SPOC-Web Icon, semantic Knowledge Management

How to... get Things done

Security Training for everybody

Security is a dry and complex topic, but it should concern everybody, companies as well as private persons and states.

Only a few basic facts and arrangements are sufficient, to fundamentally improve the security of your Computers and Data.

The next few pages show the greatest risiks and put them in the right perspektive. Additionally simple tips are provided to avoid them.

Some preliminary remarks

Absolute security is hard to attain and to keep. With security it is always necessary to strike a balance between effort and benefits, both for the attacker as well as for you, the defender.

In etreme cases, dedicated and powerful attackers unfortunately have many more methods at their disposal than described here, among others esp. physcal intrusions like fraud, burglary or even torture.

Keeping this in the back of your mind, you should direct your attention to the breadth of the perimeter rather than to the depth (speak: complexity) of an attack.

Why do you need security?

In this section we try to make you aware of the problems at hand, so you can decide for yourself, how much effort you want to put into your security and privacy.

Why especially Computers?

Here the rapid development of Computers, Storage and Netzworks within the last 100 years is reflected. The resulting capabilities are the main reason to take action on security and privacy.

How to handle passwords

We update some common practices about passwords that have proven to do more harm than help. We explain, how you can generate secure passwords and give specific advice for handling them. Additionally we present you some tools that make password administration a no-brainer.

Examples for attacks from cyberspace and int the real world

Even when the incidents described here are not representative for all attacks, they show that those practices have been common for a long time and security must not be neglected.

What are pass-phrases?

Lately it has become clear that many of the rules on passwords enforced by institutions are impractical and insteead of improving security they create more risks. Pass-phrases have developed as memorable, but still very secure alternatives to passwords. On this page we explain why and how to make your own phrases.

Additionally we generate examples for extremely safe phrases, whenever you refresh the page. You can use these for yourself, because we will never track these phrases or you.

How do hackers operate?

A small glimpse into the world of hackers shows typical security challenges and solutions both for users and for operators of Web-Applications.