Main Nav

Search results

Showing 1 - 10 of 54 Results

Sort by:

Open Wikis and the Protection of Institutional Welfare
February 7, 2012

Much has been written about wikis’ reliability and use in the classroom. This research bulletin addresses the negative impacts on institutional welfare that can arise from participating in a…

Mobile Internet Device Security Guidelines
June 29, 2011

This document is designed to help you develop mobile Internet device security policy, standards, guidelines or procedures. It is organized into steps you can follow to define your objectives …

How Secure Is Your Information?
March 30, 2011 | A session at the NERCOMP Annual Conference 2011

This dynamic session will provide a brief overview of the information security standards institutions must comply with in order to provide data security. The program will include some live demonstr…

Root Compromise: A Spammer Hiding in Plain Sight
April 21, 2009 | A session at the Security 2009

This presentation will walk through an incident where a spammer obtained root on a major departmental server and used it to inject spam material into the site's web pages, as well as describe …

FTC SPAM Summit Explores Next Generation of Threats and Solutions
July 24, 2007

The Federal Trade Commission recently hosted a Spam Summit that focused on the next generation of threats and solutions.   The workshop brought together experts from the business, gover…

The Commercial Malware Industry
February 22, 2007 | A session at the Cybersecurity Summit 2007 for NSF Large Research Facilities

Malware has come a long way since it consisted mostly of small-scale (if prolific) nuisances perpetrated by script kiddies. Today, it's increasingly being created by professional programmers a…

E-Mail: Paradigms, Options, and Outsourcing
November 7, 2006

E-mail is perhaps the most fundamental information technology tool in use today. In higheraeducation there are new options to consider that include outsourcing the infrastructure as well as the e…

The Do-It-Yourself Anti-Spam Toolkit
October 11, 2006 | A session at the EDUCAUSE 2006 Annual Conference

At the University of California, Irvine, we have managed to reduce the amount of unsolicited commercial (or simply nasty) e-mail we receive to a mere trickle, using (almost) nothing but open-source…

EDUCAUSE Security Professionals Conference 2006. Summary: Winning the Battle against Cyber Criminals
April 25, 2006

Winning the Battle against Cyber Criminals Dan Larkin Unit Chief, Internet Crime Complaint Center , Federal Bureau of Investigation This op…

Securing E-Mail Infrastructure: Lessons Learned
April 12, 2006 | A session at the Security 2006

E-mail has become the essential form of communication at universities. Its weakness, such as e-mail-borne threats and spam, can[severely impact message delivery and retrieval, crippling or even par…