Computers that are connected to other computers via a network can be attacked via this network. Such attacks can either be automated with as many targets as possible, or they can be specific to one device. If an attack is successful, data can be read, copied, manipulated or deleted and the computer can act as a vehicle for further attacks.
For this reason, IT Services take a variety of measures to protect the computers on the University's network. However, this cannot be done without your help. In addition to the central protective measures, local protective measures and responsible, security-conscious handling of computers are also required. Please also read our page on security on the university network.
Yes! Malware spreads via any medium that can be used to exchange data. Apart from over the network or via a modem connection, malicious software can also get onto your computer via floppy disks, CDs or USB sticks.
That's optimistic. It is true that most problems with viruses and worms affect Windows computers, but no software is bug-free and both Apple and third-party developers of Apple software have to regularly add security fixes. There were already viruses for the old macOS and due to the high popularity of Apple devices nowadays, they are increasingly targeted by attackers. Until now, OSX seemed to be largely spared, but discussions about concept viruses as well as "intrusion tools" for OSX systems are circulating on relevant Internet platforms. In addition, certain macro viruses for Office and a variety of sniffing software are already running under Apple.
UniPrint Like any device with network access, printers must be securely configured and regularly maintained. Since some printers have a hard disk, data security is not easily guaranteed. The tips below can be used to counteract this problem:
- An admin password should be set instead of the default password.
- The configuration menu should be checked and if available the remote reset function should be disabled. This function can reset the password to the default manufacturer password.
- Printers should be patched regularly.
- Have the printer migrated to a subnet for printers at the responsible ITSC / CV.
- If sensitive documents have been printed, the hard disk should be destroyed or retained separately when the device is disposed of or repaired.
If the printer is insecure, then wasted material from third party joke printouts is the least of your problems. Printers can spread malware and print jobs can be altered. Existing functions can also be abused. For example, to print draft copies, you can have the words "DRAFT" automatically superimposed on the printout. However, this feature can also be abused, for example, to put swear words over every printout, thus rendering the printer unusable. Printers may be able to distribute and install drivers to print job PCs on their own. On currently patched PCs, users should be asked for permission via pop-up. A modified printer could be used to install arbitrary software on other machines. The printer does not only exist virtually, but it is also located in one place. Depending on the purpose of the printer, different locations are suitable. If the printer is to print sensitive documents, access to the printer should be secured. Especially if printouts are left for a while because it takes a while to get to the printer, it is important that no unauthorized persons can view or steal the printouts. Of course, used copy templates should not be left in the machine either. If it is necessary to log in to print, care must be taken to log out again.
Devices, equipment and services used for the electronic processing, storage, transmission or destruction of information, such as computer systems, data networks, software, Internet access, e-mail, VoIP or electronic locking systems.
A service provided by an IT service provider. An IT service consists of a combination of people, processes and technologies.
This is understood to mean the prevention of system failures. Access to information must be guaranteed within an agreed time frame.
Information technology is a generic term for information and data processing as well as for the hardware and software required for this purpose.
Data carriers are data storage devices, e.g. USB sticks, CDs, smartphones or tablets.
All electronic systems that store, process or transport information.
This refers to telephony via data networks, namely IP networks.