Read the information security guideline of the RPTU, which can be found under News.
Here you can find out important points, in particular how the RPTU has positioned itself and what organizational regulations are being considered.
The word phishing is made up of password and fishing, "password fishing".
This involves sending e-mails that look very similar to those from banks or online payment services. In these emails, the customer is usually asked to click on a link contained in the email and log in. However, the link does not lead to the original site, but to a fake site. There, the user name and password can then be easily read. Always check the sender's e-mail address before clicking on a link in an e-mail. You can also check the link it contains by holding the mouse pointer over the link. This will show you the stored link, which may differ from the displayed text. Only open email attachments if you are absolutely sure that the email comes from a trustworthy person.
Spam refers to masses of unsolicited emails, usually containing advertising. These are sent to millions of email addresses, most of which come from address traders. Reading, recognizing and deleting these emails costs an employee time and the company money. Spam also includes hoaxes (bad jokes) that are sent by e-mail. They contain messages that, for example, make the person concerned feel sorry for them and lure them to an infected website. All these strategies are used to overload servers or spread viruses.
A virus is a sequence of instructions that can infiltrate and reproduce itself in computer programs (host programs). These viruses can overwrite or manipulate files or programs, they can cause anomalies (e.g. text messages or starting music) and often consume considerable resources, causing the device to lose a lot of performance. More dangerous, however, are viruses that can damage the operating system or even the hardware. Operating systems and hardware cannot normally be easily repaired. There are many sources for different types of viruses. For example, viruses can be found on data carriers or embedded in programs such as games or demo versions. If the user then runs these programs, the virus can spread on the computer and manipulate other files and programs on the computer. However, such a virus can also multiply on the computer unnoticed by the user. Such a process is made possible, for example, if the virus is built into a website and enters the computer during the loading process.
In contrast to viruses, worms are executable programs that nest in the system in a similar way to viruses. In contrast to data, which is merely passive, an executable program is an active application. Worms can also compromise the integrity, confidentiality and availability of data and also use a lot of resources, which greatly minimizes computer performance. They usually spread through security gaps in the network, such as a lack of password protection or encryption.
A Trojan horse (Trojan) is a computer program that is disguised as a harmless application but can be used to carry out other harmful functions in the background. Some Trojans send files, read passwords or secret numbers from the computer to a specific address, open ways to remotely control the computer or monitor data traffic. Trojans enter the computer via software, emails or manipulated websites.
Modern printers also store all documents digitally, which is why they are popular targets for attacks. In addition to possible technical measures, such as encrypting the transport routes, there are also simple yet essential behaviours. Therefore, make sure that the documents are not printed on the wrong network printer so that the documents do not fall into the wrong hands. Please note that it is always advisable to delete the data stored on printers and other multifunction devices when disposing of them.
There is an initial guide to this under Quick-Tips.
Other places to go are the Federal Office for Information Security BSI at
BSI - Bundesamt für Sicherheit in der Informationstechnik.
The consumer agencies also offer some information material.
If you need to change your password, you can do so via the following page:
Password change - Regional University Computing Center Kaiserslautern-Landau - Rheinland-Pfälzische Technische Universität Kaiserslautern-Landau (uni-kl.de)
Keep calm. Disconnect the computer from the network (unplug LAN cable, switch off WLAN), shut down computer, report.
If you notice anything unusual, contact your IT manager. If personal data is affected, contact your data protection coordinator (DSK) or the data protection officer (DPO).
If you become aware of a security incident in your area, please report it immediately using the form below:
Report security incident / data breach
The Data Protection Officer (DPO) and the Information Security Officer (ISO), with the support of the Legal Department HA 1, will check whether there has been abreach of personal data protection or an IT security incident .
In principle, data protection incidents (data breaches) must be reported to the supervisory authority by the DPO within 72 hours in accordance with Article 33 GDPR.