Main Nav

Search results

Showing 81 - 90 of 251 Results

Sort by:

Safeguarding the Tower: IT Security in Higher Education 2006
October 11, 2006

Presentation at EDUCAUSE 2006, October 9-12, 2006, Dallas, Texas. This presentation summarizes the findings of the EDUCAUSE Center for Analysis and Research 2006 study of information technology s…

Safeguarding the Tower: IT Security in Higher Education 2006 – Key Findings
October 12, 2006

This document presents the key findings of the ECAR study, Safeguarding the Tower: IT Security in Higher Education 2006. When ECAR studied IT security in 2003, we discovered that despite efforts …

Safeguarding the Tower: IT Security in Higher Education 2006 Roadmap
October 12, 2006

This roadmap synthesizes the important issues and recommended actions drawn from the ECAR study, Safeguarding the Tower: IT Security in Higher Education 2006. When ECAR studied IT security in 200…

Safeguarding the Tower: IT Security in Higher Education 2006
October 12, 2006

Abstract When ECAR studied IT security in 2003, we discovered that despite efforts to develop a secure IT infrastructure in higher education, uneven management awareness and a culture that e…

A Unified Approach to Information Security Compliance
January 1, 2006

© 2006 M. Peter Adler EDUCAUSE Review, vol. 41, no. 5 (September/October 2006): 46–61 M. Peter Adler, JD, LLM, CISSP, CIPP, is the President of Adler InfoSec & Privacy Group LLC …

Going Beyond Recovery to Continuity: Lessons Learned
January 1, 2006

The main campus of The George Washington University is located just a few blocks from the White House. The series of events surrounding 9/11 helped to accelerate advancement of a university-wide …

Computer Incident Factor Analysis and Categorization (CIFAC) Project Final Report, Volume II: Corporate and Not-for-Profit Sample
January 1, 2006

The Computer Incident Factor Analysis and Categorization (CIFAC) project received supplemental supportfrom the National Science Foundation in late 2005, making it possible to expand the scope of th…

What Every CBO Should Know About IT Security
January 1, 2006

Identifying and mitigating information security risks that confront colleges and universities is increasingly important as higher education's reliance on information technology grows. This pre…

Trends in Malicious Code on the Internet
January 1, 2006

The presentation will identify the FBI's role in combating malicious code outbreaks and investigating computer intrusion incidents, as well as the objectives of malware analysis. The malicio…

Defend IT: Security by Example - Book Review
January 1, 2005

Recommended Reading Defend IT: Security by Example Ajay Gupta and Scott Laliberte Addison Wesley Professional, 2004 $34.99 (paper), 384 pp. ISBN 0-321-19767-4  …