Title: Security Operations  
Author: Unknown User (dlwoodbe) Jan 06, 2014
Last Changed by: Valerie Vogel Dec 06, 2017
Tiny Link: (useful for email) https://spaces.at.internet2.edu/x/KAEDAw
Export As: Word · PDF  
Incoming Links
Higher Ed Information Security Guide (2)
    Page: Acquisition and Development Lifecycle
    Page: Data Incident Notification Toolkit
Hierarchy
Parent Page
    Home page: Home
Outgoing Links
External Links (65)
    net.educause.edu/SEC08/Program/14422?PRODUCT_CODE=SEC08/COR…
    www.educause.edu/E2010/Program/PS005
    net.educause.edu/SEC09/Program/1020687?PRODUCT_CODE=SEC09/S…
    www.educause.edu/MARC12/Program/SESS02
    www.educause.edu/events/enterprise-it-leadership-conference…
    net.educause.edu/ir/library/word/SPC0561D.doc
    www.educause.edu/events/security-professionals-conference/2…
    net.educause.edu/SEC08/Program/14422?PRODUCT_CODE=SEC08/COR…
    www.educause.edu/SEC112/Program/OL14
    https://spaces.internet2.edu/display/2014infosecurityguide/…
    www.educause.edu/E2011/Program/SESS146
    https://virustotal.com
    www.educause.edu/events/security-professionals-conference/2…
    www.educause.edu/E2011/Program/SESS104
    www.educause.edu/Resources/HotTopicDiscussionApplicationS/2…
    www.educause.edu/annual-conference/2012/next-generation-bac…
    csrc.nist.gov/publications/PubsSPs.html
    itsecurity.uiowa.edu/policy/policy-backup-recovery.shtml
    www.educause.edu/events/security-professionals-conference/t…
    www.educause.edu/events/security-professionals-conference/2…
    creativecommons.org/licenses/by-nc-sa/4.0/
    www-03.ibm.com/press/us/en/pressrelease/29331.wss
    www.umsystem.edu/ums/fa/management/records/electronic/
    mailto:security-council@educause.edu?subject=Operations Sec…
    net.educause.edu/SEC09/Program/1020687?PRODUCT_CODE=SEC09/S…
    www.educause.edu/Resources/7ThingsYouShouldKnowAboutCloud/2…
    https://itservices.stanford.edu/service/changemgt
    www.educause.edu/ecar/ecar-working-groups
    www.educause.edu/events/security-professionals-conference/d…
    ithandbook.ffiec.gov/it-booklets/business-continuity-planni…
    www.educause.edu/annual-conference/2012/preparing-big-data-…
    www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.ht…
    https://www.pcisecuritystandards.org/index.shtml
    www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.ht…
    www.educause.edu/annual-conference/2012/raising-bar-cloud-s…
    www.educause.edu/southeast-regional-conference/2012/persona…
    https://zeltser.com/security-incident-log-review-checklist/
    net.educause.edu/SEC09/Program/1020687?PRODUCT_CODE=SEC09/S…
    www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/
    www.indiana.edu/~change/
    www.educause.edu/SEC11/Program/SEM02P
    https://www.utexas.edu/sites/default/files/NetOpsMan_v1-2.p…
    https://uto.asu.edu/node/8095
    is.oregonstate.edu/files/projects/change-management-policy.…
    www.educause.edu/annual-conference/2012/2012/community-and-…
    www.educause.edu/SEC11/Program/SESS27
    www.educause.edu/SEC11/Program/SESS26
    https://en.wikipedia.org/wiki/Cascading_failure
    net.educause.edu/SEC10/Program/1023654?PRODUCT_CODE=SEC10/S…
    www.educause.edu/annual-conference/2012/disaster-recovery-p…
    www.iso.org/iso/store.htm
    www.it.northwestern.edu/about/departments/issc/index.html
    www.educause.edu/annual-conference/2012/2012/achieving-virt…
    www.isaca.org/cobit
    https://en.wikipedia.org/wiki/The_Visible_Ops_Handbook
    net.educause.edu/SEC09/Program/1020687?PRODUCT_CODE=SEC09/S…
    https://en.wikipedia.org/wiki/Wiki_software#Enterprise_wiki…
    www.clemson.edu/ccit/help_support/cm/
    https://jmeter.apache.org/
    www.educause.edu/southeast-regional-conference/2012/eits-an…
    www.educause.edu/annual-conference/2012/business-continuity…
    www.uh.edu/infotech/php/template.php?nonsvc_id=268
    www.educause.edu/southeast-regional-conference/2012/inform-…
    www.nist.gov/cyberframework/
    www.educause.edu/annual-conference/2012/reaching-higher-ele…
Higher Ed Information Security Guide (8)     Page: Guidelines for Information Media Sanitization
    Page: Electronic Records Management Toolkit
    Page: Cloud Data Storage Solutions
    Page: Managing Malware
    Page: Cloud Computing Security
    Page: Two-Factor Authentication
    Page: Guidelines for Data De-Identification or Anonymization
    Page: E-Discovery Toolkit