This website uses cookies to ensure site visitors get the best experience on our website. By continuing to use this site, you accept our use of cookies and Privacy Statement. To find out more, please visit Southern University's Privacy Statement.

I agree

Security Information

Security Information

Who We Are
Network Security Services researches new trends and industry happenings in order to protect the SU network. We monitor newsgroups and mailing lists for any new vulnerabilities which may affect SU network and its constituency. We keep up with these outbreaks in order to ensure that Southern University users are aware of possible problems and protect them appropriately.
 
Who We Do
• Analyze daily network scans. Contact Internet Service Providers regarding attacking machines. Investigate network traffic for possible break-ins. Aid in emergency response and disaster recovery, track down and resolve serious incidents, and coordinate with the campus judiciary system and law-enforcement agencies. Gather files for possible legal action and ensure compliance with chain of evidence procedures for use in court cases.

• Evaluate the security of Southern University's computers, networks, and data as well as personal workstations, through general network scans and other methods to determine current vulnerability status.

• Educate SUBR community on how to safely use technology. Identify and promote "best practices" regarding security of data and systems.

• Send alerts for current viruses, attacks, and other security vulnerabilities.

• Research and implement new ideas for classes and security initiatives.

• Review new communications applications and suggest secure applications for use at the University and in University projects. Institute campus standards for security, and review applicable policies and procedures in the context of these standards.
 
What We Can Do For You
1. Offer security related applications such as Tripwire, PGP and antivirus software.

2. Meet with departments to discuss security precautions and explain how to implement them.

3. Provide some assistance after security breaches. Work with departments on campus to create campus-wide standards for security and access control.

4. Scan new machines for any vulnerabilities before they are put on the network.

5. Arrange confidential meetings with anyone who is concerned about potential security problems or harassment.

6. Provide vendor product reviews.

7. Provide security-related consultation on new projects/ideas.

8. Recommend security-focused classes for system administrators and technical employees.

9. Teach specifically tailored classes on security topics by request. If there is some service that you would like and it is not listed here, please contact us and let us know. We are always open for new suggestions.