Course on IT security for undergraduate students
Saturday, 15 Mar 2025
Course on basics of digital forensics
Saturday, 15 Mar 2025
Course on information security for undergraduate students
Sunday, 01 Oct 2023
The “Studying in the United Kingdom” project provided financial support for German and British students to stay abroad after Brexit. The funds was essentially used to enable OTH Amberg-Weiden students to take part in the annual summer school “International Perspectives on Cybercrime and Cybersecurity” at the University of Strathclyde in Glasgow as well as further stays at the other Scottish partner universities (Abertay University in Dundee, University of Aberdeen). In addition, students from the above-mentioned Scottish universities received financial support if they took part in the annual security summer school in Amberg.
Wednesday, 22 Jun 2022
The project “Intelligent Security for Electric Actuators and Power Converters in Critical Infrastructures” (iSEC) was funded by the Bavarian Ministry of Economic Affairs, Regional Development and Energy. Together with the two industrial partners, SIPOS Aktorik GmbH and Grass Power Electronics GmbH, we worked on security solutions specifically for embedded systems with limited resources. The products of both companies are used in critical infrastructures. The electric actuators for industrial valves from SIPOS Aktorik GmbH are used in power stations, sewage treatment plants and pumping stations, for example. Grass Power Electronics GmbH develops power electronic systems for electrical energy supply. The systems manage photovoltaic systems, battery storage and charging stations for electric vehicles, e.g., and connect the local power grids to the public power grid through intelligent feed-in management. The goal of the three-year research project was to develop comprehensive and resource-efficient security solutions for embedded systems and thus contribute to the protection of critical infrastructures. Based on a threat and risk analysis, various concepts with hardware and/or software solutions were initially created in order to estimate the achievable security level in each case. Specific solutions were then developed to ensure system integrity, user authentication and secure communication. The validation of the individual as well as the combination of the developed security measures, both by the project partners and by external project partners and external institutes rounded off the project.
Thursday, 01 Aug 2019