Security Reviews and Assessments
The IT Security Office will conduct evaluations of computer systems and facilities to ensure they are appropriately secured and meet all applicable regulations regarding the security of information....
View ArticleVideo Surveillance
The technical implementation of video surveillance systems will, over time be standardized using the Milestone system, as implemented by Facilities Management (FM) and ITS; with connectivity and...
View ArticleTechnology Assisted Stalking, Harassment and Intimidation
Technology assisted stalking, harassment and intimidation can happen to anyone, but you are not alone. The University of Iowa is committed to maintaining an environment that recognizes the inherent...
View ArticleElectronic Door Access Automation
Electronic Door Access Automation provides the ability for colleges, departments and other University organizations to automate electronic door access rights assignment for individuals based on...
View ArticlePassword Vault
Password vault uses software application from Click Studios called Passwordstate. Passwordstate is a web-based solution for the secure management of passwords, certificates, and documents for both...
View ArticleVulnerability Scanning & Penetration Testing
The Managed Vulnerability Detection Service offered by the Information Security & Policy Office can be requested for ad-hoc assessment of workstations and servers on campus. We use this service for...
View ArticleTLS Certificates for Secure Communications
A service whereby owners of production UI web servers with requirements for enhanced security can obtain a TLS certificate at no cost to the requesting department. Fees apply to non UI entities or...
View ArticleSecureCRT
SecureCRT is a terminal emulator for secure access to UNIX, Linux, or VMS applications from Windows, Mac, and Linux. SecureCRT lets you manage many sessions at once. SecureCRT automates routine tasks....
View ArticleFirewall
A firewall is similar to a security system which protects your computer from the outside world and others on your network. It filters incoming Internet traffic while allowing you (and those behind your...
View ArticleIT Security Information
> > Report a Security Incident < <NOTICE: Several variations of fraudulent e-mail messages claiming to be from UIOWA Support, UIOWA.EDU, Webmaster@uiowa, etc. have been reported over the...
View Article
More Pages to Explore .....