Prevent damage to, protect, and restore information and information systems by ensuring their availability, integrity, authentication, and confidentiality.
Information systems include, but are not limited to:
- Electronic communications systems/services
- Smart Phones / tablets
- Removable media (USB drives, CDs, etc.)
All of us are targets for cyber crime!
Traditional methods for protecting information are very effective:
- Identify critical information that requires protection
- Define vulnerabilities
- Develop realistic and effective countermeasures
- Focus on sensitive or restricted information critical to the adversary and their purposes and objectives
IT security at KU is a partnership between KU's Information Technology Security Office (ITSO), GO&S, and users of systems. The Both ITSO and GO&S provide security information, analysis, risk management and mitigation, awareness and guidance to help protect the University's information assets and technology environment.
For information about information technology security at KU, or want to schedule cyber training, contact the IT Security Office (ITSO) at 785-864-9003 or email@example.com.