The Protect IU Blog
Posted byon February 28, 2013 at 4:55 PM EST
March 1 is the first day of "meteorological spring". For IUEMC that means it's Storm Spotter season! With a class at IUPUI on March 19, let's talk about weather some more.Learn more about protecting:
Posted byon February 28, 2013 at 10:40 AM EST
Do you sometimes need to verify that a person is who they say they are, prior to giving them information or access? Have you struggled with ways to do that? Now all the advice we could collect has been put together into one document on Identity Verification.
You'll find a description of different levels of identity verification so you can determine how hard you should work to verify an identity.
Information about these different types of verification is included:Learn more about protecting:
Posted byon February 21, 2013 at 10:16 AM EST
The Paradigm Shift
One might think that as an IT security professional I would wish to tactfully discourage the use of Cloud computing; however, that is not entirely the case. Cloud computing opens avenues for collaboration on a scale never before realized by those wishing to integrate in thought and data sharing. Cloud computing virtually dissolves limitations defined by enterprise level networks and even geographical spans. As technology connects individuals, potentially on a global scale, our abilities to develop peer relations and interactions are greatly enhanced.Learn more about protecting:
Posted byon February 18, 2013 at 12:01 PM EST
Whole-disk encryption (WDE) provides an added layer of security for the data on your computer. Tools exist which can circumvent this technology under certain conditions. Lately, you may have heard about a tool from Elcomsoft which combines many popular WDE cracking methods in one.
Some attacks you are probably aware of. If an attacker can guess the encryption password through brute force, he can decrypt the disk without any tools. That's why a good passphrase is a critical part of the encryption process.Learn more about protecting:
Posted byon February 15, 2013 at 12:39 PM EST
The old viewpoint that innovation only occurs at growing organizations who take risks has long been dismissed by many leading universities and corporations. However, the idea that enterprise risk management (ERM) can co-exist with innovation, let alone promote and partner with it, is still viewed as polarizing. But, is this accurate?Learn more about protecting:
Posted byon February 8, 2013 at 1:29 PM EST
Universal Plug and Play (UPnP) is a protocol standard that allows communication between computers and network-enabled devices. UPnP allows devices to discover each other on the network and establish functional network services for data sharing and communication. This protocol is enabled by default on millions of devices, including routers, printers, media servers, IP cameras, smart TVs, home automation systems, and network storage servers.
Learn more about protecting:
Posted byon February 6, 2013 at 5:50 PM EST
Chief Patricia Nowak writes: "On January 2, 2013 Wayne James was promoted to Lieutenant. His outstanding work and leadership abilities has made this a natural transition. Lt. James has received multiple awards through the years, including receiving a purple heart for saving a man who was shot and injured. On July 13, 2011, Lt. James pulled the man to safety even when gun shot rounds continued. He and other Indiana University and Gary officers located and arrested the suspect."
"Lt. James is an excellent choice for this important leadership and high command role."Learn more about protecting:
Posted byon February 6, 2013 at 5:26 PM EST
The IUPD Northwest is presenting a Citizens’ Police Academy, January 15 – March 26, 2013. The academy is a joint effort by the IUPD and the City of Gary Police Department.
The free, ten-week academy “is designed in the hopes that both the community and law enforcement learn through each other in this two-way learning experience.” Through the academy sessions, citizens will develop "a working knowledge of their local police departments and law-enforcement activities.”Learn more about protecting: