IT security is about protecting information and information systems from unauthorized access and use.


Securing an IT infrastructure has many facets. They range from securing networks, cf., firewalls, intrusion detection, to securing computers, cf., antivirus software, and to securing code, cf. security bugs and flaws. IT security is about protecting information and information systems from unauthorized access and use. Confidentiality, integrity and availability of information are core goals. Besides IT security, other security terms that are often used include network security, computer security, web security, mobile security, and software security.

Duration
01/ 2009 – up to now

Contact: Johannes Sametinger

IT Security

Publications

M. Biro , A. Mashkoor, J. Sametinger: Safety and security of cyber-physical systems, Journal Software Evolution Process 2022, November 2022, Doi: 10.1002/smr.2522
Journal Article
J. Bräuer, B. Gmeiner, and J. Sametinger, A Risk Assessment of Logical Attacks on a CEN/XFS-based ATM Platform, International Journal on Advances in Security, Vol. 9, No 3&4, pp. 122–132, ISSN 1942-2636, Dec. 2016.
International Journal on Advances in Security
Journal Article
J. Bräuer, B. Gmeiner, J. Sametinger: ATM Security - A Case Study of a Logical Risk Assessment, Proceedings of the Tenth International Conference on Software Engineering Advances (ICSEA 2015), Barcelona, Spain, November 15-20, 2015, (Best Paper Award), icsea_2015_13_40_10219.
Conference Article
M. Riegler, J. Sametinger: Embedded Web Device Security, The Eighth International Conference on Emerging Security Information, Systems and Technologies, SECUREWARE, Lisbon, Portugal, November 16 - 20, 2014.
Conference Article
R. Maier, J. Sametinger: Profiles for Convenient Front-end Privacy, SEKE 2013, 25th International Conference on Software Engineering and Knowledge Engineering, Boston USA, June 27-29, 2013.
Conference Article
R. Schlöglhofer, J. Sametinger: Secure and Usable Authentication on Mobile Devices, MoMM2012 - 10th International Conference on Advances in Mobile Computing & Multimedia, Bali, Indonesia, December 22-26, 2012.
DOI: 10.1145/2428955.2429004
Conference Article
M. Kern, J. Sametinger: Permission Tracking in Android, UBICOMM 2012, Sixth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, ISBN: 978-1-61208-236-3, pp. 148-155, Barcelona, Spain, September 23-28, 2012.
Conference Article
A. Wiesauer, E. Artmann, J. Sametinger: Aus allen Wolken fallen - Risiken des Cloud Computings, lex:itec - Fachzeitschrift für Recht und Informationstechnologie, ISSN 1817-9150, Ausgabe 01/11, pp. 22-38, März 2011.
Journal Article
G. Draxler, J. Sametinger, A. Wiesauer: Electronic Payment and Online Gaming, 16th International Conference on Distributed Multimedia Systems, Oak Brook, USA, October 14-16, 2010.
Conference Article
A. Wiesauer, J. Sametinger: A Security Design Pattern Taxonomy based on Attack Patterns, ICETE 2009 - International Joint Conference on e-Business and Telecommunications, Milan, Italy, July 7-10, 2009.
Conference Article
M. Meike, J. Sametinger, A. Wiesauer: Security in Open Source Web Content Management Systems, IEEE Security & Privacy, vol. 7, no. 4, pp. 44-51, 2009.
DOI: 10.1109/MSP.2009.104
Journal Article
S. Sageder, J. Sametinger, A. Wiesauer: Case Study: Using Digital Signatures for the Archival of Medical Records in Hospitals, CRiSIS 2008, 3rd International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia, October 28-30, 2008.
DOI: 10.1109/crisis.2008.4757481
Conference Article