Introduction to Information Technology Security Office

Virus, worms, hacked, denial of service, and identity theft are the the buzz words in IT Security that everyone has heard.  What does this mean to me I have a security program installed?  Security of your information and the tools we use is more than just a software package or browser, it is to look both ways before crossing into the information highway.   Hackers can get into your machine by a simple click of your mouse or by social engineering.  The end goal is to take control of your machine and harvest its data and power.  Our campus has approximately 28,000 registered devices that can potentially cause damage to individuals, departments, or the univeristy as a whole.  To better equipt our university IT Security Office is a dedicated group to provide audits, awareness training, policy, and to proactively defend the digital landscape.

Click on the links above for a customized security content.

Security Advisory

In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public.

Syndicate content

Security Blog

Interested in Cyber Security?  Join the Louisiana Info-Sec Community in the 2011 Initiative - Tiger Trap 2011 Cyber Security Challenge.  www.tigertrap.org

Master the Tiger Trap event then take on freelancers looking to take elite status.  Check out USCC which turns it up a notch.

Syndicate content

Breaking Security News

BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more

Researchers say they have managed to reprogram the firmware within some flash drives with malicious code – code executed by the gadget's micro-controller to ultimately install malware on a PC or redirect network traffic without a victim knowing.…