IT emergency management at the HSWT
IT security has become an integral part of our daily lives. HSWT's IT emergency management is designed to protect users from cyber threats. Measures against phishing, malware & social engineering.
Behaviour in the event of IT emergencies: Measures & advice for HSWT staff
Processes in research, teaching and administration are increasingly dependent on the secure functioning of information and communication technology. However, the correct behaviour in the event of IT emergencies also protects the HSWT in the event of incidents. All staff at Weihenstephan-Triesdorf University of Applied Sciences can find information on possible threats, the IT emergency plan, the IT emergency card and contact details for the IT emergency service on this page.
The number of potential cyber threats is increasing by leaps and bounds. The availability, integrity and confidentiality of IT systems and, above all, the information processed with them are particularly at risk. These terms are also understood as fundamental values of IT security.
The aim is to achieve or maintain a state in which the basic values of IT security are maintained in accordance with the requirements of the university management and existing legal affairs. In this state, potential threats should only be effective to the extent that the remaining risks are acceptable. To this end, the IT security team takes all necessary measures. However, in order to achieve effective protection throughout the university, the active participation of all users is essential.
IT emergency card for HSWT staff
The most important tool against cyber threats is alert staff who are aware of the dangers. The IT emergency card helps them to act correctly in the event of an IT emergency.
-
1. recognise IT incidents
- System not responding as usual?
- Strange warning & error messages?
- Suspicion of malware?
- Access data unintentionally disclosed?
- Laptop or other hardware stolen?
-
2. react in a calm & level-headed manner
- Keep calm!
- Stop working on the system!
- Document your observations!
- De-energise the device! (Leave the on/off button pressed for 5 seconds)
- Only initiate further measures as instructed!
-
3. report an IT incident
Please contact the HSWT IT service desk on
telephone number +49 8161 71-2222 or it-sicherheit@hswt.de.
- Who is reporting? (Please include your contact details)
- Which IT system is affected (University of applied sciences device: sticker)?
- How did you work with the system?
- What did you observe?
- When did the incident occur?
- Where is the affected IT system located? (Building, room, workplace)
- Wait for further enquiries.
Recognise phishing: Phishing pages, links & mails
For years, one form of fraud has enjoyed great popularity in the field of online crime: phishing.
Phishing is an artificial word formed from the words "password" and "fishing" and can be translated as "fishing for passwords". Fake emails, websites, text messages or messages in messenger services (e.g. Signal, Telegram, WhatsApp, etc.) are used to deceive users into disclosing confidential and sensitive data, which can then be misused.
-
How can I recognise phishing? General protective measures
- Do not disclose sensitive data carelessly (do not respond to dubious emails). Think in advance whether it is necessary to enter personal data in order to use a certain website or feature.
- If you receive dubious e-mails that purport to come from official bodies of the University of Applied Sciences Weihenstephan-Triesdorf, please check
- ... the dispatch address - Attention: The display name of an e-mail has no reliability whatsoever. If necessary, enquire by telephone (use a telephone number from a reputable source, not from the e-mail).
- ... the websites of the relevant area with regard to current warnings about fake e-mails.
- Do not click on suspicious links lightly. If you place the mouse cursor over the link, a preview of the link will appear in the bottom right-hand corner of the screen. Does this URL match the page you wanted to visit or that is advertised in the email?
- You should neither open nor save dubious e-mail attachments.
- You can recognise secure websites or secure connections by the valid SSL certificate (https:// and the padlock in the URL page). Caution is advised with conspicuous domain endings such as ".de.com"
- Current browsers usually have integrated phishing protection, which warns or blocks access to potential phishing websites.
You will receive information on current phishing/fake emails at the University of applied sciences Weihenstephan-Triesdorf as an email from IT Security.
-
Spear phishing, pharming & co.: recognising sophisticated phishing variants
In addition to the more general phishing attempts that are frequently encountered, there are also more sophisticated ways of obtaining passwords. The above-mentioned measures and conscious clicking behaviour apply to avoiding an IT emergency through these special variants:
- Spear phishing is aimed specifically at individuals. In CEO fraud, the attacker pretends to be a superior by using falsified sender details in order to mislead the victim.
- In addition to the classic method of phishing - sending emails with fake links - a more sophisticated form is increasingly being used.
Pharming involves manipulating the Domain Name System (DNS), which is responsible for converting the Internet addresses (domain names) entered in the browser into the corresponding IP addresses. This manipulation allows users to be directed to a fake website despite entering a correct URL. - It is also possible to manipulate links built into programmes - which are used for registration, for example. This form is known as binary phishing.
- In sluring (service luring), the victims are tricked into disclosing personal data with prepared websites that promise a service.
- In smishing (also known as SMS phishing), fake SMS messages are sent to potential victims instead of emails.
- In addition to the conventional variants, phishing e-mails or e-mails with malicious potential are also sent as supposed appointment invitations. Due to the format of the appointment invitations, they are usually automatically imported into Outlook or other mail clients. You should not react to such an appointment invitation (do not accept, reject, etc.); the entry can be removed from the calendar by right-clicking and selecting the Delete option. Under no circumstances should a link be clicked on lightly.
