Direkt zum Hauptinhalt
Erweiterte Suche
Suchbegriffe
Inhaltstyp

Exakte Treffer
Schlagwort-Suchen
Datumsoptionen
Aktualisiert nach
Aktualisiert vor
Erstellt nach
Erstellt vor

Suchergebnisse

1069 Ergebnisse gesamt

Passwords

IT-Sicherheit (ESC-IT) Countermeasures

[!toc] Table of Contents Good passwords are one of the most important countermeasures against data leakage. We will discuss what constitutes a good password below. passwords secure encrypted data, such as: hard drives and password databases passwords secu...

Recommendations

IT-Sicherheit (ESC-IT)

Password-Manager

IT-Sicherheit (ESC-IT) Recommendations

[!toc] Table of Contents [!info] Info {static} A password manager is an essential tool for ensuring that you take the necessary precautions to keep your passwords secure. Here you can find out what makes a good password and how you should handle them: Co...

Messenger

IT-Sicherheit (ESC-IT) Recommendations

[!toc] Table of Contents While emails are still regularly used for digital communication, messengers have become more popular in recent years. One advantage of (good) messengers over emails is that encryption and secure communication are part of their init...

Clear-Metadata

IT-Sicherheit (ESC-IT) Recommendations

[!toc] Table of Contents [!tip] Tip {static} If you don't know exactly what metadata is, read the article about this threat. The following is mostly taken from the entry on metadata in the Systemli Wiki. Exifcleaner Platform: Linux, Mac, Windows Exifcl...

Graphene-Os

IT-Sicherheit (ESC-IT) Recommendations

[!toc] Table of Contents GrapheneOS is a mobile operating system based on Android. It is often recommended as an alternative to pre-installed (OEM) operating systems, as it can be used entirely without Google services. In addition to this feature, which pr...

Modules

IT-Sicherheit (ESC-IT)

Network-Role-Play

IT-Sicherheit (ESC-IT) Modules

[!toc] Table of Contents This game aims to illustrate the process, but not the functionality, of network communication using the example of emails without encryption, with transport encryption, and with end-to-end encryption. It is not really a game that i...

Confiscation

IT-Sicherheit (ESC-IT) Modules

[!toc] Table of Contents After seizures, there is often a lot of speculation about what information could potentially be found on the devices. In these moments, we remember all the little “security sins” we have committed over the years: photos, chats, con...

Keepass-As-Group

IT-Sicherheit (ESC-IT) Modules

[!toc] Table of Contents KeePassXC is not actually cloud software, which is one of the reasons it is so popular - none of your passwords ever leave your own computer. However, this makes it impractical for managing different logins as a group. Every time a...

Threats

IT-Sicherheit (ESC-IT)

Public-Chargers

IT-Sicherheit (ESC-IT) Threats

[!toc] Table of Contents Public “chargers” can be found, for example, in public transportation, cafés, libraries, airports, shopping malls, etc. Of course, a distinction must be made here between simple power outlets and USB charging ports. The worst thing...

Forensics

IT-Sicherheit (ESC-IT) Threats

[!toc] Table of Contents Introduction Forensics is a collective term for fields of work in which “criminal acts” are systematically investigated. In short: when cops try to find evidence. Relevant subfields Many forensic measures pose relevant threats to a...

Phishing

IT-Sicherheit (ESC-IT) Threats

[!toc] Table of Contents Phishing via email or text message is generally more commonly associated with scams, but government actors also often use phishing to infect targets with malware. [!warning] {static} In fact, phishing is one of the most common re...

Silent-Sms

IT-Sicherheit (ESC-IT) Threats

[!toc] Table of Contents SMS is the protocol by which standard text messages are delivered to your cell phone; a “silent” SMS message would deliver a "message" to the phone without you being aware of it 1. In other words, you wouldn't see a text message or...

Shoulder-Surfing

IT-Sicherheit (ESC-IT) Threats

[!toc] Table of Contents Shoulder surfing is when someone secretly looks over your shoulder to see what you are doing or typing on your cell phone, laptop, notepad etc. [!warning] Warning {static} Be especially careful when entering passwords! After all,...

Meta-Data

IT-Sicherheit (ESC-IT) Threats

[!toc] Table of Contents Here we describe what metadata is and where it can be found. If you just want to know how to clean metadata from files, check out our recommendations. The data behind the data Metadata in communication Imagine you are writing a mes...

Data-Dogs

IT-Sicherheit (ESC-IT) Threats

[!toc] Table of Contents [!info] TL;DR {static} Data dogs, similar to drug detection dogs, are specially trained to sniff out certain metals that are used in electronics and thus in storage media such as USB sticks. The following is an automated transla...