Main Nav

Search results

Showing 71 - 80 of 250 Results

Sort by:

What's Your Number? Measuring the Maturity of Your Security Program with HEISC's New Assessment Tool
October 16, 2013 | A session at the EDUCAUSE Annual Conference 2013

Do you know how mature your security program is? EDUCAUSE has developed an enhanced information security program assessment tool to help you gauge your program. This session will introduce the new …

Why File Sharing Networks Are Dangerous
September 10, 2007

In this paper the authors analyze P2P security issues, establishing vulnerabilities that software clients represent. The authors go on to present experimental evidence of the risk through honeyp…

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI - Book Review
August 29, 2007

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI Debra S. Herrmann Auerbach Publications, 2007 $119.95 (hardcover), 824 pp…

Committee Holds Hearing on Inadvertent File Sharing over Peer-to-Peer Networks
July 24, 2007

On Tuesday, July 24, 2007, the Committee held a hearing to examine recent developments regarding inadvertent file sharing over peer-to-peer (P2P) networks, the impact of such sharing on consumers…

Security Task Force Strategic Plan 2006-2007 : Making Progress on Data Protection, Risk Assessment, Incident Response and Business Continuity
June 20, 2007

This 2006-2007 strategic plan is intended to identify a few key priorities for the next year that will guide and direct the activities of the EDUCAUSE/Internet2 Security Task Force. …

IT Security Risk Assessment
December 10, 2009

This standard defines a methodology and an assessment process for quantifying security risks in the IT environment. This standard defines a metho…

Confidential Data Handling Blueprint
June 11, 2007

The Confidential Data Handling Toolkit provides a consolidation of resources that are anchored to the overarching themes related to information protection secure data handling. …

A Blueprint for Handling Sensitive Data: Security, Privacy, and Other Considerations
January 1, 2007

Information security risks at colleges and universities present challenging legal, policy, technical, and operational issues. According to a recent study by the EDUCAUSE Center for Analysis and Res…

Local IT Security for Colleges, Schools, and Departments: A Higher Education Perspective
December 5, 2006

This bulletin discusses some of the lessons learned by the Emory College, Faculty of Arts and Sciences, in developing its information technology security strategy, as well as what other schools g…

Most Improved: How Four Institutions Developed Successful IT Security Programs
November 3, 2006

Researchers conducted this in-depth case study to complement the ECAR study, Safeguarding the Tower: IT Security in Higher Education 2006. The case study examines how four higher education instit…