- QR code phishing, also known as quishing, is a form of social engineering phishing in which the target person is deliberately tricked into scanning a QR code. This code either takes them to a fake website or downloads malware. Such attacks can be carried out not only via email notifications, but also via platforms such as WhatsApp, phone calls (via voice phone) or even in the form of letters.
Protection against malware & malicious software
Viruses, worms and Trojans can infect computers in these cases and install malware:
- When using the Internet.
- when receiving e-mails.
- when accessing files and documents on mobile data carriers (CDs, DVDs, USB sticks, mobile hard drives, etc.), especially if they are exchanged.
The possible negative consequences are very complex and range from the impairment of programmes to the loss of data and confidential information. This can result in considerable financial damage or loss of reputation.
The use of an activated and up-to-date virus scanner (in addition to other protective measures) can protect against such damage.
Spam
Spam, spamming or junk mail is the term used on the Internet to describe the mass mailing of unsolicited advertising emails, advertising posts in newsgroups that have nothing to do with the topic of the group, and chain letters.
-
Recognise spam mails: Here's how!
Strange wording in the cover letter and an unusually high number of spelling mistakes can be a sign of spam from a non-German-speaking originator. An almost unmistakable sign of spam is also a request to enter personal data - for example due to an allegedly necessary account verification with an online payment service provider: a classic case of phishing.
Another common spam scam involves fake invoices in email attachments, often in the form of a ZIP file. It is highly likely that the supposed invoice contains a malicious programme that infects your computer with malware when you open the file.
Other signs of spam emails can be
- Unknown sender address
- Unusual, often cryptic-looking sender name
- anonymous address
- no imprint
- no unsubscribe link as in a legitimate newsletter
- Web links or clickable images in the email text
- Strange subject or content
- Many grammatical and spelling errors
- Zip, Word or Excel files attached
-
Measures against spam mails
Most mail clients have relatively good spam filters. Nevertheless, you should remain vigilant and observe the general precautionary measures. The same security guidelines apply here as for malware or phishing.
Social engineering & protection against it
Cyber security is not just about computer systems and networks. The users of these technologies are at least as important: people with all their strengths and weaknesses. In social engineering, attackers exploit the "human factor" as the supposedly weakest link in the security chain in order to realise their criminal intentions.
-
What is social engineering?
In social engineering, human characteristics such as helpfulness, trust, fear or respect for authority are exploited to skilfully manipulate people. In this way, cyber criminals tempt the victim to reveal confidential information, for example,
- disclose confidential information.
- To bypass security functions.
- Make bank transfers.
- Install malware on a private device or a computer in the company network.
Similar to doorstep scams, cyber criminals on the internet also rely on the pretence of a personal relationship with the victim or make promises of profit. Many other variants of this social engineering approach are conceivable and are used. In some cases, indirect contact is also made via friends of the actual victim.
-
How can you protect yourself against social engineering?
In social engineering, perpetrators exploit deep-seated human dispositions and needs to achieve their criminal goals - such as the desire to help other people quickly and unbureaucratically. This makes it difficult to reliably protect against this form of attack.
To minimise the risk of social engineering scams, you should always observe the following basic rules
- Use social networks responsibly: Users should think carefully about what personal information they disclose there, as this can be collected by criminals and misused for attempts at deception.
- Discretion about the workplace: Confidential information about the workplace or company is taboo in private and professional social networks.
- Never share passwords, access data or account information by phone or email: Banks and reputable companies never ask their customers to enter confidential information by email or phone.
- Beparticularly careful with emails from unknown senders: If there is even the slightest suspicion that this could be an attempted attack, the best response is not to react. If it is a false alarm, the sender may contact you via another channel. The 3-second rule provides time to think about the accuracy of the message.
- If a reaction is absolutely necessary, a call to the person sending the message will clarify whether it is a legitimate e-mail.
Predatory Conferences and Predatory Journals
Scientific publications are of central importance for research. Publication in renowned journals and participation in prestigious conferences are considered key indicators of scientific success. It is crucial for scientists to make their research results visible. Unfortunately, some dubious publishers and dubious organisers are trying to exploit this.
Predatory journals, also known as pseudoscientific journals, pursue a business model in which authors can publish their scientific work for a fee without offering the necessary scientific standards such as quality assurance and editorial supervision that are common in reputable journals. Articles in predatory journals are generally not recorded in relevant specialist databases, which means they remain hidden from the specialist community.
In recent years, there has also been a worrying development in the field of scientific publications and communication, the so-called predatory conferences, also known as fake conferences. These events may appear serious and scientific at first glance, but offer no real added value and mainly serve the organisers to make a profit through conference fees. The participants and speakers are often exploited in the process.
The University Library of the Hamburg University of Technology has compiled a checklist for fake conferences and refers to the initiative "Think. Check. Attend". In the case of unknown conferences, it is advisable to inform yourself in your own network and online.