University Professorship (W3) in Data Protection and Compliance
University Professorship (W3) in Forensic Methods and IT Security
The development and procurement of complex software systems must comply with legal and sector-specific regulations, which must already
be taken into account during the requirements analysis and planning stage. Ultimately, proof of compliance must also be demonstrated, e.g.,
by means of a certification.
The Professorship in Data Protection and Compliance focuses on the methods and tools needed for the technical implementation of
requirements resulting from, for example, the European General Data Protection Regulation and the new German IT Security Act, and it will
also develop IT concepts for the implementation of the privacy-by-design paradigm.
In order to fully investigate and resolve security incidents, evidence must be gathered and analyzed while maintaining the integrity of the
chain of custody. In order to deal with sophisticated attacks that are increasingly leaving fewer traces in compromised IT systems, the
concealment of traces, the use of encryption and, for example, requirements regarding the automation and the scalability of digital forensics,
the Professorship will research new approaches to analyzing the main and background memories of mobile and stationary systems as well as
networked applications, among others topics.
The situation assessment and documentation in cyber space as a basis for planning and decision processes can no longer be completely
achieved using dedicated sensors and traditional reporting channels. Instead, the analysis of public sources, such as social media and internet
communities, has become crucial to ensure the timeliness and correct focus of situation reports.
The Professorship in Open Source Intelligence and Situation Assessment will develop methods for continuous information gathering in networked
environments using experience and findings from previous operations, as well as methods to compile clear and concise situation reports.
As users often act carelessly with their personal data and internet providers frequently favor commercial interests over protective measures,
it is becoming easier and less risky for organized crime to commit, among other things, identity theft.
The Professorship in Privacy Enhancing Technologies will research new approaches to eliminate or at least minimize the unnecessary or
unwanted disclosure of information during the use of networked applications and to ensure that stored data is not analyzed and forwarded
to third parties without user consent.
Programming errors, insufficient adaptation to new operating environments, and negligent use of IT systems often lead to vulnerabilities that
allow attackers to obtain unauthorized access to processed data or even take control of entire systems.
The Professorship in IT Vulnerability and Security Testing will deal with the systematic handling of such vulnerabilities in IT systems and testing
methods for their identification and assessment, so that, for instance, penetration tests of networked applications can be employed to
determine areas in which the security levels need to be improved.
The security of software crucially depends on the priority assigned to information security attributes during the requirements analysis,
system design, and programming as well as the associated testing and approval procedures.
In the Professorship in Secure Software Development, the two disciplines of software engineering and security engineering overlap. It deals
with methods, algorithms, and tools required for the implementation of software according to the secure-by-design, secure-by-default, and
Information security and data protection necessitate the implementation and use of technical mechanisms that are too complex to apply
for many users. E-mail encryption procedures, for instance, have only been utilized by IT experts for decades because the time and effort
necessary for their use is much too high compared to their subjective benefits.
The Professorship in Usable Security and Privacy will investigate user-friendly approaches to security and data protection procedures and
to the implementation of graphical interfaces for human-computer interaction in order to enhance the usability and therefore ensure the
extensive employment of important protective measures.
The Universität der Bundeswehr München offers academic programs directed primarily at Officer Candidates and Officers, who can obtain
Bachelor‘s and Master‘s degrees within a trimester system. Depending on spare capacity, civilian students are allowed to enroll. The study
course is complemented by interdisciplinary elements in an integrated program entitled „studium plus“.
Preconditions of employment and the legal duty positioning of Professors are based upon the “Bundesbeamtengesetz”. Employment as a
“Beamtin/Beamter” requires that the candidate is not older than 50 at the date of appointment.
The University seeks to increase the number of female Professors and thus explicitly invites women to submit applications. Severely disabled
candidates with equal qualifications will receive preferential consideration.
Please submit your application documents marked as Confidential Personnel Matter to the Department Head of the Computer Science
Department at the Universität der Bundeswehr München, 85577 Neubiberg, by October 15th, 2016.
University Professorship (W3) in Privacy Enhancing Technologies
University Professorship (W3) in Open Source Intelligence and Situation Assessment
University Professorship (W3) in IT Vulnerability Management and Security Testing
University Professorship (W3) in Secure Software Development
University Professorship (W3) in Usable Security and Privacy