Brute Force Attack

Brute Force Attack “Brute force” translates as “brute force”. In IT, this brute force corresponds to a less sophisticated approach: indiscriminate trial and error. In a “brute force” attack, an attempt is made to guess passwords or keys by calculating and trying out as many character combinations as possible in the shortest possible time. What […]

Bot

Bot Derived as a short form from the English word “robot”. “Bot” refers to the IT version of a robot: a computer program that automatically and independently performs certain tasks. What does the term bot mean in detail? Bots are versatile. The bots that independently visit and evaluate websites for search engines are very well-known. […]

Botnets

Botnets A bot is a computer program that automatically and independently performs certain tasks. If several bots network with each other, a botnet is created. Although technically neutral, botnets are most often set up between malware-infected computers and used by cybercriminals – without the knowledge of the computer owners. What does the term botnet mean […]

Evil Twin

Evil Twin An “evil twin” is a fake Wi-Fi network that looks just like a trustworthy, genuine network – for example, the guest Wi-Fi at a company, a café or a hotel. The attackers’ aim is to trick users into connecting to the fake network so that they can then steal their data. What happens […]

Privacy screen (screen cover)

Privacy screen (screen cover) A privacy filter (also known as a privacy screen or screen cover) is a physical attachment for laptop, monitor or tablet screens that prevents unauthorised people from viewing the screen from the side. The display is then clearly visible only when viewed directly from the front – from side angles, the […]

Black-box penetration test

Blackbox-Penetrationtest In a penetration test, IT security experts attempt to gain unauthorised access to an IT system – such as a corporate network – in a targeted and authorised manner. This puts existing security measures to the test and uncovers vulnerabilities that need to be addressed. In a black-box penetration test, the target IT system […]

Backup

Backup The word ‘backup’ literally means ‘reinforcement’ or ‘safeguard’ and, in IT, refers to a backup copy. For businesses, backup copies of their computers, servers and, above all, their stored data are extremely important. This is because, in the event of data loss or corruption, up-to-date backups enable a return to normal operations as quickly […]

Backdoor

Backdoor The term translates as ‘backdoor’ and refers to an alternative means of accessing software or a computer. A backdoor may be built into a programme by a legitimate software manufacturer, for example to allow access to the programme on behalf of the customer in the event of a forgotten password. As malware, a backdoor […]

Identification, authentication and authorisation

Identification, authentication and authorisation What exactly do authentication and authorisation mean? Identification – proving one’s identityDuring the authentication process, a person provides proof that they are who they claim to be. In everyday life, this is done, for example, by presenting an identity card. In IT, a password combined with a username is often used […]

Asymmetric encryption

Asymmetric encryption This is an encryption method in which the encryption and decryption keys are not the same – in other words, they are not symmetric but asymmetric. Typically, in asymmetric encryption, data is encrypted using a public key and decrypted using a private key. Despite the fact that secret codes have been in use […]