Information Security Consulting Request

Service Description

The Information Security Office provides information security consulting and services for the following types of requests (and others):

Type of Request Type of Request
Compromised account investigation Compromised System Investigation
DNS Blocking Reachability Assessment
Log Analysis Update Authorized Quarantine Users
Traffic Analysis Vulnerability Assessment
Data Exposure Zoombombing
Malware Other (please describe)
Storing HIPAA data --

How to Create a Ticket

To request security consultation Create a Ticket (top right of the page) and provide a detailed description of your request.

Available To

All UO Staff, Faculty, and Students.

Questions

If you have any additional questions contact infosec@uoregon.edu

[back to top]

 
Create a Ticket

Related Articles (4)

Amendments to State of Oregon Policies on Acceptable Use of State Electronic Information Systems (Version 3: August 1, 1997).
How to use Copilot responsibly at UO.
The UO community is often the target of unwanted email messaging campaigns requesting that the user visit a website and enter their credentials in order to address an urgent issue with their accounts, banking records, student information, and employee records. This knowledge base article will provide you with ten (10) basic tips that everyone can follow to help discern whether an email message is face.
This document presents policies for acceptable use of University of Oregon computing resources. It neither reduces nor expands existing acceptable-use policies, but merely clarifies and illustrates the sorts of behaviors that may result in a response by the university or other interested parties.