-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Vulnerability Scanning [x]
- Cybersecurity (27)
- Network Security and Applications (27)
- Security Management (22)
- Network Vulnerability Assessment (13)
- Intrusion Detection and Prevention (6)
- Security Awareness (5)
- Security Risk Assessment and Analysis (5)
- Incident Handling and Response (3)
- Security Planning (3)
- Authentication (2)
- Data Security (2)
- Firewalls (2)
- Identity and Access Management (2)
- Information Systems and Services (2)
- Open Source (2)
- Policy and Law (2)
- Security Architecture (2)
- Information Technology Management and Leadership (1)
- Planning (1)
EDUCAUSE Library Items for Vulnerability Scanning
-
Making the Campus Web Safer, One Application at a Time
-
April 11, 2007
|
A session at the Security 2007
A year ago, UT Austin identified Web application security as an important initiative for developers. As part of that initiative, UT developed an application security curriculum focused on the Open …
-
Sensitive Information Sweep Using Cornell's Spider
-
April 11, 2007
|
A session at the Security 2007
Colorado State University and the University of Colorado each chose Cornell University's Spider search utility to find sensitive information on Windows, OSX, Linux, and Solaris computers. Work…
-
Unauthenticated Authentication: Null Bytes and the Affect on Web-based
-
January 1, 2006
This paper describes a vulnerability that may affect web-based applications that insecurely implement LDAP simple binds for the authentication of users. Web-based applications that fail to properly…
-
A Tale of Two Tracks: Social Engineering Your Students and Detecting Bots with DNS
-
January 1, 2006
High-speed connections and lots of personal computers make campus networks target-rich environments for malware and botnet recruitment. Without a policy enforcement tool to manage student connect…
-
SafetyNet: An Open Source, Self-Service, Proactive Security Scanner
-
April 11, 2006
|
A session at the Security 2006
SafetyNet, an open source, Web-based application framework, allows authorized users to proactively scan individual and groups of computer systems for security vulnerabilities. Learn how Virginia Te…
-
Mining Flows for Intrusion Data
-
April 11, 2006
|
A session at the Security 2006
Most IP flow collectors are used as evidence lockers, quietly storing records until needed for a forensic investigation, or used for billing and accounting purposes. Much of this data can be mined …
-
Surveying the Steps to a Secure Emory University
-
March 28, 2006
This research bulletin summarizes how Emory University used the results of a security survey of higher education institutions to make important, peer-informed decisions on how to secure and prote…
-
SunGard Collegis Inc. - Spooks in the Machine: Proactive Strategies for Securing Your Network
-
April 5, 2005
|
A session at the Security 2005
With the rise of spam, spyware, and viruses, the push is on to develop strategies to better protect our institutions. From aligning security goals with institutional objectives, to security assessm…
-
Fences Make Good Neighbors: Policing and Protecting Academic Networks
-
March 7, 2005
|
A session at the NERCOMP Annual Conference 2005
While there are many tools to protect your network (virus scanners, firewalls), worms still find a way to get in. We have designed an all-in-one tool to address worm detection, isolation, system sc…
-
Perfigo, Inc./Cisco Systems, Inc., An EDUCAUSE Platinum Partner - Cleaning Dirty Machines and Other Tales at the Network Edge
-
January 13, 2005
|
A session at the EDUCAUSE Mid-Atlantic Regional Conference 2005
Last year worms wreaked paths of destruction across universities and colleges. Determined to avert a similar scenario this fall, several universities installed CleanMachines, a system that scans in…

















