Information Security

Categories (1)

Articles (31)

Account Security and What to Do if Your Account is Compromised

This article contains information on preventing an account compromise as well as how to regain access once an account is compromised.

Adding a Custom Attribute to an IP address in Netdot

This document guides you through the process of using custom attributes to tag IP addresses and IP address block with identifying tags than can be used for specific processing by the Information Security Office (ISO)

Android Security Guidelines

Recommendations to secure an Android device.

Avoiding COVID-19 cyberscams

This page provides tips to for protecting yourself against online scams related to COVID-19.

Data Handling Quick Reference

This article is a quick reference for how to handle, transmit and dispose of sensitive data.

Data Security in UO Collaboration Tools

This is a quick reference table that shows the data sensitivity levels allowed in UO Collaboration tools.

Doxing and protection

What is Doxxing, how do we avoid it, and respond if it should happen.

Email Spoofing FAQ

This is a FAQ article regarding email spoofing.

General Data Protection Regulation (GDPR)

This article is an introduction of Europe's General Data Protection Regulation for individuals in the states interested in compliance laws and data rights. Additional links are available for students or staff curious about the University of Oregon's data classifications and standards.

Home Computing Security Guidelines

This article provides a high level overview of securing home networks with links to specific articles.

Home Wi-Fi Network Security Guidelines

This article contains security recommendations for home Wi-Fi networks.

How to Create a Strong Password

Creating a strong password might seem like a daunting task. Here are some recommendations that can help you.

How to Use PhishAlarm in Outlook

The following article discusses how to add and use PhishAlarm on Outlook 365.

Information Security recommendations before, while and after returning from traveling abroad.

List of recommendations for users planning to travel abroad with computing resources.

iOS Security Guidelines

Security recommendations for iOS devices including iPads, iPhones, and iPods.

IoT Security Guidelines

This article provides guidance on securing personal IoT devices

KRACK wifi vulnerability affecting wireless devices.

Background: On October 16, 2017, security researchers disclosed a flaw in the WPA2 protocol used to secure wireless communications. Impact: Any product that communicates over WiFi and uses WPA or WPA2 to encrypt that traffic is vulnerable. This includes nearly all mobile devices, computers, connected home devices, and wireless access points and routers. Communications between vulnerable devices could be decrypted and hijacked.

LTI Assessment Procedure

This procedure seeks to ensure that Learning Tool Integrations (LTIs) with the UO’s Academic Learning Management System (LMS) are appropriately assessed and documented to protect the confidentiality, integrity and availability of the data.

Mobile Device Security Guidelines

This article provides an overview of how to secure a personal mobile device.

Personal Computer Security Guidelines for Windows

Security best practices and guidelines for personally owned computers running the Windows operating system.

Privacy Matters: Protect Before You Connect

Information of how to protect your information from hackers and identity thieves.

SSL Certificates

Info on SSL certificates.

Technical guide: Meltdown and Spectre security vulnerabilities

Meltdown and Spectre are two recently-disclosed vulnerabilities present in many modern CPUs. These vulnerabilities may allow an untrusted webpage or client process to completely compromise the computer. Complete compromise could allow password theft, document theft, document deletion, malware installation, and other malfeasance.

Tips to help determine if a suspicious email is malicious

The University community is often the target of unwanted email messaging campaigns requesting that the user visit a web site and enter their credentials in order to address an urgent issue with their accounts, banking records, student information, employee records. This knowledge-base article will provide you with ten (10) basic tips that everyone can follow to help discern whether an email message is face.

TLS 1.2 support in common communication applications

A table of minimum client versions of common communications software

Traveling Outside the United States - Loan Program (Equipment)

If you are traveling for work to one or more countries that are deemed to pose high information security risks, take a loaner laptop and smartphone to help keep intellectual property—yours and the university’s—safer

Ways to test your server for SSL vulnerabilities

Self-testing for SSL vulnerabilities can be performed via several methods. Each of these methods gives visibility into slightly different facets of the SSL configuration and posture of the server.