IT emergency management at the HSWT

Notes on IT security

IT security has become an integral part of our daily lives. HSWT's IT emergency management is designed to protect users from cyber threats. Measures against phishing, malware & social engineering.

Behaviour in the event of IT emergencies: Measures & advice for HSWT staff

Processes in research, teaching and administration are increasingly dependent on the secure functioning of information and communication technology. However, the correct behaviour in the event of IT emergencies also protects the HSWT in the event of incidents. All staff at Weihenstephan-Triesdorf University of Applied Sciences can find information on possible threats, the IT emergency plan, the IT emergency card and contact details for the IT emergency service on this page.

The number of potential cyber threats is increasing by leaps and bounds. The availability, integrity and confidentiality of IT systems and, above all, the information processed with them are particularly at risk. These terms are also understood as fundamental values of IT security.

The aim is to achieve or maintain a state in which the basic values of IT security are maintained in accordance with the requirements of the university management and existing legal affairs. In this state, potential threats should only be effective to the extent that the remaining risks are acceptable. To this end, the IT security team takes all necessary measures. However, in order to achieve effective protection throughout the university, the active participation of all users is essential.

IT emergency card for HSWT staff

The most important tool against cyber threats is alert staff who are aware of the dangers. The IT emergency card helps them to act correctly in the event of an IT emergency.

Recognise phishing: Phishing pages, links & mails

For years, one form of fraud has enjoyed great popularity in the field of online crime: phishing.

Phishing is an artificial word formed from the words "password" and "fishing" and can be translated as "fishing for passwords". Fake emails, websites, text messages or messages in messenger services (e.g. Signal, Telegram, WhatsApp, etc.) are used to deceive users into disclosing confidential and sensitive data, which can then be misused.

Protection against malware & malicious software

Viruses, worms and Trojans can infect computers in these cases and install malware:

  • When using the Internet.
  • when receiving e-mails.
  • when accessing files and documents on mobile data carriers (CDs, DVDs, USB sticks, mobile hard drives, etc.), especially if they are exchanged.

The possible negative consequences are very complex and range from the impairment of programmes to the loss of data and confidential information. This can result in considerable financial damage or loss of reputation.

The use of an activated and up-to-date virus scanner (in addition to other protective measures) can protect against such damage.


Spam, spamming or junk mail is the term used on the Internet to describe the mass mailing of unsolicited advertising emails, advertising posts in newsgroups that have nothing to do with the topic of the group, and chain letters.

Social engineering & protection against it

Cyber security is not just about computer systems and networks. The users of these technologies are at least as important: people with all their strengths and weaknesses. In social engineering, attackers exploit the "human factor" as the supposedly weakest link in the security chain in order to realise their criminal intentions.


University of applied sciences Weihenstephan-Triesdorf
Office of the president
University Communications
Building A6
Am Hofgarten 4
85354 Freising