Schlagwort: ‘IT-Security’
Beware of Tech Support Scams: How You Can Protect Yourself

Source: Freepik
In today’s digital world, we are constantly connected to technology – whether it’s through our smartphones, computers or other electronic devices. Unfortunately, there are people who take advantage of this fact to scam the unsuspecting. One common scam that many fall victim to is the tech support scam. In this blog post, we want to explain how the scam works and how you can protect to protect yourself.
Firewalls – The OSI Model

Source: Freepik
Welcome to the third and final part of our blog series on firewalls! In the first post we looked at the role of firewalls, and in the second we looked at the types of firewalls. In this post, we take a look at the OSI model (Open Systems Interconnection Model) and the different levels at which firewalls can operate.
Halloween: The Nightmares of Cyber Security

Source: Freepik
Fear. A feeling that probably all of us are familiar with. Especially around Halloween, the potential for scares increases. Be it the fear of disguised, made-up figures or even the worry that your sensitive data will fall into the hands of unauthorized persons. Perhaps it’s no coincidence that October of all months is IT Security Month? In this article, we take a look at a few “IT horror stories”, how you can protect yourself from them and share some interesting figures.
Basics at RWTH: E-Mail

Source: Freepik
As part of our blog series “Basics at RWTH”, today we are introducing you to the RWTH e-mail service, which is essential for your daily communication in everyday university life. We have compiled the most important information for you so that you can get started quickly and easily with your e-mail inbox – if you haven’t already done so.
Types of Firewalls

Source: Freepik
In the first part of our blog series, we covered the basics of firewalls: what they are, how they work, and why they are essential for network security. Today, we will take a closer look at the different types of firewalls used in IT-Security.
The Role of Firewalls in Network Security

Source: Freepik
In a world that is increasingly characterised by digital connectivity, network security is becoming an essential issue. A fundamental but often misunderstood component of network security is the firewall. Most of you have probably heard the term before. In this blog post, we’ll take a closer look at the role of firewalls, their importance in network security and how they help to prevent threats. Read the rest of this entry »
Increased Cyber Security at RWTH Through MFA Introduction

Source: Freepik
Universities are increasingly becoming the target of cyber attacks. According to the Federal Office for Information Security (BSI), the current threat level is higher than ever before [1]. In view of this growing threat and the increasing number of corresponding attacks, the Ministry of Culture and Science (MKW) of the state of North Rhine-Westphalia (NRW) published an Agreement on Cyber Security at Universities (VzC) at the end of 2023. With a total of 12 measures, this serves as a basis for securing university networks. At the same time, the BSI regularly recommends targeted measures to defend against threats.
Against this backdrop, the specific protection of RWTH Aachen University’s IT infrastructure is increasingly indispensable.
Ethical Hacking: Hacking for More Security

Source: Freepik
Imagine you let someone deliberately try to break into your house to test your security system. Sounds strange, doesn’t it? But that’s exactly what ethical hackers do in the digital space. They try to break into systems – with permission, of course – to uncover security vulnerabilities before they can be exploited by criminals. In this article, you will learn everything you need to know about ethical hacking, the important role it plays in IT security and how it is used in practice.
Help, My Email Password Was Compromised!

Source: Freepik
In the digital world, email accounts are a central part of our lives. If your email password has been compromised, it can have serious consequences: A hacked email account gives cybercriminals the opportunity to send phishing emails with fraudulent links to your family members, friends and addressees in your name.
In this article, you will learn how you can better protect your accounts and devices to prevent them from being compromised.



