-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Intrusion Detection and Prevention [x]
- Cybersecurity (87)
- Network Security and Applications (87)
- Security Management (65)
- Incident Handling and Response (23)
- Data Security (21)
- Security Risk Assessment and Analysis (14)
- Policy and Law (12)
- Security Awareness (12)
- Firewalls (11)
- Information Technology Management and Leadership (11)
- Security Architecture (10)
- Security Planning (10)
- Network Vulnerability Assessment (9)
- Networking and Emerging Technologies (9)
- Federal Policy and Law (8)
- Information Systems and Services (8)
- Identity and Access Management (7)
- Security Implementation (7)
- Vulnerability Scanning (7)
EDUCAUSE Library Items for Intrusion Detection and Prevention
-
Information Security
-
June 14, 2013
This Spotlight focuses on data from the 2012 Core Data Service (CDS) to better understand how higher education institutions approach information security activities. Information provided …
-
Enterprise Content-Aware DLP Solution Comparison and Select Vendor Profiles
-
May 14, 2013
This Gartner report covers content-aware data-loss prevention, which has grown up and is on the verge of becoming a standard part of security architecture. A small set of vendors dominate a major…
-
Spear Phishing: Novel Techniques for Detection and Prevention
-
April 17, 2013
Spear phishing is one of the most serious class of threats that IT security struggles with. While spear phishing attacks are seemingly straightforward, the variability of delivery and infection of …
-
Using Students to Pen Test Your Network (for Credit)
-
April 16, 2013
|
A session at the Security Professionals Conference
We taught CMSC498L, an undergraduate class on penetration testing entitled "Secure Maryland" in spring 2012. The main novelty of the class was that students were able to discover, probe…
-
How Advanced Log Management Can Trump SIEM: Tales of Woe and Glory
-
April 16, 2013
|
A session at the Security Professionals Conference
Network situational awareness is a prerequisite for mature information security operations. Achieving and maintaining a sufficient level of situational awareness is a challenge, often amplified i…
-
Data Custodians, It's 11 p.m.: Do You Know Where Your Confidential Data Is?
-
March 20, 2013
|
A session at the Midwest Regional Conference
Many campuses find that the proliferation and continued storage of confidential data on desktop and laptop computers to be one of their top security risks. In combination with policy and awareness …
-
Can Big Data Help Universities Tackle Security, BYOD?
-
July 31, 2012
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…
-
Podcast: Larry Conrad on IT Security Then and Now
-
July 17, 2012
Larry D. Conrad serves as the vice chancellor for information technology and chief information officer at UNC Chapel Hill. He has over 40 years experience in the field of information technolo…
-
Cybercrime Threats: How Criminals Bypass Security Measures to Steal Your Sensitive Data and Money and Ruin Your Reputation
-
May 16, 2012
|
A session at the Security Professionals Conference 2012
Data breaches and credential/PII theft incidents are becoming more prevalent, and recent red flag rules require heightened data security procedures. Meanwhile, BYOD, social media proliferation, and…
-
Tools and Methods for Managing Snort Sensors in Distributed Environments
-
May 16, 2012
|
A session at the Security Professionals Conference 2012
Intrusion Detection Systems are a valuable component of a security monitoring program; however, they can be expensive to operate, both in terms of equipment/licensing costs and person hours. By mak…

















