results for "lsu"
Results 11-20 of 26
Results Per Page: 
Email headers: Fraudulent or Legitimate? Overview: Email is a quick and convenient method for communication, but it was never designed to be secure. When you receive a message, email clients and web services by default display information like who it is from, who it was sent to, etc. However, it is trivial for potential attackers to 'spoof' or 'forge' this information to make it...
Article Id: 16564

WHAT MAKES FILE SHARING ILLEGAL? The Digital Millennium Copyright Act (DMCA) is a piece of legislation signed into law in 1998 defining the illegal downloading and/or sharing of copyrighted material. LSU is required to investigate DMCA complaints and take action to remove infringing content. HOW DOES THIS APPLY TO ME? Copyright holders (or organizations...
Article Id: 17129

Report Phishing E-mails The LSU IT Security and Policy (ITSP) Team has deployed Cofense Reporter, an application that provides users the ability to report suspicious e-mails to the ITSP team quickly and efficiently. The application will be available for all @lsu.edu mailboxes automatically without any user intervention. The application is implemented with the University's Office365...
Article Id: 19636

Data Classification Data at LSU can be classified into three categories (Confidential, Private or Public). Confidential data has a high level of sensitivity. Private data has a moderate level of sensitivity. Public data has a low level of sensitivity. Each category carries a different level of access and reputation risk. PS-124 Data Management outlines the security of data at LSU.
Article Id: 14852

When reporting a suspicious e-mail or a potential phishing attempt to ITS, please include the Message Header. The Message Header contains helpful information which can assist e-mail administrators in troubleshooting. Note: The LSU IT Security and Policy (ITSP) Team has deployed Cofense Reporter, an application that provides users the ability to report suspicious e-mails to the ITSP...
Article Id: 14922

Article Id: 20163

Imaging through System Center: PXE Booting 1. Before attempting to PXE boot, verify that network stack boot options are enabled in the BIOS. This may look different depending on the manufacturer and age of the machine. Picture below is the BIOS option for a Dell from the year 2019, where the setting is found under "System Configuration" -> "Integrated NIC" -> "Enable UEFI Network Stack" ->...
Article Id: 20488

Import USERTrust Intermediate Certificate: This article is intended for Windows 10 and Windows Server 2012 and up. There may be slight graphical or interface differences between different versions of Windows 10 or Windows Server, but the steps should remain mostly the same. USERTrust is an entity that signs LSU's SSL certificates on the behalf of Sectigo. Therefore, USERTrust is...
Article Id: 16563

This article is intended for Windows 10 and Windows Server 2012 and up. There may be slight graphical or interface differences between different versions of Windows 10 or Windows Server, but the steps should remain mostly the same. Import CA Certificate The root Certificate Authority(CA) for LSU is Comodo , and it is identified by the Issuer, AAA Certificate Services . This...
Article Id: 16562

Legislation and Confidentiality of Records The Family Educational Rights and Privacy Act (FERPA) The F amily E ducational R ights and P rivacy A ct of 1974, also known as the Buckley Amendment, is a federal law that protects the privacy of student “education records.” “Education records” are defined, with a few exceptions, as records containing information directly related...
Article Id: 6644

Provide Search Feedback Logo
Search Google Logo