Main Nav

Search results

Showing 71 - 80 of 259 Results

Sort by:

Rapid Windows Analysis
April 16, 2013 | A session at the Security Professionals Conference

Sometimes IT professionals can't perform a full analysis of every system that is suspected of being compromised in a timely manner. This presentation will give IT pros some tips on performing …

What's Your Number? Measuring the Maturity of Your Security Program with HEISC's New Assessment Tool
April 16, 2013 | A session at the Security Professionals Conference

Do you know how mature your security program is? EDUCAUSE has developed an enhanced information security program assessment tool to help you gauge your program. A panel of several early adopters wi…

IT Security Officer Survey
April 9, 2008

This April 2008 survey is a critical component of the EDUCAUSE Center on Applied Research (ECAR) study of information security officers in higher education. It seeks to understand the important c…

Managing IT Risk in Higher Education: A Methodology
March 18, 2008

This research bulletin presents a methodology, used successfully at the University of Technology, Sydney (UTS) in Australia, for managing and assessing risks related to information technology sys…

Information Risk Management Policy Template
March 17, 2008

The purpose of this policy template is to ensure that risks to University information are identified, analyzed, and managed so that they are maintained at acceptable levels. Risks to the confiden…

Risk Assessment Tools List
March 14, 2008

This list of Risk Assessment tools has been developed to assist campuses in the risk assessment planning process. The tools are a mix of some sold or licensed by vendors, some provided by colleag…

Incident Management Capability Metrics
September 19, 2007

The CERT CSIRT Development Team has introduced a method to evaluate and improve an organization's capability for managing computer security incidents. This method uses a set of incident mana…

Why File Sharing Networks Are Dangerous
September 10, 2007

In this paper the authors analyze P2P security issues, establishing vulnerabilities that software clients represent. The authors go on to present experimental evidence of the risk through honeyp…

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI - Book Review
August 29, 2007

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI Debra S. Herrmann Auerbach Publications, 2007 $119.95 (hardcover), 824 pp…

Committee Holds Hearing on Inadvertent File Sharing over Peer-to-Peer Networks
July 24, 2007

On Tuesday, July 24, 2007, the Committee held a hearing to examine recent developments regarding inadvertent file sharing over peer-to-peer (P2P) networks, the impact of such sharing on consumers…