results for "security"
Results 11-20 of 25
Results Per Page: 
Report Phishing E-mails Phishing emails are malicious messages that attempt to trick recipients into providing sensitive information or performing fraudulent tasks. Users can report any suspicious or malicious message to LSU IT Security and Policy (ITSP) for review through the Report options in Outlook. Phishing emails may Request information like passwords or...
Article Id: 19636

Data Classification Data at LSU can be classified into three categories (Confidential, Private or Public). Confidential data has a high level of sensitivity. Private data has a moderate level of sensitivity. Public data has a low level of sensitivity. Each category carries a different level of access and reputation risk. PS-124 Data Management outlines the security of data at LSU.
Article Id: 14852

General Information Solid State Drives (SSDs) are quickly replacing traditional, mechanical, hard disk drives due to their higher speed, lower power consumption, lighter weight, and being more shock proof. However, traditional whole disk erasing utilities like Darik's Boot and Nuke (DBAN) do not work well with SSDs because the placement of data blocks is not as predictable as...
Article Id: 16716

Legislation and Confidentiality of Records The Family Educational Rights and Privacy Act (FERPA) The F amily E ducational R ights and P rivacy A ct of 1974, also known as the Buckley Amendment, is a federal law that protects the privacy of student “education records.” “Education records” are defined, with a few exceptions, as records containing information directly related...
Article Id: 6644

Linux IAAS SLA Introduction This document is to establish the Service Level Agreement for LSU’s Linux-based IAAS (Infrastructure as a Service). Service Availability ITS does not currently guarantee a service availability target but strives to maintain 99.9% availability, excluding pre-established monthly maintenance windows and down time caused by...
Article Id: 17667


E-mail: Obtain the E-mail Headers Email headers contain important diagnostic information about the route an email message takes and the results of different security and authenticity checks. When reporting a message through the Report Phishing option in Outlook , the message and all of its header information are provided to the LSU IT Security and Policy (ITSP) team for evaluation.
Article Id: 14922

Keep Web Browsers Up-to-Date Most Web Browser Updates address Security Vulnerabilities and Critical Issues that NEED to be resolved. It is VERY IMPORTANT that these are kept up-to-date. These instructions will show How to keep your Web Browser updated . 1. Open the Google Chrome web browser. 2. Click the ellipses menu icon, located in the top right...
Article Id: 16342

Note: SSLv3 or older protocols as well as TLS 1.0 and 1.1 should no longer be used. Use TLS 1.2 should be used instead. ? Recommendations for Microsoft Internet Information Services (IIS): Changing the SSL Protocols and Cipher Suites for IIS involves making changes to the registry. It is not direct or intuitive. Therefore, instead of repeating already published information, please...
Article Id: 17596

Article Id: 20614

Provide Search Feedback Logo
Search Google Logo