Skip to content
  • Information Technology
  • Technical University of Munich
Technical University of Munich
  • Home
  • Current News
  • Information & Assistance
    • IT-Support
    • Documentation & Manuals
      • Guidelines
    • Training
      • IT introduction employees
      • IT introduction students
    • Campus Agreements
    • Guidelines & Service Agreements
  • IT Systems & Services
    • TUMonline
      • ... for applicants and students
        • Introductory Courses
      • ... for employees
        • TUMonline Employee Training
      • ... for TUMonline administrators
      • TUMonline Team
        • Keyuser-Bereiche
      • Project Archive
      • Assistance & contacts
    • E-Mail
    • Software & Hardware
    • TUM Account & TUMCard
    • GuestCard
    • Internet
    • Storage & Archiving
    • Clients
    • Computer Workstations & Laptops
    • Media & Design
    • Communication & Collaboration
    • Moodle
    • Library
    • Printing & Scanning
    • Mobile Apps
    • Website Management
    • Event management
    • SAP
    • Central Administration
    • Network
    • Identity Management
    • Servers
    • Certificates
    • Support
    • Schulung & Dokumentation
  • Governance
    • Chief Information Officer (CIO)
    • Information Management Board
    • Digital Transformation Office (DXO)
  • IT Service center
    • Mission
    • Organisation
    • Vergebene Aufträge
  • IT Security
    • Vulnerability Management
    • Awareness campaign
      • 2016 freshman class awareness campaign
    • ... for employees
      • Secure workplace
        • Protection against third-party access
        • Malware protection
        • Protect your data
        • Protecting your user IDs and passwords
        • Protection against malicious USB devices
        • Managing emails
        • Secure surfing
        • Computer infected
      • Mobile devices
        • General security tips for mobile devices
        • Handle with care
        • Protecting devices against third-party access
        • Secure connectivity underway
        • Configuration recommendations for IT administrators
        • Instructions for mobile devices
      • Password
        • Tips for good passwords
        • Tips for protecting your password
        • How to create a good password and remember it
      • Dos and Don'ts
        • Doodle & Co
        • Email retrieval services
        • Forwarding work emails to private mailboxes
        • Centralized IT security reporting
        • Guidelines for using social networks
        • Printer security
          • Illegitimate print-outs using MWN printers
      • Confidential data
        • Definition: confidential data
        • Scenario: Forwarding confidential information via email
        • Scenario: common file storage/file sharing
        • Scenario: Operating your own server
      • Security while travelling
        • Privacy protection
        • Encrypting data
        • Secure connectivity while travelling
        • Additional security tips while travelling
    • ... for students
      • Security for your computer
        • Don't give hackers and viruses a chance
        • Lock your computer
        • Protecting your user IDs and passwords
        • Protect your data
        • Protect yourself against harmful USB sticks
        • Beware of emails from unknown originators
        • Use caution when surfing
        • Computer infected
      • Smartphone & Co
      • Secure connectivity underway
      • Social networks
      • Passwords
      • Dos and Don'ts
        • Doodle & Co
        • Storing TUM passwords in apps and third-party provider services
        • Email retrieval services
    • Instructions and guides
    • Glossary
      • Data encryption – the simple method
      • Phishing e-mails
        • Example list of phishing mails
        • Phishing self-learning test
        • Safety Warning: Dangerous Blackmail Trojan
        • Spear Phishing
      • Social Hacking
      • Protection against tracking
      • Viruses, worms & Co
  • Frequently Asked Questions (FAQ)
    • Stichwortindex
  1. Home
  2. Suche
To top

Informationstechnologie

Technische Universität München
Arcisstr. 21
80333 München

Tel. +49.89.289.17123
it-support(at)tum.de

  • Privacy
  • Imprint
  • Accessibility