Information security basics

Addressing the weakest link

As you probably have heard and read many times through the media, your associates at the University and even Information Security Officers, there are numerous threats to information and systems worldwide, and the number of attack patterns grows every day.  However, industry surveys indicate that a vast majority of all successful attacks on systems and information rely heavily on two key factors: 

  • A lack of security awareness, and
  • Human error. 

The statistic's accuracy is confirmed by the testimonies of many hackers who claim to pride themselves more on being psychologists and sociologists than on being technical wizards.

Strengthening information security through awareness 

This section of the Information Security Office's web site has been developed to provide both technical and non-technical readers with information to help you better understand:

  • The most common techniques that malicious individuals use to compromise information and systems, and
  • The actions that we all can take to reduce the risk of an attack succeeding, both on the University's systems and even on your own systems at home

  The content is written and organized in a manner that does not require you to review the topics presented in any prescribed sequence, so feel free to start by exploring any topic that draws your attention. 

Resources

If you have any questions or need additional information, please contact the Information Security Office through the UCT Support Center at extension 2828 or supportcenter@uhcl.edu.

Contact
  • UCT Support Center

    Phone: 281-283-2828
    Email: supportcenter@uhcl.edu

    Bayou 2300
    2700 Bay Area Blvd.
    Houston, TX 77058-1002

    Office hours:
    Monday - Thursday, 8am - 10:30pm
    Friday - Saturday, 8am - 5pm
    Sunday, Closed