• Skip navigation
  • Skip to navigation
  • Skip to the bottom
Simulate organization breadcrumb open Simulate organization breadcrumb close
IT Security Infrastructures Lab
  • FAUTo the central FAU website
  1. Friedrich-Alexander-Universität
  2. Faculty of Engineering
  3. Department Computer Science
  • Campo
  • UnivIS
  • Jobs
  • Map
  • Help
  1. Friedrich-Alexander-Universität
  2. Faculty of Engineering
  3. Department Computer Science

IT Security Infrastructures Lab

Navigation Navigation close
  • Research
    • Forensic Computing Group
    • Human Factors in Security and Privacy Group
    • Multimedia Security
    • Security Education Development Group
    • System Security Group
    • Archive
    • Funded Projects
    • Publications
    Portal Research
  • Lab
    • Staff & Research Groups
    • Alumni
    • Partners
    Portal Lab
  • Teaching
    • Courses
    • General Information regarding Teaching/Courses
    • Notes on Examinations
    • eTeaching
    • Theses
    • Writing a Thesis at Informatik 1
    Portal Teaching
  • How to reach us
  1. Home
  2. Research
  3. Information Security Group

Information Security Group

In page navigation: Research
  • Forensic Computing Group
    • DiOS: Dynamic Privacy Analysis of iOS Applications
    • Fingerprinting Mobile Devices Using Personalized Configurations
    • Selective Deletion
  • Human Factors in Security and Privacy Group
    • Antivirus Usability
    • Browser Fingerprinting
    • Consistency of CVSS
    • IoT Security Update Labels
    • Phishing Susceptibility
    • Security Experts
    • ZigBee Security Research
  • Information Security Group
  • Multimedia Security
    • Image & Video Forensics
    • Image Analysis & Enhancement
    • X-ray Phase Contrast
    • Blog
    • Code and Data
      • Copy-Move Forgery Detectors and Ground Truth Generator
      • Image Manipulation Dataset
    • Colloquium
  • Security Education Development Group
    • Open C3S Overview
    • Open-C3S-Projektergebnisse
    • Ulix – a Literate OS
  • System Security Group
    • AppAuth: On App-based Matrix Code Authentication in Online Banking
    • AppTAN (In)Security: (In)Security of App-based TAN Methods in Online Banking
    • AVX Crypto: AVX Instructions to Accelerate Crypto Primitives
    • Bispe: A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory
    • Centroid
    • CPU-bound Encryption (TRESOR, TreVisor, ARMORED)
    • FROST: Forensic Recovery Of Scrambled Telephones
    • How Android’s UI Security is Undermined by Accessibility
    • HyperCrypt: Hypervisor-based Encryption of Kernel and User Space
    • N26
    • Nomorp
    • One Key to Rule Them All: Recovering the Master Key from RAM to break Android’s File-Based Encryption
    • RamCrypt: Kernel-based Address Space Encryption for User-mode Processes
    • ReFuzz — Structure Aware Fuzzing of the Resilient File System (ReFS)
    • RISCoT – Security Analysis of Trusted Execution Environments on RISC-V
    • SED (In)Security: Hardware-based Full Disk Encryption (In)Security
    • SGX-Kernel: Isolating Operating System Components with Intel SGX
    • SGX-Timing: Cache Attacks on Intel SGX
    • SoK: The Evolution of Trusted UI on Mobile
    • Soteria: Offline Software Protection within Low-cost Embedded Devices
    • STARK / MARK: Tamperproof/Mutual Authentication to Resist Keylogging
    • TEEshift: Protecting Code Confidentiality by Selectively Shifting Functions into TEEs
    • VMAttack: Deobfuscating Virtualization-Based Packed Binaries
  • Archive
    • ContrOWL: A new security app based on crowed intelligence
    • Ext4 File Recovery
    • Forensic Email Visualization
    • Forensic RAID Recovery
    • Forensig²: File System Images for Training Courses in Forensic Computing
    • Mobile Hotspots
    • Mobile-Sandbox & ADEL: Automated Malware Analyses / Mobile Phone Forensics
    • Privacy Aspects of Forensic Computing
    • PyBox – A Python Sandbox
    • TrustedPals: Framework to Help Establish Security in a Mutually Untrusted Distributed System
    • VirMA: Windows NT pagefile.sys Virtual Memory Analysis
    • Win Vista/7/8/10 Thumbnails Analyzer
  • Funded Projects
  • Publications
    • Technische Berichte in Digitaler Forensik

Information Security Group

Prof. Dr.-Ing.
Michael Tielemann

Michael Tielemann (CISO) Chief Information Officer (CISO)

Department of Computer Science
Chair of Computer Science 1 (IT Security Infrastructures)

Martensstr. 3
91058 Erlangen

Room: Room 12.159
Phone:
+49 9131 85 67650
Email:
michael.tielemann@fau.de
ciso@fau.deWeb: home
Office hours

On demand

The research field of information security encompasses a wide range of topics dealing with the development and improvement of security measures to protect information from threats and attacks. Some of the key topics in information security research are:

  1. Cryptography: Cryptography is a fundamental concept in information security and includes technologies for encrypting data. Research is focused on developing new cryptographic algorithms and protocols that provide more effective and secure encryption technologies.
  2. Security Management: This topic relates to the development of methods and procedures for monitoring and managing security risks and threats. It also includes the development of standards and guidelines for information security management systems.
  3. Network security: Network security includes the study of security threats and risks in networks and the development of methods and technologies for securing networks and preventing attacks on networks.
  4. Data Security: This topic deals with securing data and developing technologies and procedures to prevent data leakage and unauthorized access to data.
  5. Identity and access management: Identity and access management encompasses technologies and processes for managing user identities and access rights. Research in this area deals with the development of technologies for authenticating users and managing access rights.
  6. Forensic Investigations: Forensic investigations relate to the investigation of security breaches and incidents and the development of methods to identify and track attackers.
  7. Mobile security: Mobile security includes securing mobile devices and applications, and developing technologies and procedures to prevent attacks on mobile devices.

An important and central element is the practical information security management system (ISMS) as a structured approach to the management of information security in an organization. It is a framework of processes, procedures, policies and technologies that help ensure and improve information security in an organization.

The goal is to enable a systematic and continuous approach to information security. It aims to ensure that information security in an organization is continuously monitored, evaluated and improved. An ISMS usually includes the following steps:

  1. Establishing information security policies and procedures
  2. Identification of threats and risks to information security
  3. Assessing the impact of security threats and risks on the organization
  4. Development of measures to reduce risk and maintain information security
  5. Implementation and execution of information security measures
  6. Monitoring and evaluating the effectiveness of information security measures
  7. Continuous improvement of information security measures

An ISMS can be based on international standards, such as ISO 27001, to ensure that the organization has implemented information security best practices and has established an effective information security management system. An ISMS is an essential tool to ensure that information security in an organization is continuously improved and kept up to date.

Information security research as a whole is an important field as the increasing reliance on technology and the proliferation of cybercrime are forcing more and more companies and organizations to engage with the latest developments and technologies in information security.

Lehrstuhl für Informatik 1
Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)

Martensstrasse 3
91058 Erlangen
  • Impressum
  • Datenschutz
  • Facebook
  • RSS Feed
  • Twitter
  • Xing
Up