• IT@UC Knowledge Base

 Information Security

 Information Security Services

Security Consulting
Risk Management & Consulting, Education & Awareness

    Awareness & Training - Awareness campaigns and associated materials such as posters, presentations and flyers;
    Short courses on a variety of topics targeted at various groups.
    Consulting - Review of applications, systems, or processes. If you are starting a project, get us involved early! The
    earlier, the easier and cheaper it will be to build in security and compliance.
    Risk Management - OIS is tasked with evaluating risk and determining its likelihood and impact.
    Informal Audits - These policy and legal compliance checks must be requested by the Dean, Assistant Dean or a
    Director level person at the site to be assessment.


Security Incident Response and Investigation
Services that respond to, remediate and seek to prevent security incidents.   

    Cyber Security Incident Response – Oversight and guidance of an interdisciplinary team to equip them to respond
    appropriately in the event of a Cyber Security incident.

Security Policy and Compliance
Security Policies are high-level management directives, and they are mandatory. A policy has four parts: purpose, scope, responsibilities, and compliance.

    Creation of Security Policies – Policies that govern information security throughout the university and UCIT.
    Informal Audits - These policy and legal compliance checks must be requested by the Dean, Assistant Dean or a
    Director level person at the site to be assessment.
    Governance and Oversight for 2 factor authentication - UCIT OIS oversees 2-factor authentication for UCIT
    administrator users.
 

General Security Services

    Mailbox Access and Mail Retrieval Process - UCIT Mailbox Access/Retrieval process addresses how access is to be
    requested and granted under various circumstances.

    Shredding - Paper documents are important to dispose of properly. UCIT OIS sponsors 2 to 3 shred events each year.
    Contact us for dates, more information, or guidance with arranging your own shredding.
    SSL Server and Personal Certification Identity Verification – Verify that requests are valid and requesters are valid
    employees with authority over the server.
    Laptops for Travel - Providing a basic clean laptop for travel overseas to faculty and staff travelling for the university.
    For more information, view the checklist on travelling with mobile devices.

 


Identity and Access Management
Identity management refers to an information system, or to a set of technologies that can be used for enterprise or cross-network identity authorization.

   UC Identity Management FAQ
   
Password Self Service

Rate this article - 1 to 5 Stars
Note: you must be signed in to use this feature