IT Security / Networks and Systems

  • How can information be represented, saved, transmitted and processed?
  • Which system (Internet, computer networks, mobile phones, cars etc.) vulnerabilities are there and when are systems vulnerable?
  • How do complex IT systems stay safe in accordance with pre-defined safety objectives (privacy, integrity, authenticity, anonymity)?
  • How do cryptographic processes work (e.g. data encryption, digital signatures) and how are they implemented?
  • How can systems be protected against hacker attacks?
  • What are the challenges concerning the interface human/IT Security
Jia-Lin Shi
– Jia-Lin Shi , Master of Science

Studiengänge in diesem Fach

Jia-Lin Shi

What made you choose this degree programme?

In which respect have or haven’t your expectations been fulfilled?

Which aspect of your degree programme do you enjoy most?

What has been your biggest challenge to date?

What would you like to become after completing your degree?

Which advice would you like to give to students who consider enrolling in this degree programme?