We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Hirne Hacken

00:00

Formal Metadata

Title
Hirne Hacken
Subtitle
Menschliche Faktoren der IT-Sicherheit
Title of Series
Number of Parts
254
Author
License
CC Attribution 4.0 International:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Die überwältigende Mehrheit der erfolgreichen Hacks in freier Wildbahn setzen auf menschliche Faktoren. Wie können wir Systeme und Interfaces gestalten, um diese Schwachstellen zu mindern? Ob Ransomware oder Phishing, APT-Angriffe oder Stalking: Die am häufigsten ausgenutzte Schwachstelle ist der Mensch. Ein Problem, das nur wenig Forschung tatsächlich angehen will. Stattdessen begnügen wir uns damit, den Usern Dummheit zu unterstellen und menschliche Faktoren der IT-Sicherheit "out of scope" zu sehen. Zeit, anders über das Problem nachzudenken, denn es gibt einige Interessante Erkenntnisse zu entdecken. ------------------ Neumann, Linus (2017): „Menschliche Faktoren in der IT-Sicherheit“ in: Ferri Abolhassan (Hg.) „Security Einfach Machen: IT-Sicherheit als Sprungbrett für die Digitalisierung“, p. 85-98 Neumann, Linus (2019): „Wenn Hacker Menschen hacken“ in: Report Psychologie 11/12.2018, p. 462-464
Keywords
Hacker (term)Computer animationJSONLecture/Conference
Hacker (term)Computer fileComputer animation
Server (computing)Beta functionHacker (term)CodeExploit (computer security)Computer animation
AuthenticationZugriffMail ServerPasswordEmailOperating systemInternetIP addressTypDownloadSoftwareDistribution (mathematics)Particle detectorGame theoryInternetWeb pagePasswordWebsiteComputer animation
LINUXACCESS <Programm>Kernel (computing)PasswordInternetWebsiteNeWSSoftwareCodeTOUR <Programm>Computer virusMoment (mathematics)EmailInternetdienstUpdateHacker (term)Cellular automatonAuthenticationEmailElectronic mailing listPhysical quantityAuthenticationLINUXSpam-MailPasswordTransmitterAbsolute valueIP addressWeb pageCoin <Programmiersprache>Web portalListe <Informatik>Software developerMeeting/Interview
PasswordPerimeterZugriffNeumann boundary conditionInternetEmailLoginGooglePasswordZugriffEmailServer (computing)UpdateSource codeWeb serviceGooglePayPalDatabaseIP addressDomain nameWebsiteLoginComputer animation
Neumann boundary conditionOutlookZahlEmailPasswordCryptanalysisWeb pageDomain nameLoginMultitier architectureXML
SoftwareComputer virusUpdateWeb pageMail ServerPlug-in (computing)Device driverEstimatorExploit (computer security)Computer animation
SoftwareDownloadField extensionInternetERNA <Programm>Web pageWORD <Programm>EmailLecture/ConferenceXML
WORD <Programm>Programmer (hardware)Computer fileVersion <Informatik>InternetMAKROSPayPalPhishingEmailEckeComputer animation
ENABLE <Programm>WORD <Programm>Computer fileContent (media)DesktopMAKROSMacro (computer science)Data recoveryHard disk driveWeb pageComputer animation
Computer virusTOUR <Programm>SoftwareBackupMultiplicationMenu (computing)CASTCellular automatonOnline chatComputer fileData recoveryRoundingWeb pageOnline chatSpeciesWind waveCladeEmailMach's principleWordWeb serviceWindows <Zweiunddreißig Bit>
Online chat9 (number)InformationHacker (term)InfinityTime zoneSystems <München>CryptanalysisCoroutineInternetMAKROS
Patch (Unix)Social engineering (security)Mathematical analysisSample (statistics)PhishingSound effectZahlPhysical quantityMacro (computer science)Uniformer RaumHausdorff spaceEmailFirewall (computing)VersuchsplanSound effectPasswordSystems <München>MAKROSPayPalCryptanalysisInformation technology consultingFactorizationMathematical optimizationPauli exclusion principleSystem administratorASIA <Programm>InternetOLEProcess (computing)MetreMobile appUML
Sample (statistics)Sound effectUSB-StickCryptanalysisEmailPasswordSocial engineering (security)Computer animation
PasswordTOUR <Programm>Sound effectEmailUser interfaceProcess (computing)Sound effectPasswordFunction (mathematics)WORD <Programm>LeakLocal ringWEBWeb pageComputer animation
Web browserCodeSoftwareWORD <Programm>FactorizationUser interfaceAbbildung <Physik>Haar measureEmailPressureInternetAuthenticationWeb browserPasswordMAKROSPlot (narrative)Public key certificateMobile appComputer hardwareSeries (mathematics)CodeRollbewegungSpring (hydrology)Process (computing)Switch <Kommunikationstechnik>GruppenrichtlinienComputer animation
PasswordLecture/Conference
openSUSEComputer animation
Transcript: German(auto-generated)