IT Security Standards

Examples of IT Security Challenges:

  1. Theft of hardware containing sensitive or personally identifiable information; 
  2. The level of network activity is excessively large as to cause serious degradation in the performance of the network; 
  3. System administrative privilege has been acquired by an unauthorized person; 
  4. An attack, either electronic or physical, on another computer or network has been executed; 
  5. Confidential, private or proprietary electronic information or communications are being collected; 
  6. Continued complaints have been received regarding inappropriate activity and no response has been received from the departmental contact regarding the incident.
  7. Computer equipment is or has not been procured and managed by OIT/ITS resources
  8. Software not owned by U of I, or is unpatched or no longer supported by the vendor.
  9. Use of unapproved software or systems either on-premise or in the cloud

 

If you need to report a security incident, please use do so clicking here.

Details

Article ID: 2111
Created
Fri 4/8/22 10:45 AM
Modified
Thu 4/28/22 11:08 AM