-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Intrusion Detection and Prevention [x]
- Cybersecurity (82)
- Network Security and Applications (82)
- Security Management (60)
- Incident Handling and Response (23)
- Data Security (19)
- Security Risk Assessment and Analysis (13)
- Security Awareness (12)
- Policy and Law (11)
- Firewalls (10)
- Information Technology Management and Leadership (9)
- Networking and Emerging Technologies (9)
- Security Architecture (9)
- Security Planning (9)
- Network Vulnerability Assessment (8)
- Federal Policy and Law (7)
- Identity and Access Management (7)
- Information Systems and Services (7)
- Security Implementation (6)
- Vulnerability Scanning (6)
EDUCAUSE Library Items for Intrusion Detection and Prevention
-
Final Cybersecurity Summit Report
-
January 1, 2004
This is the final report for the NSF Cybersecurity Summit, held September 27-28, 2004, in Arlington, VA. This is the final report for the NSF Cybersecu…
-
Final Report of the Computer Incident Factor Analysis and Categorization (CIFAC) Project: Volume I: College and University Sample
-
January 1, 2005
This study provides information about 319 computer-related incidents that occurred in 36 colleges and universities within the past two years. Researchers sought to bring a broader institutional fo…
-
Security Breaches: Notification, Treatment, and Prevention
-
January 1, 2005
© 2005 Rodney Petersen EDUCAUSE Review, vol. 40, no. 4 (July/August 2005): 78–79. Security Breaches: Notification, Treatment, and Prevention Rodney Petersen Rodney Peter…
-
How Technology, People, and Processes Converged to Achieve a 95 Percent Reduction in Security Incidents!
-
June 6, 2005
|
A session at the EDUCAUSE Southeast Regional Conference 2005
At one point, our campus averaged 20 to 40 security incidents a day. In 2004, we implemented several new solutions and practices that have made a big impact. We will discuss how implementing effect…
-
Seminar 01A - Effective Cybersecurity Practices for Higher Education
PLEASE NOTE: Separate registration and fee are required to attend this seminar.
-
June 6, 2005
|
A session at the EDUCAUSE Southeast Regional Conference 2005
This seminar will provide an overview of the elements of an information security program in the areas of policy and governance, management and operations, and technology. It will emphasize practic…
-
Use of a Third-Generation Firewall at a Small College
-
May 16, 2005
What are the three generations of firewalls? Why use a third generation (application-level) firewall? See how a small college configured and uses Microsoft Internet Security and Acceleration (ISA) …
-
Firewalls, VPNs, and Intrusion Detection Systems in a University Environment
-
May 17, 2005
Notre Dame has developed and implemented a data center firewall, administrative VPN, server host firewalls, and network and host intrusion detection as part of a layered approach to network and sys…
-
Virtual Attack Detection and Visualization Sensors: A Concept for Self-Healing Honeynets
-
April 4, 2005
|
A session at the Security 2005
Honeynets have proven to be valuable to many universities; however, they can be too time-consuming for many IT security organizations. A self-healing distributed honeynet can maximize the intellige…
-
Who Owns Your Network? A Discussion of Bot Networks
-
April 4, 2005
|
A session at the Security 2005
As virus outbreaks become more sophisticated and coordinated, it is essential that our detection and remediation processes advance as well. Learn how to detect and investigate infected machines bef…
-
Modern Incident Response Tools and Techniques
-
April 4, 2005
|
A session at the Security 2005
In recent times, technologies such as rootkits have sought to undermine the abilities of an incident responder to detect intrusion. This talk will address the technology behind these obfuscation te…

















