2,495,188 research outputs found

    How Hackers Try to Trick You

    Get PDF
    As cyber-attacks continue to become more sophisticated, University of Maine System (UMS) employees need to be vigilant and aware of the multitude of ways hackers can gain access to sensitive information. From phishing schemes to deep fakes, cybercriminals are constantly evolving their methods

    End of Year Phishing Advisory and Welcome Message

    Get PDF
    Announcing the UMS Information Security Advisory Google Group. The purpose of the group is to provide timely security advisories and important reminders

    SCDIS-210 Information Security Technology Coverage Measurement Standards

    Get PDF
    These standards establish a simplified and consistent measurement for coverage of each of the security technologies listed therein. These standards are to be used for all South Carolina state agencies, including institutions, departments, divisions, boards, commissions, and authorities

    Cybersecurity Awareness: Social Engineering

    Get PDF
    Social Engineering is the name for a group of fraudulent activities that manipulate people into divulging personal information to dubious individuals or groups. The information is then used for criminal acts, causing a variety of difficulties for the victims. Although phishing is the most widely publicized, there are a number of ways these bad actors can psychologically manipulate us

    ARCSIM Newsletter, February 2024

    Get PDF
    ARCSIM approaches fives years and expands services to entire UMS research community. The research enterprise at UMaine has experienced rapid growth in recent years, and with that growth comes accompanying computing, data security, and operational needs. The Advanced Research Computing, Security, and Information Management (ARCSIM) group, led by Director Shane Moeykens, is taking steps to meet these needs by further expanding the computing resources and related services available to UMS faculty and students

    Information Security Fundamentals

    Get PDF
    Information Security Fundamentals allows security professionals to gain a solid understandings of the foundations of the field and the entire range of issues that practitioners must address. This book enables you to understand the key elements that comprise the successful information security program and apply these concepts into your own effort. The book examines the element computer security, employee roles and responsibilities, and common threats. It examines the need for management controls, policies and procedures, and risk analysis, and also presents a comprehensive list of task and objectives that kame up a typical information protection program. The volume discusses organizational wide (Tier 1) policies and their documentation, and legal and business requirements. It explains policy format, focusing on global, topic-specific, and application-specific policies. Following a review of asset classification, the book explores access control, the components of physical security, and the foundation and processes of risk analysis and risk management. Information Security Fundamentals concludes by describing business continuity planning, including preventive controls, recovery strategies, and ways to conduct a business impact analysis. Features : • Provides a solid understanding of the foundations of the field and the entire range of issues that practitioners must address • Discusses the legal requirements that impact security policies, including Sarbanes-Oxley, HIPAA, and Gramm-Leach-Bliley Act (GLBA) • Details physical sequrity requirement and controls, and offers a sample physical security policy • Examines elements of the risk analysis process such as asset definition, threat identification occurrence probability, and more • Describes components of business continuity planning, outlining how to conduct a business impact analysis, and how to test a pla

    Data Privacy Day

    Get PDF
    January 28th was Data Privacy Day, a day to reflect on what you can do to protect the privacy of yourself and others. Aside from oversharing data, the best approach you can take is to use Multi-Factor Authentication (MFA) on your personal and University of Maine System (UMS) accounts

    Love Data Week Event Series

    Get PDF
    Love Data Week is a week-long international celebration of data, dedicated to raising awareness of the importance of research data management, security, sharing, and preservation. This year’s theme is My Kind of Data

    Framework Policy on Information Security

    Get PDF
    • …
    corecore