-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Intrusion Detection and Prevention [x]
- Cybersecurity (87)
- Network Security and Applications (87)
- Security Management (65)
- Incident Handling and Response (23)
- Data Security (21)
- Security Risk Assessment and Analysis (14)
- Policy and Law (12)
- Security Awareness (12)
- Firewalls (11)
- Information Technology Management and Leadership (11)
- Security Architecture (10)
- Security Planning (10)
- Network Vulnerability Assessment (9)
- Networking and Emerging Technologies (9)
- Federal Policy and Law (8)
- Information Systems and Services (8)
- Identity and Access Management (7)
- Security Implementation (7)
- Vulnerability Scanning (7)
EDUCAUSE Library Items for Intrusion Detection and Prevention
-
How to Successfully Defend Against IRC Bots, Compromises, and Information Leaks
-
October 12, 2006
|
A session at the EDUCAUSE 2006 Annual Conference
IRC "bots," Trojan horses, rootkits, "zero day" threats, compromised PCs . . . sound familiar? These threats can result in sensitive data exposures, not to mention the hassles o…
-
Ensure IT's Quality, Ensure IT's Security, or Throw IT Out!
-
October 11, 2006
|
A session at the EDUCAUSE 2006 Annual Conference
This presentation on application hacking and programming blunders that compromise security will be an eye-opening session for IT professionals at all levels. We will demonstrate and explain common …
-
Seminar 09F - Effective IT Security Practices PLEASE NOTE: Separate registration and fee is required to attend this seminar.
-
October 9, 2006
|
A session at the EDUCAUSE 2006 Annual Conference
IT security is a critical issue in higher education. This seminar will focus on network security architectures, infrastructure, data security, incident detection, prevention, and response. A framew…
-
Trends in Malicious Code on the Internet
-
January 1, 2006
The presentation will identify the FBI's role in combating malicious code outbreaks and investigating computer intrusion incidents, as well as the objectives of malware analysis. The malicio…
-
A Tale of Two Tracks: Social Engineering Your Students and Detecting Bots with DNS
-
January 1, 2006
High-speed connections and lots of personal computers make campus networks target-rich environments for malware and botnet recruitment. Without a policy enforcement tool to manage student connect…
-
Incident Handling: Event Correlation, Response, Reporting, and Planning
-
April 12, 2006
|
A session at the Security 2006
This session will describe the centralized system for event correlation and automated incident response (CECR) used by York University. There will also be a section on the use of incident reporting…
-
Building a Campus DShield
-
April 11, 2006
|
A session at the Security 2006
The DShield project is a component of the Internet Storm Center: host systems submit copies of their firewall logs to a central facility database. This presentation describes how to create a local …
-
The Challenge: Securing a Large Multicampus Network
-
April 11, 2006
|
A session at the Security 2006
Community colleges and smaller universities face unique security challenges due to limited staff. Learn how Pima Community College handled increased security challenges through the implementation o…
-
Mining Flows for Intrusion Data
-
April 11, 2006
|
A session at the Security 2006
Most IP flow collectors are used as evidence lockers, quietly storing records until needed for a forensic investigation, or used for billing and accounting purposes. Much of this data can be mined …
-
Detection and Investigation of Compromised Hosts on Campus Networks
-
April 11, 2006
|
A session at the Security 2006
Cornell University developed a successful methodology to locate, contain, and investigate compromised systems on our networks. We recently extended this methodology to more effectively respond to c…

















