2,495,188 research outputs found
How Hackers Try to Trick You
As cyber-attacks continue to become more sophisticated, University of Maine System (UMS) employees need to be vigilant and aware of the multitude of ways hackers can gain access to sensitive information. From phishing schemes to deep fakes, cybercriminals are constantly evolving their methods
End of Year Phishing Advisory and Welcome Message
Announcing the UMS Information Security Advisory Google Group. The purpose of the group is to provide timely security advisories and important reminders
SCDIS-210 Information Security Technology Coverage Measurement Standards
These standards establish a simplified and consistent measurement for coverage of each of the security technologies listed therein. These standards are to be used for all South Carolina state agencies, including institutions, departments, divisions, boards, commissions, and authorities
Cybersecurity Awareness: Social Engineering
Social Engineering is the name for a group of fraudulent activities that manipulate people into divulging personal information to dubious individuals or groups. The information is then used for criminal acts, causing a variety of difficulties for the victims. Although phishing is the most widely publicized, there are a number of ways these bad actors can psychologically manipulate us
ARCSIM Newsletter, February 2024
ARCSIM approaches fives years and expands services to entire UMS research community. The research enterprise at UMaine has experienced rapid growth in recent years, and with that growth comes accompanying computing, data security, and operational needs. The Advanced Research Computing, Security, and Information Management (ARCSIM) group, led by Director Shane Moeykens, is taking steps to meet these needs by further expanding the computing resources and related services available to UMS faculty and students
Information Security Fundamentals
Information Security Fundamentals allows security professionals to gain a solid understandings of the foundations of the field and the entire range of issues that practitioners must address. This book enables you to understand the key elements that comprise the successful information security program and apply these concepts into your own effort. The book examines the element computer security, employee roles and responsibilities, and common threats. It examines the need for management controls, policies and procedures, and risk analysis, and also presents a comprehensive list of task and objectives that kame up a typical information protection program.
The volume discusses organizational wide (Tier 1) policies and their documentation, and legal and business requirements. It explains policy format, focusing on global, topic-specific, and application-specific policies. Following a review of asset classification, the book explores access control, the components of physical security, and the foundation and processes of risk analysis and risk management. Information Security Fundamentals concludes by describing business continuity planning, including preventive controls, recovery strategies, and ways to conduct a business impact analysis.
Features :
• Provides a solid understanding of the foundations of the field and the entire range of issues that practitioners must address
• Discusses the legal requirements that impact security policies, including Sarbanes-Oxley, HIPAA, and Gramm-Leach-Bliley Act (GLBA)
• Details physical sequrity requirement and controls, and offers a sample physical security policy
• Examines elements of the risk analysis process such as asset definition, threat identification occurrence probability, and more
• Describes components of business continuity planning, outlining how to conduct a business impact analysis, and how to test a pla
Data Privacy Day
January 28th was Data Privacy Day, a day to reflect on what you can do to protect the privacy of yourself and others. Aside from oversharing data, the best approach you can take is to use Multi-Factor Authentication (MFA) on your personal and University of Maine System (UMS) accounts
Love Data Week Event Series
Love Data Week is a week-long international celebration of data, dedicated to raising awareness of the importance of research data management, security, sharing, and preservation. This year’s theme is My Kind of Data
- …