-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Intrusion Detection and Prevention [x]
- Cybersecurity (82)
- Network Security and Applications (82)
- Security Management (60)
- Incident Handling and Response (23)
- Data Security (19)
- Security Risk Assessment and Analysis (13)
- Security Awareness (12)
- Policy and Law (11)
- Firewalls (10)
- Information Technology Management and Leadership (9)
- Networking and Emerging Technologies (9)
- Security Architecture (9)
- Security Planning (9)
- Network Vulnerability Assessment (8)
- Federal Policy and Law (7)
- Identity and Access Management (7)
- Information Systems and Services (7)
- Security Implementation (6)
- Vulnerability Scanning (6)
EDUCAUSE Library Items for Intrusion Detection and Prevention
-
Moran Technology Consulting and California State University, Northridge - Abandoned Processes and Orphaned Servers: Lessons Learned and Applied on the Frontline
-
April 12, 2007
|
A session at the Security 2007
Most organizations have unmanaged servers. Some of these systems are scattered throughout campus, beyond the reach of central IT. Others exist inside the central campus data center. Regardless, the…
-
ForeScout Technologies and Queens College/CUNY - Access Security in a De-Parameterized World
-
April 11, 2007
|
A session at the Security 2007
Campuses continue to face a unique set of challenges in securing networks, defending against hackers and self-propagating malware, managing "unmanaged" devices, and ensuring business cont…
-
Border Patrol: Access Denied!
-
March 14, 2007
|
A session at the EDUCAUSE Midwest Regional Conference 2007
The University of Notre Dame has recently changed its network border policy to deny most unsolicited network traffic from the Internet. A small set of services like the Web, secure shell, VPN, and …
-
Final Report of the 2005 Cybersecurity Summit
-
January 1, 2005
This is the final report for the NSF Cybersecurity Summit, held December 12-13, 2005, in Tysons Corner, VA. The fourth document is NSF's feedback on the 2005 Cybersecurity Summit final re…
-
Spam Blocking Poll
-
January 1, 2006
Results of an informal Spam blocking poll from the EDUCAUSE CIO discussion list. Results of an informal Spam blocking poll from the EDUCAUSE CIO discus…
-
How to Successfully Defend Against IRC Bots, Compromises, and Information Leaks
-
October 12, 2006
|
A session at the EDUCAUSE 2006 Annual Conference
IRC "bots," Trojan horses, rootkits, "zero day" threats, compromised PCs . . . sound familiar? These threats can result in sensitive data exposures, not to mention the hassles o…
-
Ensure IT's Quality, Ensure IT's Security, or Throw IT Out!
-
October 11, 2006
|
A session at the EDUCAUSE 2006 Annual Conference
This presentation on application hacking and programming blunders that compromise security will be an eye-opening session for IT professionals at all levels. We will demonstrate and explain common …
-
Seminar 09F - Effective IT Security Practices PLEASE NOTE: Separate registration and fee is required to attend this seminar.
-
October 9, 2006
|
A session at the EDUCAUSE 2006 Annual Conference
IT security is a critical issue in higher education. This seminar will focus on network security architectures, infrastructure, data security, incident detection, prevention, and response. A framew…
-
Trends in Malicious Code on the Internet
-
January 1, 2006
The presentation will identify the FBI's role in combating malicious code outbreaks and investigating computer intrusion incidents, as well as the objectives of malware analysis. The malicio…
-
A Tale of Two Tracks: Social Engineering Your Students and Detecting Bots with DNS
-
January 1, 2006
High-speed connections and lots of personal computers make campus networks target-rich environments for malware and botnet recruitment. Without a policy enforcement tool to manage student connect…

















