-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Intrusion Detection and Prevention [x]
- Cybersecurity (87)
- Network Security and Applications (87)
- Security Management (65)
- Incident Handling and Response (23)
- Data Security (21)
- Security Risk Assessment and Analysis (14)
- Policy and Law (12)
- Security Awareness (12)
- Firewalls (11)
- Information Technology Management and Leadership (11)
- Security Architecture (10)
- Security Planning (10)
- Network Vulnerability Assessment (9)
- Networking and Emerging Technologies (9)
- Federal Policy and Law (8)
- Information Systems and Services (8)
- Identity and Access Management (7)
- Security Implementation (7)
- Vulnerability Scanning (7)
EDUCAUSE Library Items for Intrusion Detection and Prevention
-
Gone Phishing at Wayne State University: Protecting Your Inbox with Zimbra
-
March 16, 2010
|
A session at the EDUCAUSE Midwest Regional Conference 2010
Wayne State University has successfully minimized risks associated with phishing attacks by integrating the Zimbra ZCS anti-phishing Zimlet and other techniques with its existing technology to incr…
-
Are You Paying Attention to the Character Behind the (Layer 7) Curtain?
-
January 12, 2011
|
A session at the Mid-Atlantic Regional Conference 2011
Many bad guys revised their attack methodology during 2010. Roughly 80% of attacks are now initiated through the web application layer 7 vulnerabilities, yet most higher ed Institutions allocate le…
-
New Cyber Threats Put Higher Education in the Crosshairs
-
October 1, 2010
Cyber criminals and nation states have changed the game in computer attacks. Because of three special characteristics of colleges, they become a favorite target. In this fast-paced briefing you…
-
Using OSSEC Open-Source, Host-Based Intrusion Detection
-
April 13, 2010
|
A session at the Security 2010
OSSEC is a free, open-source, cross-platform, host-based intrusion detection system. The University of Pennsylvania School of Arts and Sciences has used OSSEC for several years. We utilize OSSEC to…
-
Data Loss Prevention - Attacking the Root Cause
-
April 13, 2010
|
A session at the Security 2010
Despite many tools and solutions on the market for the past 10 years, data breaches have continued to increase. Traditional approaches of simply protecting the perimeter are not nearly enough to pr…
-
GULP-Do You Know Who Your Users Are...Really?
-
April 14, 2010
|
A session at the Security 2010
Columbia University uses the "Free Love" method of network IP management. When a machine is plugged into our network, it receives a real (not NAT-ed) IP address. Additionally, we do not u…
-
7 Things You Should Know About DNSSEC
-
January 15, 2010
The Domain Name System (DNS) uses a distributed network of name servers to translate text-based web addresses into IP addresses, directing Internet traffic to proper servers. DNS was built withou…
-
Intrusion Detection: Getting to Know Bro
-
September 14, 2009
The open-source Bro network intrusion detection system provides a flexible framework for high-performance traffic inspection. Bro's extensive application-layer analysis provides deep insight i…
-
NCSAM Resource Kit
-
August 18, 2009
National Cyber Security Awareness Month is an annual effort to increase awareness and prevention of online security problems, spearheaded by the U.S. Department of Homeland Security and the Natio…
-
Improving Security Event Correlation and Analysis Using Intelligent Agents
-
April 22, 2009
|
A session at the Security 2009
Attacks on computer resources are security events that are more complex and difficult to quickly and effectively collect, analyze, and respond to. This presentation will explain how the use of inte…

















