TU BRAUNSCHWEIG

IT security information of the Gauß-IT-Zentrum

IT security is not only a technical process, a certain software – security stands and falls also with the attention and mindfulness of the users.

IT security is not a one-time setup, it is an ongoing process. Therefore every user has to ask himself/herself again and again:

    1. What consequences would it have if the data from this device were to be transferred to third parties and what measures can I take to prevent this?
    2. What consequences would it have if important data on this device were changed, whether by evil intention or also by technical errors and what can I do about it?
    3. What would happen if this device were to fail suddenly and how can I prevent this or reduce the consequences?

in depth IT security tips

A large number of IT security tips for many areas are provided by the GITZ on Doku-Wiki, IT Security Area . Please inform yourself!

Mousepads

The GITZ has distributed informational mouse pads in their PC pools. For those who followed the QR code on our mousepads: here are the remarks to be found.

The mouse pads can also be used for own actions at the TU, interested DV coordinators please contact the IT-Service-Desk.

Awareness posters

If you have seen one of our awareness posters somewhere: the posters are largely self-explanatory, but of course we offer further short explanations here: contents awareness posters.

The awareness posters can also be used for own actions at the TU, interested DV coordinators please contact the IT-Service-Desk.

lectures on topics related to IT security

The announcements for the ECSM 2017 presentations can be found here: lectures at ECSM 2017

The GITZ provides presentations on topics related to IT security for downloading here

The lectures are taken from the lecture series of GITZ about European Cyber Security Month 2016 (Artikel im TU Magazin 2016) and European Cyber Security Month 2017 (Artikel im TU Magazin 2017).

  1. Lecture event 
    on the topic „<IT-Sicherheitstipps für AnwenderInnen (2016, 2017 split to two days)“,

    carried out by several GITZ employees:
    I.   Die 10 Goldenen Regeln zur IT-Sicherheit 
        
    (Markus Dietrich)
          Video download (2016)
        Video download (2017)

    II.  The most common 4×4 IT security errors
           (Dr. Christian Böttger)
         Video download (2016)
        Video download (2017)

    III. (un)secure passwords and how to make it better    
          (with interactive part) (Sebastian Homann)
        Video download ( Sebastian Homann, 2016), (Video download (Dr. Christian Böttger, 2017, together with "Anti-Phishing") (german)

    IV.  Network Security using WLAN as an Example 
          (with presentation) (Florian Haake & Jan Pilawa)
        Video download (2016), (Video 2017)
  2. Presentation on the topic
    "<IT Forensics for Home Use"
    from Dipl.-Inform. Klaus Möller (Senior Consultant), DFN-CERT Services GmbH, Hamburg
    Download PDF only at university (Login nötig)
      Video download (HD, 3.81 GB, only in TU network), Video download (FullHD, 7.40 GB, only in TU network)
  3. Lecture on
    "<Anti-Phishing"
    by Yasin Piri, Christian Kühn (Trainees at GITZ)
    PDF-Download
    Video download (2017, together with "insecure passwords")
  4. Lecture on the topic Attack Detection in Industrial Plants     , Christian Wresnegger, Institute for System Security
    Video download ( Christian Wresnegger, 2017)

European Cyber Security Month 2017

In 2017, the Gauß-IT-Zentrum again participated in the European Cyber Security Month (ECSM).

<

We offered you:

In addition, Awareness posters will be posted on campus again. Read the details here: ECSM2017@GITZ.

<

Read our flyer here: Flyer (PDF).

Notes for low data configuration of Windows 10

With the introduction of Windows 10, Microsoft has introduced a variety of services that at first glance offer a simplification of use. However, these services are based on data that is transferred from the PCs to the Microsoft servers in the background. In the standard settings, the transferred data may be recorded in the background without the user's knowledge. With regard to the principles "privacy by design" and "privacy by default" required in the EU general data protection regulation (EU-GDPR) (which becomes effective on 25 May 2018), it is advisable to adjust the settings of Windows 10.

We offer you some hints for this on our information pages: Notes for low data configuration of Windows 10

Please note: We only recommend settings, you are yourself responsible for the protection of your confidential data and the security of your system. You will also be informed of any negative effects of the settings. Furthermore, we cannot guarantee that a system configured in this way complies with data protection laws - you are also responsible for this yourself.
The recommendations are not intended to be implemented 1:1 for each system - they must be adapted for the respective application!

And what do others do?

This pages has been translated with the help of DeepL https://www.deepl.com/translator


  last changed 30.07.2019
TU_Icon_E_Mail_1_17x17_RGB pagetop