-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Vulnerability Scanning [x]
- Cybersecurity (28)
- Network Security and Applications (28)
- Security Management (23)
- Network Vulnerability Assessment (13)
- Intrusion Detection and Prevention (7)
- Security Risk Assessment and Analysis (6)
- Security Awareness (5)
- Data Security (3)
- Firewalls (3)
- Incident Handling and Response (3)
- Security Planning (3)
- Authentication (2)
- Identity and Access Management (2)
- Information Systems and Services (2)
- Information Technology Management and Leadership (2)
- Open Source (2)
- Policy and Law (2)
- Security Architecture (2)
- Planning (1)
EDUCAUSE Library Items for Vulnerability Scanning
-
Information Security
-
June 14, 2013
This Spotlight focuses on data from the 2012 Core Data Service (CDS) to better understand how higher education institutions approach information security activities. Information provided …
-
Campus-Wide Vulnerability Scanning
-
May 16, 2012
|
A session at the Security Professionals Conference 2012
Scanning a campus network for vulnerabilities and managing the results can be a tedious task. Even a moderately sized network produces too much information to process manually or without a logical …
-
RFP Template for Information Security Projects
-
November 10, 2009
This Request For Proposal template was created to help organizations identify and select a quality security vendor to perform professional services work. It also lists questions organizations sho…
-
Securing Campus Web Applications with Vulnerability Scanning and Web Application Firewalls
-
November 5, 2009
|
A session at the EDUCAUSE 2009 Annual Conference
Web application firewalls (WAFs) and penetration testing are excellent ways to secure your environment while meeting PCI-DSS requirements. This session will focus on our experience with each tool, …
-
Securing Web Applications: A Case Study
-
May 5, 2008
|
A session at the Security 2008
With the ubiquitous nature of web applications, security vulnerabilities are one of the growing areas that are routinely probed and attacked. This session will discuss the selection background and …
-
Building and Maintaining a Successful Vulnerability Assessment and Patch Management Program
-
April 2, 2008
|
A session at the EDUCAUSE Western Regional Conference 2008
The practice of information assurance in a university computing environment requires a well-established patch management system, balanced with a vulnerability assessment process to effectively prot…
-
Network Registration System Scanner
-
January 1, 2004
As of fall 2003, the University of Connecticut network consists of approximately 20,000 hosts, 11,000 of which are in the residential halls. Our commercial Internet link is about 200 Mbps, and th…
-
Lessons Learned from RIT’s First Security Posture Assessment
-
January 1, 2004
Rochester Institute of Technology (RIT) is the 11th largest private university in the United States with approximately 22,500 hosts on our network. We have one of the largest computer science and…
-
Responding to Large Scale Incidents at UFL
-
January 1, 2004
An effective security program has a number of components. The information security program at the University of Florida (UF) has expanded over the past four years in response to the growing issue…
-
Integrating Vulnerability Scanning with Web Authentication
-
January 1, 2004
During fall 2003, a large scale Internet worm (W32.Blaster) exploited a widely known Windows operating system vulnerability throughout academic institutions in the United States. This worm infect…

















