Internet2 Confluence has been upgrade to 7.19.20. Questions? Contact techsupport@internet2.edu.
Log in
Skip to sidebar
Skip to main content
Internet2 Wiki
Spaces
Hit enter to search
Help
Online Help
Keyboard Shortcuts
Feed Builder
What’s new
Available Gadgets
About Confluence
Log in
Higher Ed Information Security Guide
Page tree
Browse pages
Configure
Space tools
View Page
A
t
tachments (0)
Page History
Page Information
View in Hierarchy
View Source
Export to PDF
Export to Word
Pages
Home
Security Operations
Page Information
Title:
Security Operations
Author:
Unknown User (dlwoodbe)
Jan 06, 2014
Last Changed by:
Valerie Vogel
Dec 06, 2017
Tiny Link:
(useful for email)
https://spaces.at.internet2.edu/x/KAEDAw
Export As:
Word
·
PDF
Incoming Links
Higher Ed Information Security Guide (2)
Page:
Acquisition and Development Lifecycle
Page:
Data Incident Notification Toolkit
Hierarchy
Parent Page
Home page:
Home
Labels
Global Labels (13)
management
communications
operations
procedures
controls
policies
communication
media
technology
responsibilities
operational
educause
heisc
Recent Changes
Time
Editor
Dec 06, 2017 17:44
Valerie Vogel
View Changes
Sep 13, 2017 21:56
Valerie Vogel
View Changes
May 17, 2017 15:19
Valerie Vogel
View Changes
Jun 10, 2016 22:28
Valerie Vogel
View Changes
Jun 10, 2016 22:24
Valerie Vogel
View Page History
Outgoing Links
External Links (65)
net.educause.edu/SEC08/Program/14422?PRODUCT_CODE=SEC08/COR…
www.educause.edu/E2010/Program/PS005
net.educause.edu/SEC09/Program/1020687?PRODUCT_CODE=SEC09/S…
www.educause.edu/MARC12/Program/SESS02
www.educause.edu/events/enterprise-it-leadership-conference…
net.educause.edu/ir/library/word/SPC0561D.doc
www.educause.edu/events/security-professionals-conference/2…
net.educause.edu/SEC08/Program/14422?PRODUCT_CODE=SEC08/COR…
www.educause.edu/SEC112/Program/OL14
https://spaces.internet2.edu/display/2014infosecurityguide/…
www.educause.edu/E2011/Program/SESS146
https://virustotal.com
www.educause.edu/events/security-professionals-conference/2…
www.educause.edu/E2011/Program/SESS104
www.educause.edu/Resources/HotTopicDiscussionApplicationS/2…
www.educause.edu/annual-conference/2012/next-generation-bac…
csrc.nist.gov/publications/PubsSPs.html
itsecurity.uiowa.edu/policy/policy-backup-recovery.shtml
www.educause.edu/events/security-professionals-conference/t…
www.educause.edu/events/security-professionals-conference/2…
creativecommons.org/licenses/by-nc-sa/4.0/
www-03.ibm.com/press/us/en/pressrelease/29331.wss
www.umsystem.edu/ums/fa/management/records/electronic/
mailto:security-council@educause.edu?subject=Operations Sec…
net.educause.edu/SEC09/Program/1020687?PRODUCT_CODE=SEC09/S…
www.educause.edu/Resources/7ThingsYouShouldKnowAboutCloud/2…
https://itservices.stanford.edu/service/changemgt
www.educause.edu/ecar/ecar-working-groups
www.educause.edu/events/security-professionals-conference/d…
ithandbook.ffiec.gov/it-booklets/business-continuity-planni…
www.educause.edu/annual-conference/2012/preparing-big-data-…
www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.ht…
https://www.pcisecuritystandards.org/index.shtml
www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.ht…
www.educause.edu/annual-conference/2012/raising-bar-cloud-s…
www.educause.edu/southeast-regional-conference/2012/persona…
https://zeltser.com/security-incident-log-review-checklist/
net.educause.edu/SEC09/Program/1020687?PRODUCT_CODE=SEC09/S…
www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/
www.indiana.edu/~change/
www.educause.edu/SEC11/Program/SEM02P
https://www.utexas.edu/sites/default/files/NetOpsMan_v1-2.p…
https://uto.asu.edu/node/8095
is.oregonstate.edu/files/projects/change-management-policy.…
www.educause.edu/annual-conference/2012/2012/community-and-…
www.educause.edu/SEC11/Program/SESS27
www.educause.edu/SEC11/Program/SESS26
https://en.wikipedia.org/wiki/Cascading_failure
net.educause.edu/SEC10/Program/1023654?PRODUCT_CODE=SEC10/S…
www.educause.edu/annual-conference/2012/disaster-recovery-p…
www.iso.org/iso/store.htm
www.it.northwestern.edu/about/departments/issc/index.html
www.educause.edu/annual-conference/2012/2012/achieving-virt…
www.isaca.org/cobit
https://en.wikipedia.org/wiki/The_Visible_Ops_Handbook
net.educause.edu/SEC09/Program/1020687?PRODUCT_CODE=SEC09/S…
https://en.wikipedia.org/wiki/Wiki_software#Enterprise_wiki…
www.clemson.edu/ccit/help_support/cm/
https://jmeter.apache.org/
www.educause.edu/southeast-regional-conference/2012/eits-an…
www.educause.edu/annual-conference/2012/business-continuity…
www.uh.edu/infotech/php/template.php?nonsvc_id=268
www.educause.edu/southeast-regional-conference/2012/inform-…
www.nist.gov/cyberframework/
www.educause.edu/annual-conference/2012/reaching-higher-ele…
Higher Ed Information Security Guide (8)
Page:
Guidelines for Information Media Sanitization
Page:
Electronic Records Management Toolkit
Page:
Cloud Data Storage Solutions
Page:
Managing Malware
Page:
Cloud Computing Security
Page:
Two-Factor Authentication
Page:
Guidelines for Data De-Identification or Anonymization
Page:
E-Discovery Toolkit
Overview
Content Tools
{"serverDuration": 182, "requestCorrelationId": "7a9ad5b791769954"}