Main Nav

Search results

Showing 61 - 70 of 246 Results

Sort by:

Information Security Governance: Standardizing the Practice of Information Security
August 19, 2008

This ECAR research bulletin discusses the trend to use a variety of risk assessment frameworks and standards to create an information security program that is sufficiently comprehensive for colle…

Information Sharing for IT Security Professionals
August 4, 2008

© 2008 Rodney J. Petersen. The text of this article is licensed under the Creative Commons Attribution-NonCommercial-No Derivative Works 3.0 license (…

IT Security Officer Survey
April 9, 2008

This April 2008 survey is a critical component of the EDUCAUSE Center on Applied Research (ECAR) study of information security officers in higher education. It seeks to understand the important c…

Managing IT Risk in Higher Education: A Methodology
March 18, 2008

This research bulletin presents a methodology, used successfully at the University of Technology, Sydney (UTS) in Australia, for managing and assessing risks related to information technology sys…

Information Risk Management Policy Template
March 17, 2008

The purpose of this policy template is to ensure that risks to University information are identified, analyzed, and managed so that they are maintained at acceptable levels. Risks to the confiden…

A Model for Today: Partnering with Industry to Enhance Institutional Information Security Capabilities
April 16, 2013 | A session at the Security Professionals Conference

Many academic organizations are facing the same problems: an aging decentralized computing infrastructure, growing use of mobile devices, increasing use of network resources, and ever-present exter…

Why File Sharing Networks Are Dangerous
September 10, 2007

In this paper the authors analyze P2P security issues, establishing vulnerabilities that software clients represent. The authors go on to present experimental evidence of the risk through honeyp…

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI - Book Review
August 29, 2007

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI Debra S. Herrmann Auerbach Publications, 2007 $119.95 (hardcover), 824 pp…

Committee Holds Hearing on Inadvertent File Sharing over Peer-to-Peer Networks
July 24, 2007

On Tuesday, July 24, 2007, the Committee held a hearing to examine recent developments regarding inadvertent file sharing over peer-to-peer (P2P) networks, the impact of such sharing on consumers…

Security Task Force Strategic Plan 2006-2007 : Making Progress on Data Protection, Risk Assessment, Incident Response and Business Continuity
June 20, 2007

This 2006-2007 strategic plan is intended to identify a few key priorities for the next year that will guide and direct the activities of the EDUCAUSE/Internet2 Security Task Force. …