澳门六合彩历史记录

University Technology

IT Security Frequently Asked Questions

Expand all FAQs | Collapse all FAQs

What is information security?

Information security is the practice of protecting information and information systems from unauthorized disclosure, modification, and destruction. It encompasses the security of all IT resources, including both university information and the IT devices that access, process, store, and transmit it.

What is university information?

University information is the set of information that the university owns or for which is accountable. Including all data relevant to or that supports the administration and mission of the university.

What is an IT device?

Any university owned device that is used to access, process, store, or transmit university information and that uses the infrastructure.

How do I secure my computer?

uTech secures as much as possible. The user should encrypt sensitive information when in transmission, password protect all devices with a strong password, and physically secure your devices. This includes keeping track of portable devices, locking your computer when away, and being aware of any potential threats and doing your best to avoid them.

What is malware?

Malware is short for malicious software. Hackers use software to impair your device鈥檚 function, steal data, or gain control of your device itself.

What is data management?

The responsible stewardship of data throughout its lifecycle. Effective data management requires appropriate acquisition, utilization, maintenance, access, and protection.

How can I manage data safely?

Recognize that it鈥檚 an integral part of your job responsibilities and incorporate it into your workplace routine. Always be mindful of how your actions affect the security of your data and devices. If you have a specific question relating to data safety, please submit a work order and someone will help you protect the data while completing your job.

What is encryption?

The means of protecting files and devices. When you encrypt a file, you 鈥渓ock鈥 it with an encryption key or password. The file is 鈥渟crambled鈥 and becomes unreadable without the appropriate key or password.

Can I use email to send and receive sensitive information?

Any attempt to send or receive sensitive data that鈥檚 not encrypted will be stopped. If you encrypt the information, you will be allowed to send and receive. Any specific questions can be answer after a ticket has been submitted.

Why are strong passwords important and how to do I create one?

The strength of your password directly affects how easy it is for a hacker to crack it. Strong passwords are longer, never use a single word, name, or phrase. Including uppercase letters, numerals, and special characters increase the strength. Never use an obvious password like 鈥減assword鈥, 鈥減assword123鈥, 鈥12345鈥, or any other really simple password.

What is two-factor authentication?

A means of protecting your accounts from unauthorized access and use. An account protected by two-factor authentication can only be access with correct username and password and then a second authentication factor such as a temporary code, a phone app, or other method of notification to prove that it鈥檚 actually you using your account.