{"id":10007274,"date":"2016-06-02T18:44:31","date_gmt":"2016-06-02T16:44:31","guid":{"rendered":"https:\/\/www.fh-joanneum.at\/?post_type=focalpoints&#038;p=7274"},"modified":"2022-06-30T10:40:50","modified_gmt":"2022-06-30T08:40:50","slug":"it-security","status":"publish","type":"focalpoint","link":"https:\/\/www.fh-joanneum.at\/en\/field-of-expertise\/it-security\/","title":{"rendered":"IT Security"},"content":{"rendered":"<div class=\"wp-block-sidebar-layout-container margin-bottom-normal\">\n    <div\n        class=\"container-lg\"\n        style=\"--bs-gutter-x: 0;\"\n    >\n        <div\n            class=\"row\"\n            style=\"--bs-gutter-x: 0;\"\n        >\n            \n<div class=\"col-12 col-md-3 order-1 order-md-0 sidebar\">\n            \n<div\n    id=\"\"\n    class=\"wp-block-institute-card margin-bottom-normal\"\n>\n    <div class=\"container-lg\">\n                                    <div class=\"row justify-content-around\">\n                    <div class=\"col-8 col-sm-6 col-md-12\">\n                        <a\n        class=\"angewandte-informatik institute-card\"\n        href=\"https:\/\/www.fh-joanneum.at\/en\/institute\/software-design-and-security\/\"\n        target=\"_self\"\n    >\n                            <div class=\"major-bg-color\">\n            <div class=\"wrapper\">\n                <div class=\"header\">\n                    <span>Institute<\/span>\n                <\/div>\n                <h4>Software Design and Security<\/h4>\n            <\/div>\n        <\/div>\n            <span><\/span>\n                    <\/a>\n                    <\/div>\n                <\/div>\n                        <\/div>\n<\/div>\n\n\n<\/div>\n\n<div class=\"d-none d-md-flex col-md-1 seperator-column\"><\/div>\n<div class=\"col-12 col-md-8 order-0 order-md-1\">\n     \n<div\n    id=\"\"\n    class=\"wp-block-intro-text margin-bottom-normal\"\n>\n    <div class=\"container-lg\">\n        <div class=\"row\">\n            <div class=\"col\">\n                <div class=\"major-text-color fst-italic\"><div class=\"module-migration-intro-text\">\n<p class=\"field-migration-intro_textfield\">\n<p>With a Master\\&#8217;s programme in IT &amp; Mobile Security, IT security is a strong research focus at the Institute of Software Design and Security. Research topics include developing secure software, detecting security gaps in different mobile operating systems, creating mobile solutions for enterprises, as well as infrastructure availability and network security in industries such as aviation. <\/p>\n<\/p>\n<\/div>\n<\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n\n<div id=\"\" class=\"wp-block-text-content margin-bottom-normal\">\n    <div class=\"container-lg\">\n        <div class=\"row\">\n            <div class=\"col\">\n                <p>IT Security research focuses on: <\/p>\n<ul>\n<li>mobile security <\/li>\n<li>secure software design<\/li>\n<li>security analysis<\/li>\n<li>penetration testing<\/li>\n<li>network security<\/li>\n<li>secure server and high-availability technologies<\/li>\n<li>big data<\/li>\n<li>cryptography<\/li>\n<\/ul>\n<p>Research activities are aimed at recording, linking, manipulating and evaluating sensitive data which could cause failures in private and public infrastructures. The focus is on digitisation and remote operation based on a quick security assessment. This is achieved by developing prototypes with validation functions which are used to analyse special data types for mobile access to the sensitive data. <\/p>\n<p>The implementation of IT security issues is based on a security scan developed by the Institute. This is a tool used to provide initial checks of company IT infrastructure. Companies link to a special server at FH JOANNEUM via a tablet or mobile phone and the server then runs a check to detect any security flaws in the company&rsquo;s network.  A variety of tools are used to identify and log any open ports and active services. The identified services are checked for vulnerability to a list of known security threats. The list is updated daily.<\/p>\n\n            <\/div>\n        <\/div>\n            <\/div>\n<\/div>\n\n\n<\/div>\n\n\n        <\/div>\n    <\/div>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>With a Master&#8217;s programme in IT &amp; Mobile Security, IT security is a strong research focus at the Institute of Software Design and Security. Research topics include developing secure software, detecting security gaps in different mobile operating systems, creating mobile solutions for enterprises, as well as infrastructure availability and network security in industries such as aviation. <\/p>\n","protected":false},"author":11,"featured_media":10058135,"template":"","meta":{"_acf_changed":false,"footnotes":""},"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.fh-joanneum.at\/en\/wp-json\/wp\/v2\/focalpoint\/10007274"}],"collection":[{"href":"https:\/\/www.fh-joanneum.at\/en\/wp-json\/wp\/v2\/focalpoint"}],"about":[{"href":"https:\/\/www.fh-joanneum.at\/en\/wp-json\/wp\/v2\/types\/focalpoint"}],"author":[{"embeddable":true,"href":"https:\/\/www.fh-joanneum.at\/en\/wp-json\/wp\/v2\/users\/11"}],"version-history":[{"count":0,"href":"https:\/\/www.fh-joanneum.at\/en\/wp-json\/wp\/v2\/focalpoint\/10007274\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fh-joanneum.at\/en\/wp-json\/wp\/v2\/media\/10058135"}],"wp:attachment":[{"href":"https:\/\/www.fh-joanneum.at\/en\/wp-json\/wp\/v2\/media?parent=10007274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}