-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Network Vulnerability Assessment [x]
- Cybersecurity (35)
- Security Management (35)
- Network Security and Applications (26)
- Security Risk Assessment and Analysis (14)
- Vulnerability Scanning (13)
- Intrusion Detection and Prevention (8)
- Security Planning (7)
- Incident Handling and Response (6)
- Identity and Access Management (5)
- Information Technology Management and Leadership (5)
- Security Awareness (5)
- Data Security (4)
- Authentication (3)
- Federal Policy and Law (3)
- Policy and Law (3)
- Security Implementation (3)
- Information Systems and Services (2)
- Networking and Emerging Technologies (2)
- Risk Management (2)
EDUCAUSE Library Items for Network Vulnerability Assessment
-
Information Security Program Assessment Tool
-
April 15, 2013
This self-assessment tool was created to evaluate the maturity of higher education information security programs using as a framework the International Organization for Standardization (ISO) 2700…
-
RFP Template for Information Security Projects
-
November 10, 2009
This Request For Proposal template was created to help organizations identify and select a quality security vendor to perform professional services work. It also lists questions organizations sho…
-
Improving Security Event Correlation and Analysis Using Intelligent Agents
-
April 22, 2009
|
A session at the Security 2009
Attacks on computer resources are security events that are more complex and difficult to quickly and effectively collect, analyze, and respond to. This presentation will explain how the use of inte…
-
Building and Maintaining a Successful Vulnerability Assessment and Patch Management Program
-
April 2, 2008
|
A session at the EDUCAUSE Western Regional Conference 2008
The practice of information assurance in a university computing environment requires a well-established patch management system, balanced with a vulnerability assessment process to effectively prot…
-
Network Registration System Scanner
-
January 1, 2004
As of fall 2003, the University of Connecticut network consists of approximately 20,000 hosts, 11,000 of which are in the residential halls. Our commercial Internet link is about 200 Mbps, and th…
-
Collaborative Information Security Project – Vulnerability Assessments
-
January 1, 2004
In 2001, five California community colleges and state universities began collaborating to address mutual security needs through a Title V grant. These institutions first came together as members …
-
Lessons Learned from RIT’s First Security Posture Assessment
-
January 1, 2004
Rochester Institute of Technology (RIT) is the 11th largest private university in the United States with approximately 22,500 hosts on our network. We have one of the largest computer science and…
-
Five-Year Rotating Audit Focus Based on Risk Assessment at Georgia Tech
-
January 1, 2004
Georgia Tech operates one of the most complex networks in the world. The institute has more than 30,000 machines accessing the backbone daily. Most legacy, state-of-the-market, and state-of-the-a…
-
Integrating Vulnerability Scanning with Web Authentication
-
January 1, 2004
During fall 2003, a large scale Internet worm (W32.Blaster) exploited a widely known Windows operating system vulnerability throughout academic institutions in the United States. This worm infect…
-
Honeypots as a Tool to Improve Incident Response Readiness at USP
-
April 12, 2007
|
A session at the Security 2007
A honeypot network was deployed in the main campuses of USP. This presentation will discuss how these honeypots were configured, as well as the initiative's impact on the perception of inciden…

















