-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Intrusion Detection and Prevention [x]
- Cybersecurity (82)
- Network Security and Applications (82)
- Security Management (60)
- Incident Handling and Response (23)
- Data Security (19)
- Security Risk Assessment and Analysis (13)
- Security Awareness (12)
- Policy and Law (11)
- Firewalls (10)
- Information Technology Management and Leadership (9)
- Networking and Emerging Technologies (9)
- Security Architecture (9)
- Security Planning (9)
- Network Vulnerability Assessment (8)
- Federal Policy and Law (7)
- Identity and Access Management (7)
- Information Systems and Services (7)
- Security Implementation (6)
- Vulnerability Scanning (6)
EDUCAUSE Library Items for Intrusion Detection and Prevention
-
Incident Handling: Event Correlation, Response, Reporting, and Planning
-
April 12, 2006
|
A session at the Security 2006
This session will describe the centralized system for event correlation and automated incident response (CECR) used by York University. There will also be a section on the use of incident reporting…
-
Building a Campus DShield
-
April 11, 2006
|
A session at the Security 2006
The DShield project is a component of the Internet Storm Center: host systems submit copies of their firewall logs to a central facility database. This presentation describes how to create a local …
-
The Challenge: Securing a Large Multicampus Network
-
April 11, 2006
|
A session at the Security 2006
Community colleges and smaller universities face unique security challenges due to limited staff. Learn how Pima Community College handled increased security challenges through the implementation o…
-
Mining Flows for Intrusion Data
-
April 11, 2006
|
A session at the Security 2006
Most IP flow collectors are used as evidence lockers, quietly storing records until needed for a forensic investigation, or used for billing and accounting purposes. Much of this data can be mined …
-
Detection and Investigation of Compromised Hosts on Campus Networks
-
April 11, 2006
|
A session at the Security 2006
Cornell University developed a successful methodology to locate, contain, and investigate compromised systems on our networks. We recently extended this methodology to more effectively respond to c…
-
Security Technology Correlation: Next-Generation Architecture for Defending Campus Networks Against Blended Threats
-
April 12, 2006
|
A session at the Security 2006
Although campus networks today deploy multiple security technologies, they are proving to be inadequate when dealing with next-generation blended threats. In this presentation, we will explore how …
-
Surveying the Steps to a Secure Emory University
-
March 28, 2006
This research bulletin summarizes how Emory University used the results of a security survey of higher education institutions to make important, peer-informed decisions on how to secure and prote…
-
The Incident that Brought us Together
-
December 12, 2005
A summary of the incident that brought us together, it's current state and where we are heading in the future. A summary of the incident that brou…
-
Intrusion Detection and Incident Response
-
December 13, 2005
An intrusion detection system (IDS) and security incident response (IR) continue to be a challenge in our community. The budgets for security labor and products in laboratories and centers are smal…
-
The Lasting Impact of Sony's Rootkit
-
January 1, 2005
A summary of the Sony BMG rootkit situation. A summary of the Sony BMG rootkit situation. …

















