-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Security Architecture [x]
- Cybersecurity (49)
- Security Management (49)
- Network Security and Applications (23)
- Security Planning (16)
- Policy and Law (13)
- Campus Policy and Law (10)
- Information Technology Management and Leadership (10)
- Intrusion Detection and Prevention (10)
- Campus Policies (9)
- Security Policies (9)
- Identity and Access Management (8)
- Security Implementation (7)
- Security Risk Assessment and Analysis (7)
- Data Security (6)
- Federal Policy and Law (6)
- Information Systems and Services (6)
- Incident Handling and Response (5)
- Networking and Emerging Technologies (5)
- Security Awareness (5)
EDUCAUSE Library Items for Security Architecture
-
Enterprise Content-Aware DLP Solution Comparison and Select Vendor Profiles
-
May 14, 2013
This Gartner report covers content-aware data-loss prevention, which has grown up and is on the verge of becoming a standard part of security architecture. A small set of vendors dominate a major…
-
Information Security Program Assessment Tool
-
April 15, 2013
This self-assessment tool was created to evaluate the maturity of higher education information security programs using as a framework the International Organization for Standardization (ISO) 2700…
-
Mobile Computing: Safe or Sorry?
-
October 13, 2010
|
A session at the EDUCAUSE 2010 Annual Conference
With the ever-increasing use of mobile devices of all kinds on campus to access all applications-and the expectation that security will be handled by IT-what are the issues that IT professionals fa…
-
Mastering Puppet: Using Puppet to Centrally Manage IT Security Infrastructure
-
April 13, 2010
|
A session at the Security 2010
As our IT security infrastructure expands and becomes more complex, it can be a challenge to maintain consistent configuration and architecture across all components. Puppet is a free, open-source …
-
Enterprise Information Security Program
-
March 26, 2009
The University of Iowa’s program for information security is a combination of policy, security architecture modeling, and descriptions of current IT security services and control practices. …
-
Virtualization and Security Architecture
-
April 22, 2009
|
A session at the Security 2009
Virtualization has crept into the corners of every organization while the security team wasn't looking. Now many groups are attempting to standardize those backroom deployments and are having …
-
Information Confidentiality
-
March 11, 2009
Protecting information confidentiality is a critical security objective for all colleges and universities. Institutions must deploy confidentiality controls in addition to security controls, and…
-
Cybersecurity Research Challenges
-
May 8, 2008
Today's most prevalent and widely discussed attacks exploit code-level flaws such as buffer overruns and type-invalid input. We need to anticipate tomorrow's attacks and think beyond buff…
-
Newspeak: A Paradigm for Architectural Security
-
May 7, 2008
Most computer security problems arise from buggy code. It seems clear that writing large, bug-free programs is and will remain beyond our abilities. We propose a different goal: protecting what rea…
-
Security Uncertainty: What Matters, Motivates, and Moves!
-
May 6, 2008
|
A session at the Security 2008
Good security requires good communications and understanding. It is key to agree on effective and efficient processes and technologies that implement security controls. How do we get senior adminis…

















