IT Security
After successful completion of this module, you are familiar with:
- the most important terms of information security, such as integrity, availability, confidentiality and authenticity and can explain them;
- the most important current encryption and certification procedures and can identify and apply them;
- relevant protocols for secure communication, identification and authentication and are also familiar with their application;
- key authorisation and access control concepts such as roles, permissions, logging, and monitoring;
- the risks of web applications and various methods for securing them;
- standards, procedures and norms for risk management, safety reviews and the preparation of safety concepts and documentation.