-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Intrusion Detection and Prevention [x]
- Cybersecurity (82)
- Network Security and Applications (82)
- Security Management (60)
- Incident Handling and Response (23)
- Data Security (19)
- Security Risk Assessment and Analysis (13)
- Security Awareness (12)
- Policy and Law (11)
- Firewalls (10)
- Information Technology Management and Leadership (9)
- Networking and Emerging Technologies (9)
- Security Architecture (9)
- Security Planning (9)
- Network Vulnerability Assessment (8)
- Federal Policy and Law (7)
- Identity and Access Management (7)
- Information Systems and Services (7)
- Security Implementation (6)
- Vulnerability Scanning (6)
EDUCAUSE Library Items for Intrusion Detection and Prevention
-
Security Compliance on Unmanaged Student Computers
-
April 4, 2005
|
A session at the Security 2005
Universities everywhere wrestle with ensuring protection against malware for student-owned (ResNet) computers so that they don't threaten the university. This presentation reviews two approach…
-
Network Registration and Intrusion Prevention Services Implementation at Emory University
-
April 4, 2005
|
A session at the Security 2005
Campus-wide virus infestation in the fall of 2003 prompted Emory to minimize the effects of future virus infections through two major risk-mitigation projects, Network Registration and Intrusion Pr…
-
Streamlining IP Registrant Identification, Notification, and Blocking for Threats in the Wild
-
April 4, 2005
|
A session at the Security 2005
The Indiana University IT Policy Office has developed an automated system to identify users associated with devices affected by recurrent and persistent threats on the campus network. Given a date,…
-
SunGard Collegis Inc. - Spooks in the Machine: Proactive Strategies for Securing Your Network
-
April 5, 2005
|
A session at the Security 2005
With the rise of spam, spyware, and viruses, the push is on to develop strategies to better protect our institutions. From aligning security goals with institutional objectives, to security assessm…
-
Internet Traffic Analysis for Threat Detection
-
March 22, 2005
|
A session at the EDUCAUSE Midwest Regional Conference 2005
Ohio University is developing tools and procedures for analyzing network border traffic. These tools are part of an ongoing effort to safeguard against unwanted or dangerous Internet traffic. The s…
-
Protecting Residence Hall Networks Using NetReg and Nessus
-
March 21, 2005
|
A session at the EDUCAUSE Midwest Regional Conference 2005
This presentation will describe how to extend the NetReg system to preemptively scan untrusted hosts to determine patch level before granting full network access. It will also describe how to provi…
-
Combining Policy, Practice, and Technology to Architect Layered Network Security at UMBI
-
January 13, 2005
|
A session at the EDUCAUSE Mid-Atlantic Regional Conference 2005
UMBI's implementation of a multi-layered network security environment is explored as one possible model for use by other organizations. This presentation will discuss the need for and limitati…
-
Knock, Knock, Knocking on (Network) Doors: Penn State's Intrusion Detection Architecture
-
January 1, 2004
The session will examine in detail Penn State's intrusion detection architecture. Both the early "learning curve" adventures and the currently deployed implementation will be explore…
-
Empowering Users with a Proactive Security Strategy
-
January 1, 2004
Rutgers University Computing Services provides users a four-tiered defense in-depth strategy: planning, prevention, detection, and reaction and recovery. The merging of vulnerability scanning data …
-
Balancing the Need for Security and Open, Collaborative Networking
-
January 1, 2004
The EDUCAUSE Center for Applied Research (ECAR) study of IT security in higher education portrays an industry that is struggling to secure a culturally open environment against the rising tide of…

















