-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Intrusion Detection and Prevention [x]
- Cybersecurity (82)
- Network Security and Applications (82)
- Security Management (60)
- Incident Handling and Response (23)
- Data Security (19)
- Security Risk Assessment and Analysis (13)
- Security Awareness (12)
- Policy and Law (11)
- Firewalls (10)
- Information Technology Management and Leadership (9)
- Networking and Emerging Technologies (9)
- Security Architecture (9)
- Security Planning (9)
- Network Vulnerability Assessment (8)
- Federal Policy and Law (7)
- Identity and Access Management (7)
- Information Systems and Services (7)
- Security Implementation (6)
- Vulnerability Scanning (6)
EDUCAUSE Library Items for Intrusion Detection and Prevention
-
McAfee and Georgia State University - Taking Aim at Network Intruders with Intrushield's Intrusion Prevention System
-
May 6, 2008
|
A session at the Security 2008
McAfee and Georgia State University have enjoyed a successful association since 2005 in optimizing the university's use of the Intrushield intrusion prevention system. Join us for a discussion…
-
Best Practices for Windows Desktop Security
-
March 18, 2008
|
A session at the EDUCAUSE Midwest Regional Conference 2008
Windows desktops are widely deployed and can be subject to multiple attack vectors. Windows 2000, XP, and Vista have vulnerabilities that should be mitigated effectively by network security teams o…
-
Border Patrol: Access Denied!
-
October 25, 2007
|
A session at the EDUCAUSE 2007 Annual Conference
The University of Notre Dame recently changed its network border policy to deny most unsolicited network traffic from the Internet. A small set of services like the Web, secure shell, and VPN are a…
-
Stop, Drop, and Roll: Prevent and Douse Cyber Incidents
-
October 24, 2007
|
A session at the EDUCAUSE 2007 Annual Conference
Presenting two best-practice models for cyber incidents: To prevent cyber incidents, learn how to use an uncomplicated cyber risk assessment to help you focus your institution's limited resour…
-
Chief Information Officers Speak Out
-
October 12, 2007
Five experienced CIOs discuss security, staffing, and how they respond to changing technology on campus. Five experienced CIOs discuss security, …
-
Open Source Security Tools at Maricopa Community Colleges
-
January 1, 2004
The Maricopa Community Colleges consist of 10 colleges, two skill centers, and many college satellite centers, including classes being held at the Arizona state prison. More than 200,000 students…
-
Caging the Wild ResNet: A Network Architecture That Protects ResNet from Itself
-
May 8, 2007
|
A session at the EDUCAUSE Western Regional Conference 2007
An infected student machine spewing ARP calls chokes a switch and takes down a whole building and generates 40 calls to the help desk. This session will discuss a new network architecture that uses…
-
Responding to Large Scale Incidents at UFL
-
January 1, 2004
An effective security program has a number of components. The information security program at the University of Florida (UF) has expanded over the past four years in response to the growing issue…
-
Snorting and Sguiling with Glee: More Than Just IDS Alerts for No Extra Money!
-
April 11, 2007
|
A session at the Security 2007
Ideally, an intrusion detection system (IDS) should provide sufficient information for an analyst to take immediate action rather than having to manually correlate alerts and gather additional data…
-
Monkey-in-the-Middle Attacks on Campus Networks
-
April 12, 2007
|
A session at the Security 2007
Although monkey-in-the-middle (MITM) attacks are well-known, little is done to prevent them. We'll give examples of MITM attacks against SSL Web sites, Kerberos, and SSH, all using free tools …

















