Information Security @TU Braunschweig

Introduction - Basics

Information security is not a matter of a one-time set-up or a single piece of software or hardware - but rather it is an ongoing process.


Therefore every user has to ask himself again and again:

  • What would be the consequences if the data from this device were to fall into the hands of others, and what measures can I take to prevent this? (Confidentiality)
  • What would be the consequences if important data on this device were to be altered, whether by malice aforethought or by technical errors, and what can I do about it? (Data Integrity)
  • What would happen if this device suddenly failed and how can I prevent or mitigate the consequences? (Availability)

see also:

IT Security Information from the Gauss IT Centre / Gauß-IT-Zentrum (GITZ)