Daten sicher aufbewahren/en: Unterschied zwischen den Versionen

ZIM HilfeWiki - das Wiki
Zeile 96: Zeile 96:
 
* [[Schuetzen_Sie_Ihr_Passwort/en|Protect your password]]
 
* [[Schuetzen_Sie_Ihr_Passwort/en|Protect your password]]
 
* [[Uni-Account: Passwort vergessen/en|Uni account: Forgot your password?]]  
 
* [[Uni-Account: Passwort vergessen/en|Uni account: Forgot your password?]]  
* [[Passwoerter_Verwalten_mit_KeePass/en|Managing Passwords with KeePass]]
+
* [[Passwoerter_verwalten_mit_KeePass/en|Managing Passwords with KeePass]]
 
'''Phishing'''
 
'''Phishing'''
 
* [[Hinweise_zu_Phishing-E-Mails/en|Notes on phishing e-mails]]
 
* [[Hinweise_zu_Phishing-E-Mails/en|Notes on phishing e-mails]]

Version vom 26. Oktober 2022, 09:33 Uhr


Die deutsche Version finden Sie auf der Seite Daten sicher aufbewahren

If you want to keep your data safe, it may be useful to encrypt it. This article explains why digital data should be protected and the possibilities for doing so. An overview of identity card data (digital identities and passwords), communication data (such as email, social media), data from private life (such as photos, certificates) and data from university life (such as theses, reports, exams) and the corresponding necessary technologies (equipment, software) are discussed.
Measures recommended are data backup, up-to-date terminal equipment and good passwords, authorisation concepts and encryption.

Background[Bearbeiten | Quelltext bearbeiten]

Why is data encryption important?[Bearbeiten | Quelltext bearbeiten]

In real everyday life we protect important things (such as ID cards, keys, credentials), but also expensive objects (such as cars, or bicycles) or things that are important to us personally (such as photos, memories, diaries, letters).
We are careful and take good care of them, take out insurances, make copies and put them elsewhere to protect ourselves from losing things, getting them damaged or stolen, falling for fraud (like grand-child fraud, fake officials) or our own clumsiness. In the digital world, the protection of digital data is divided into protection goals and associated threats, against which we should protect ourselves.
We present the most important ones regarding data storage and saving here.

Availability of data[Bearbeiten | Quelltext bearbeiten]

The availability of data refers to the fact that you can access your data reliably at any time. The most common damage scenarios here are the loss of data

  • by defective or lost equipment (such as a defective laptop or USB stick or a stolen mobile phone)
  • due to your own error (like accidentally deleting the wrong file or email, or another authorised person unknowingly deleting something on your computer)
  • by ill-intentioned external interference (such as hacker attacks, malware, stolen passwords or identity)
  • through defects or changes in software or environments used (such as updates or cloud solutions)


Only making a security copy of your data on a regular basis protects you from all these scenarios. The technical term for this is a backup.
For private data you should make private copies on a regular basis. Information on this can be found, for example, on the corresponding page of the Federal Office for Information Security (german).
Your university data is stored in the network storage, in the university applications (mail systems of the university, PANDA, PAUL) in a protected way, as the data backup of the university is in effect here.
Critical from a university point of view are your university data on your mobile devices and in cloud environments not released by the university. Therefore, make regular copies to a network storage or do not use local storage at all. For Windows and MacOS users there are also automatic synchronisation options. For instructions on how to back up your data, refer to the Backup overview page (german).
In addition to backing up your data, you reduce the risk of loss due to third-party maliciousness if you

  1. Keep your devices always up to date, install the necessary updates promptly,
  2. Use security technologies such as virus scanners,
  3. Protect your identity and password and
  4. Do not work on your device with administrator rights.


These measures also protect the academic environment and your data on the university systems. Because if your device is corrupted or your access data is known to other people, it endangers not only your personal data, but also all data and devices that can be accessed via networks from your device.

Security of Confidential Data[Bearbeiten | Quelltext bearbeiten]

Confidential information[Bearbeiten | Quelltext bearbeiten]

Another threat in the digital world is the disclosure of confidential information'’'. This means that information that should only be accessible to a certain group of people can also be read by others. For example, we regularly read about credit card information or email addresses that have been stolen.
Confidential data in university life includes, for example, all sensitive personal data such as health data, but also survey reports, test results or even research findings that are not yet to be published. You can find a list of data that accumulates in university life and an assessment of its confidentiality in the overview about data classes and their required protection (german).
In the digital world, data can be copied quickly and sent to many people at low cost, for example by email. Unfortunately, if you do not take precautions, it can just as easily and quickly fall into the wrong hands. One possibility is to store confidential data only on a specially protected device (and store this only in a safe). However, conflicts can arise if you need to work with the data regularly, need to access the data in a group or are concerned about the availability of the data as described above.

