IT Security

After successful completion of this module, you are familiar with:

  • the most important terms of information security, such as integrity, availability, confidentiality and authenticity and can explain them;
  • the most important current encryption and certification procedures and can identify and apply them;
  • relevant protocols for secure communication, identification and authentication and are also familiar with their application;
  • key authorisation and access control concepts such as roles, permissions, logging, and monitoring;
  • the risks of web applications and various methods for securing them;
  • standards, procedures and norms for risk management, safety reviews and the preparation of safety concepts and documentation.