Main Nav

Search results

Showing 71 - 80 of 252 Results

Sort by:

Information Risk Management Policy Template
March 17, 2008

The purpose of this policy template is to ensure that risks to University information are identified, analyzed, and managed so that they are maintained at acceptable levels. Risks to the confiden…

Why File Sharing Networks Are Dangerous
September 10, 2007

In this paper the authors analyze P2P security issues, establishing vulnerabilities that software clients represent. The authors go on to present experimental evidence of the risk through honeyp…

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI - Book Review
August 29, 2007

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI Debra S. Herrmann Auerbach Publications, 2007 $119.95 (hardcover), 824 pp…

Committee Holds Hearing on Inadvertent File Sharing over Peer-to-Peer Networks
July 24, 2007

On Tuesday, July 24, 2007, the Committee held a hearing to examine recent developments regarding inadvertent file sharing over peer-to-peer (P2P) networks, the impact of such sharing on consumers…

Security Task Force Strategic Plan 2006-2007 : Making Progress on Data Protection, Risk Assessment, Incident Response and Business Continuity
June 20, 2007

This 2006-2007 strategic plan is intended to identify a few key priorities for the next year that will guide and direct the activities of the EDUCAUSE/Internet2 Security Task Force. …

IT Security Risk Assessment
December 10, 2009

This standard defines a methodology and an assessment process for quantifying security risks in the IT environment. This standard defines a metho…

Confidential Data Handling Blueprint
June 11, 2007

The Confidential Data Handling Toolkit provides a consolidation of resources that are anchored to the overarching themes related to information protection secure data handling. …

A Blueprint for Handling Sensitive Data: Security, Privacy, and Other Considerations
January 1, 2007

Information security risks at colleges and universities present challenging legal, policy, technical, and operational issues. According to a recent study by the EDUCAUSE Center for Analysis and Res…

Local IT Security for Colleges, Schools, and Departments: A Higher Education Perspective
December 5, 2006

This bulletin discusses some of the lessons learned by the Emory College, Faculty of Arts and Sciences, in developing its information technology security strategy, as well as what other schools g…

Most Improved: How Four Institutions Developed Successful IT Security Programs
November 3, 2006

Researchers conducted this in-depth case study to complement the ECAR study, Safeguarding the Tower: IT Security in Higher Education 2006. The case study examines how four higher education instit…