IT Security / Information Engineering
... looks into questions such as ...
- How can information be represented, saved, transmitted and processed?
- Which system (Internet, computer networks, mobile phones, cars etc.) vulnerabilities are there and when are systems vulnerable?
- How do complex IT systems stay safe in accordance with pre-defined safety objectives (privacy, integrity, authenticity, anonymity)?
- How do cryptographic processes work (e.g. data encryption, digital signatures) and how are they implemented?
- How can systems be protected against hacker attacks?