Computer Security

Everyone using CERN's IT infrastructure is responsible for the security and protection of the computers they use, the operating systems they run, the applications they install, the programs they write and the data they store, with the assistance of the IT Department and the Computer Security Team.

184 results

Computer Security: When your mike spies on you

Here are two new twists – probably still theoretical, but both pointing towards new ways to spy on you by misusing your microphone…

News
Computing
12 July, 2019

Computer Security: Welcome Summer Students!

In order to make your digital life as comfortable as possible, here are few useful things to know

News
Computing
27 June, 2019

Computer Security: Serious gaming… for your own good

“Serious gaming” is the gamification of training for professional purposes. When you play a serious game, you are actually also improving your knowledge on a particular subject

News
Computing
14 June, 2019

Computer Security: Software Bugs: What if?

Do you know what drugs and proprietary software have in common? You bear the consequences if the product you buy is of mediocre quality

News
Computing
11 June, 2019

Computer Security: Go clever! Go central!

Running your own computing hardware, installation stack, (web) applications, databases, etc., is just not cost effective and usually you won’t be able to commit the required attention to keeping those systems sufficiently secure

News
Computing
28 May, 2019

Computer Security: Browsing securely and privately

Browsing to the wrong webpage is the second major way of getting your laptop, your account and your data compromised

News
Computing
06 May, 2019

Computer Security vs Academic Freedom

The mandate of the CERN Computer Security Team is simple: to protect the reputation and operations of the Organization from cyber risks. But this simple sentence can quickly become complex: what is the risk?

News
Computing
11 April, 2019
Computing
News
11 April, 2019

Computer Security: I love you

While CERN has deployed sophisticated measures in an effort to block malicious e-mails before they even arrive in your inbox, not all of them are filtered out: there might still be some that you can read

News
Computing
03 April, 2019
Computing
News
03 April, 2019

Computer Security: Digital Broken Windows Theory

Let’s keep our Internet presence secure and professional! Let’s apply New York City methods!

News
Computing
18 March, 2019

Computer Security: A "file drop" for confidential data

Why not try CERN IT’s CERNbox service? It encrypts the transmission of documents during the sharing process, avoids the proliferation of copies by offering a single place to deposit a file, and allows revocation of access

News
Computing
01 March, 2019

Computer Security: Fatal dependencies

Are you a hacker? Programmer? Software developer? Coder? Many of us are. And, as intelligent humans, we tend to concentrate on the new and not try to reinvent the wheel

News
Computing
20 February, 2019
Computing
News
20 February, 2019

Computer security: A "file drop" for confidential data

Rather than using e-mail, why not try CERN IT’s CERNbox service?

News
Computing
25 February, 2019