Information Security

Articles (17)

Pinned Article Acceptable Use of Computing Resources Policy: Addendum

Amendments to State of Oregon Policies on Acceptable Use of State Electronic Information Systems (Version 3: 8/1/97).

Pinned Article UO Acceptable Use of Computing Resources Policy

This document presents policies for acceptable use of University of Oregon computing resources. It neither reduces nor expands existing acceptable-use policies, but merely clarifies and illustrates the sorts of behaviors that may result in a response by the university or other interested parties.

Account Security and What to Do if Your Account is Compromised

This article contains information on Preventing an account compromise as well as how to regain access once an account is compromised.

Email Spoofing FAQ

This is a FAQ article regarding email spoofing.

How to create a strong password

Creating a strong password might seem like a daunting task. Here are some recommendations that can help you.

Information Security recommendations before, while and after returning from traveling abroad.

List of recommendations for users planning to travel abroad with computing resources.

Installing McAfee Management Agent

Guide to installing the McAfee Management Agent.

KRACK wifi vulnerability affecting wireless devices.

Background: On October 16, 2017, security researchers disclosed a flaw in the WPA2 protocol used to secure wireless communications. Impact: Any product that communicates over WiFi and uses WPA or WPA2 to encrypt that traffic is vulnerable. This includes nearly all mobile devices, computers, connected home devices, and wireless access points and routers. Communications between vulnerable devices could be decrypted and hijacked.

McAfee VirusScan

How to install McAfee VirusScan and McAfee Agent.

Privacy Matters: Protect Before You Connect

Information of how to protect your information from hackers and identity thieves.

SSL Certificates

Info on SSL certificates.

Technical guide: Meltdown and Spectre security vulnerabilities

Meltdown and Spectre are two recently-disclosed vulnerabilities present in many modern CPUs. These vulnerabilities may allow an untrusted webpage or client process to completely compromise the computer. Complete compromise could allow password theft, document theft, document deletion, malware installation, and other malfeasance.

Tips to help determine if a suspicious email is malicious

The University community is often the target of unwanted email messaging campaigns requesting that the user visit a web site and enter their credentials in order to address an urgent issue with their accounts, banking records, student information, employee records. This knowledge-base article will provide you with ten (10) basic tips that everyone can follow to help discern whether an email message is face.

TLS 1.2 support in common communication applications

A table of minimum client versions of common communications software

Uninstalling McAfee Enterprise in Windows

Steps for uninstalling McAfee Enterprise in windows.

Ways to test your server for SSL vulnerabilities

Self-testing for SSL vulnerabilities can be performed via several methods. Each of these methods gives visibility into slightly different facets of the SSL configuration and posture of the server.