Information Security Basics
Addressing the Weakest Link
As you probably have heard and read many times through the media, your associates at the University, and even Information Security Officers, there are numerous threats to information and systems worldwide, and the number of attack patterns grows every day. However, industry surveys indicate that a vast majority of all successful attacks on systems and information rely heavily on two key factors - a lack of security awareness and human error.
The statistic's accuracy is confirmed by the testimonies of many hackers who claim to pride themselves more on being psychologists and sociologists than on being technical wizards.
Strengthening information security through awareness
This section of the Information Security Office's web site has been developed to provide both technical and non-technical readers with information to help you better understand:
- The most common techniques that malicious individuals use to compromise information and systems
- The actions that we all can take to reduce the risk of an attack succeeding, both on the University's systems and even on your own systems at home
The content is written and organized in a manner that does not require you to review the topics presented in any prescribed sequence, so feel free to start by exploring any topic that draws your attention.
- Administrator vs. User Accounts
- Cloud Service Concerns
- Deleting Data
- E-mail and Information Sharing
- E-mail Threats, Spam and Phishing
- How Sensitive is the Information You Use?
- Limiting Network Access
- Locking Computers and Mobile Devices
- Password Security
- Protecting Sensitive Information
- Updating Software
- Viruses and Malware
- Web Browsing Tips
If you have any questions or need additional information, please contact the Information Security Office through the OIT Support Center at extension 2828 or firstname.lastname@example.org.