Main Nav

Search results

Showing 1 - 10 of 62 Results

Sort by:

Application Security for Management, Project Managers, and Architects
March 25, 2011

Although Web application security is gradually improving, many project leaders, vendors, and programmers are still unaware of vulnerabilities that can expose confidential institutional data, allo…

Application Security for Developers and Quality Assurance Personnel
March 25, 2011

It is often the case that developers and software vendors are not fully aware of application security vulnerabilities. In many cases, these vulnerabilities can be prevented with training, more co…

Application Security for Database Administrators
March 25, 2011

Applying multi-layer security to protect sensitive or confidential data is the focus of most application security efforts. Inventorying and securing sensitive data and all applications, software …

A Quality Scorecard for the Administration of Online Education Programs
October 5, 2010

As the demands for public accountability increase for the higher education industry, institutions are seeking methods for continuous improvement in which they may demonstrate the level of quality…

Identity Finder Case Study
June 21, 2010

The University of Pennsylvania enacted a comprehensive Social Security Number policy in May of 2007. The stated purpose of the policy was to protect social security numbers by eliminating them, c…

Identity Assurance at Virginia Tech
March 23, 2010

In June, 2008, the Virginia Tech Board of Visitors passed a resolution on increasing administrative efficiencies through expansion of automated systems and enhanced security. The resolution charg…

Enhancing Application Security With a Web Application Firewall
February 17, 2011

UC Irvine has done extensive research in comparing the many different options short of physically testing each appliance. After meeting with each vendor, UC Irvine asked them to send a completed …

Implementing Whole Disk Encryption with Microsoft Windows Vista Bitlocker at the McIntire School of Commerce
October 22, 2008

The McIntire school, as part of a University of Virginia wide effort to eliminate and protect sensitive data, selected Microsoft Windows Vista's bitlocker drive encryption for securing data …

Implementing Information Security Governance Using ISO 27000
March 17, 2011

GSU's CIO sponsored the ISO 27001 certification initiative at Georgia State University in mid 2007 and the Information Security Department and Office of Disbursements were the first GSU depa…

Georgia State University's IT Procurement Review Process--Practical Approach to Assessing Risks of IT Projects
March 17, 2011

In late 2005, the Security Review Policy was adopted by the University, which states "Where appropriate, information security personnel will conduct risk assessments of technologies/processe…

Filter by type

  • Effective Practices [x]
Close
Close


Annual Conference
September 29–October 2
View Proceedings

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

Digital Badges
Member recognition effort
Earn yours >

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.