Introduction to Information Technology Security Office
Virus, worms, hacked, denial of service, and identity theft are the the buzz words in IT Security that everyone has heard. What does this mean to me I have a security program installed? Security of your information and the tools we use is more than just a software package or browser, it is to look both ways before crossing into the information highway. Hackers can get into your machine by a simple click of your mouse or by social engineering. The end goal is to take control of your machine and harvest its data and power. Our campus has approximately 28,000 registered devices that can potentially cause damage to individuals, departments, or the univeristy as a whole. To better equipt our university IT Security Office is a dedicated group to provide audits, awareness training, policy, and to proactively defend the digital landscape.
Click on the links above for a customized security content.
An ethical hacking student at the University of Northumbria has claimed that the university's ethics board and the Wassenaar Arrangement have forced him to delete some references to exploits from his final year dissertation.…
- 1 of 693