Read the rest of this entry »

Social Engineering: Deception in Cyberspace

December 27th, 2023 | by
Abstract Concept Illustration of Cyber Security

Source: Freepik

In the world of cyber security, it’s not just technology that plays a crucial role. People are an equally important factor, and this is where social engineering comes in. This sophisticated method specifically exploits human behaviour and weaknesses to gain access to sensitive data or cause damage.

 

Read the rest of this entry »

Multifactor Authentication in IdM Selfservice

May 31st, 2023 | by

IT security is a major and important topic at RWTH Aachen University and the IT Center.

Data protection title with a big blue digital lock on a dark blue background.

Source: Freepik

Already in 2021, it was reported that the introduction of multifactor-authentication (Mfa) would provide systems with greater security against unauthorized access.

In order to offer the MFA protection to further services the IdM Selfservice is now equipped with the so-called “MFA Tokenmanager”.

Read the rest of this entry »

Artificial Intelligence – Curse or Blessing for IT Security?

August 29th, 2022 | by
Concept of digital transformation of the brain of AI technology

Source: Freepik

We are increasingly coming across the term “artificial intelligence” (AI). Whenever we come across this term that has become a fashionable phenomenon in the media, there are regularly reports about self-thinking AI, fully autonomous means of transport or other similar applications. For many of us, it can be hard to figure out what is actually meant by the term. However, the application areas of AI that seem to be particularly popular in the media are in reality only a very small segment of the actual application field of AI. Many a user would probably even be surprised to know in which areas AI is already being implemented today. In this article, we would like to take a closer look at the term and explain what role artificial intelligence can play in the field of IT security.

Read the rest of this entry »