-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Security Architecture [x]
- Cybersecurity (48)
- Security Management (48)
- Network Security and Applications (22)
- Security Planning (15)
- Policy and Law (12)
- Campus Policy and Law (10)
- Campus Policies (9)
- Information Technology Management and Leadership (9)
- Intrusion Detection and Prevention (9)
- Security Policies (9)
- Identity and Access Management (8)
- Security Risk Assessment and Analysis (7)
- Security Implementation (6)
- Data Security (5)
- Federal Policy and Law (5)
- Incident Handling and Response (5)
- Information Systems and Services (5)
- Networking and Emerging Technologies (5)
- Security Awareness (5)
EDUCAUSE Library Items for Security Architecture
-
Web Applications: Development Approaches
-
February 14, 2008
IAM and security must be on the same page regarding web application development to facilitate proper access. What coding practices and assessment practices should web developers use? What tools are…
-
Open Source Security Tools at Maricopa Community Colleges
-
January 1, 2004
The Maricopa Community Colleges consist of 10 colleges, two skill centers, and many college satellite centers, including classes being held at the Arizona state prison. More than 200,000 students…
-
Homegrown Wireless LAN Security
-
January 1, 2004
The Penn State network holds more than 100,000 registered hosts, with approximately 200 connecting wirelessly. With the growing demand for wireless (802.11b) access to the Penn State network, we …
-
Caging the Wild ResNet: A Network Architecture That Protects ResNet from Itself
-
May 8, 2007
|
A session at the EDUCAUSE Western Regional Conference 2007
An infected student machine spewing ARP calls chokes a switch and takes down a whole building and generates 40 calls to the help desk. This session will discuss a new network architecture that uses…
-
Responding to Large Scale Incidents at UFL
-
January 1, 2004
An effective security program has a number of components. The information security program at the University of Florida (UF) has expanded over the past four years in response to the growing issue…
-
ISUnet Security Enhancement Plan
-
January 1, 2005
During the fall 2003 and spring 2004 semesters, Illinois State University (like most other higher educational institutions) experienced several major network and email based virus outbreaks that …
-
Open vs. Closed
-
January 1, 2007
Which source is more secure? The debate rages on, but what are the real pros and cons of open or closed operating systems? Which source is more secure?…
-
Information Security Standards: A Developmental Approach
-
March 20, 2007
|
A session at the NERCOMP Annual Conference 2007
The approach used to develop information security standards is key to the success of your security program. See how a cross-university, cross-functional collaborative approach worked for the Connec…
-
IT Architecture in Academia
-
March 13, 2007
|
A session at the EDUCAUSE Midwest Regional Conference 2007
March 13, 2007 MWRC07_159411 …
-
Seminar 09F - Effective IT Security Practices PLEASE NOTE: Separate registration and fee is required to attend this seminar.
-
October 9, 2006
|
A session at the EDUCAUSE 2006 Annual Conference
IT security is a critical issue in higher education. This seminar will focus on network security architectures, infrastructure, data security, incident detection, prevention, and response. A framew…

















