-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Network Vulnerability Assessment [x]
- Cybersecurity (36)
- Security Management (36)
- Network Security and Applications (27)
- Security Risk Assessment and Analysis (14)
- Vulnerability Scanning (13)
- Intrusion Detection and Prevention (9)
- Security Planning (7)
- Incident Handling and Response (6)
- Identity and Access Management (5)
- Information Technology Management and Leadership (5)
- Security Awareness (5)
- Data Security (4)
- Authentication (3)
- Federal Policy and Law (3)
- Policy and Law (3)
- Security Implementation (3)
- Information Systems and Services (2)
- Networking and Emerging Technologies (2)
- Risk Management (2)
EDUCAUSE Library Items for Network Vulnerability Assessment
-
Honeypots as a Tool to Improve Incident Response Readiness at USP
-
April 12, 2007
|
A session at the Security 2007
A honeypot network was deployed in the main campuses of USP. This presentation will discuss how these honeypots were configured, as well as the initiative's impact on the perception of inciden…
-
Network Monitoring with Nagios
-
April 11, 2007
|
A session at the Security 2007
Nagios is a freely available open source network and host monitoring tool. This presentation will discuss using Nagios in an academic environment to monitor servers, detect network problems, and al…
-
Monkey-in-the-Middle Attacks on Campus Networks
-
April 12, 2007
|
A session at the Security 2007
Although monkey-in-the-middle (MITM) attacks are well-known, little is done to prevent them. We'll give examples of MITM attacks against SSL Web sites, Kerberos, and SSH, all using free tools …
-
Making the Campus Web Safer, One Application at a Time
-
April 11, 2007
|
A session at the Security 2007
A year ago, UT Austin identified Web application security as an important initiative for developers. As part of that initiative, UT developed an application security curriculum focused on the Open …
-
Sensitive Information Sweep Using Cornell's Spider
-
April 11, 2007
|
A session at the Security 2007
Colorado State University and the University of Colorado each chose Cornell University's Spider search utility to find sensitive information on Windows, OSX, Linux, and Solaris computers. Work…
-
Unauthenticated Authentication: Null Bytes and the Affect on Web-based
-
January 1, 2006
This paper describes a vulnerability that may affect web-based applications that insecurely implement LDAP simple binds for the authentication of users. Web-based applications that fail to properly…
-
CyberCIEGE
-
January 13, 2010
CyberCIEGE enhances cyber security education and training through an extensible resource management video game similar to SimCity™ and RollerCoaster Tycoon®. In the CyberCIEGE virtual world, p…
-
Ensure IT's Quality, Ensure IT's Security, or Throw IT Out!
-
October 11, 2006
|
A session at the EDUCAUSE 2006 Annual Conference
This presentation on application hacking and programming blunders that compromise security will be an eye-opening session for IT professionals at all levels. We will demonstrate and explain common …
-
A Tale of Two Tracks: Social Engineering Your Students and Detecting Bots with DNS
-
January 1, 2006
High-speed connections and lots of personal computers make campus networks target-rich environments for malware and botnet recruitment. Without a policy enforcement tool to manage student connect…
-
Automated Network Isolation at Indiana University
-
April 11, 2006
|
A session at the Security 2006
This presentation will describe the recent network isolation mechanism put in place at Indiana University. The project provides a means of automatically or manually isolating a device by IP address…
