To protect confidentiality, authorisation concepts (differentiation of users and groups and their respective rights) and encryption procedures are generally used. For example, in current smartphones and tablets, all data is already stored completely encrypted, so that if the device is lost or attacked, other people cannot simply read the stored data. But you can also encrypt your data yourself and thus protect your data from unauthorised access in the event of loss of your device, when storing it in shared storage (network storage, cloud storage such as sciebo), in storages that are administered by third parties (and who therefore basically have access to your data) or when transferring data via the generally non-confidential worldwide Internet (by email or web transfer).

Integrity and Authenticity[Bearbeiten | Quelltext bearbeiten]

From a security point of view, digital data is subject to further threats. It can easily be modified. This is a great advantage in the field of word processing or image processing, but raises the question of originality, changes and authorship. The technical terms used in IT security are the integrity (the correctness of data is guaranteed) and the authenticity of data (authorship is guaranteed). Some encryption technologies also ensure these objectives.

Summary to Protect Data during Storage[Bearbeiten | Quelltext bearbeiten]

Data is at risk in a variety of ways

  • USB stick or external hard disk lost
  • Laptop stolen
  • Password for the online storage has fallen into foreign hands
  • PC infected by malware


A data backup, up-to-date end devices and good passwords primarily help against data loss. Authorisation concepts and encryption of data help to prevent unauthorised individuals from reading or manipulating data unnoticed. Data on laptops is particularly at risk because access to the device by others through theft or hacking attempts always also allows access to the stored data and laptops are often not protected as well. Therefore, implement the above measures or ask your responsible administrator for assistance.

What should be observed when using encryption?[Bearbeiten | Quelltext bearbeiten]

System Resources[Bearbeiten | Quelltext bearbeiten]

Encryption methods offer many advantages. However, they also require more system performance. This means that the system that encrypts and decrypts data requires a little more computing capacity and energy. A low-powered computer can therefore become slower in its daily work with encrypted data.

Passwords[Bearbeiten | Quelltext bearbeiten]

An important security factor of data encryption is the passwords used there. Passwords should always be individual and have a certain length and combination of characters. For information on passwords, refer to Protect Your Password.

Data loss due to encryption[Bearbeiten | Quelltext bearbeiten]

The purpose of encryption is to protect your data from unauthorised access. However, if you lose the key to your data, you no longer have access to it. For example, if you forget the password for encryption, as a rule no one can help you to save your data.

Safety[Bearbeiten | Quelltext bearbeiten]

No encryption method can guarantee absolute security. Various criteria, such as increasing computing power, new scientific cryptographic findings or hidden errors can also make encryption programs vulnerable to attack. Please also note the information provided by the Information Security Team at the University of Paderborn.

Which methods can I use for encryption?[Bearbeiten | Quelltext bearbeiten]

The article Using Data Encryption explains the procedures recommended by the Information Security Team for the secure storage of data. Further notes Please also note the information in the article Sharing Data Securely on the secure transport of data over the Internet (e.g. by email).

Loss of data[Bearbeiten | Quelltext bearbeiten]

The purpose of encryption is to protect your data from unauthorised access. However, if you lose the key to your data, you no longer have access to it. For example, if you forget the encryption password, no one might be able to help you to save your data.

Security[Bearbeiten | Quelltext bearbeiten]

No encryption method can guarantee absolute security. Due to various criteria, such as increasing computing power, new scientific cryptographic findings, or hidden errors, encryption programs can be vulnerable and thus hacked. Therefore, it is very important to always inform yourself about current encryption methods.

See also[Bearbeiten | Quelltext bearbeiten]

Working safely with your own operating system

File Encryption

Password security

Phishing

Mail Security

Viruses/Trojans


Bei Fragen oder Problemen wenden Sie sich bitte telefonisch oder per E-Mail an uns:

Tel. IT: +49 (5251) 60-5544 Tel. Medien: +49 (5251) 60-2821 E-Mail: zim@uni-paderborn.de

Das Notebook-Café ist die Benutzerberatung des ZIM - Sie finden uns in Raum I0.401

Wir sind zu folgenden Zeiten erreichbar:


Mo-Do Fr
Vor-Ort-Support 08:30 - 16:00 08:30 - 14:00
Telefonsupport 08:30 - 16:00 08:30 - 14:00


Das ZIM:Servicecenter Medien auf H1 hat aktuell zu folgenden Zeiten geöffnet:

Mo-Do Fr
08:00 - 16:00 08:00 - 14:30
Cookies helfen uns bei der Bereitstellung des ZIM HilfeWikis. Bei der Nutzung vom ZIM HilfeWiki werden die in der Datenschutzerklärung beschriebenen Cookies gespeichert.