أغجاض±²¥

IT Security @ أغجاض±²¥

General Information

Getting your PC unblocked on the أغجاض±²¥ Network
Password Guidelines
Securely Deleting Electronic Information
Securing Your Desktop Computer
أغجاض±²¥ Spam/Phishing
Securing Your Computer & Protecting Your Information
Setting Up Windows Encryption
Setting Up Encryption on Mac
Exchanging Files Securely at أغجاض±²¥ - أغجاض±²¥ File Drop
Copyright & DMCA Issues at أغجاض±²¥
The أغجاض±²¥ VPN Service
Best Practices for Laptop Users

 

Information Security

If you suspect that your account has been compromised...
Securing Your Desktop Computer
Exchanging Files Securely at أغجاض±²¥ - أغجاض±²¥ File Drop
Setting Up Windows Encryption
Setting Up Encryption on Mac
Securely Deleting Electronic Information
Securing Your Computer & Protecting Your Information
أغجاض±²¥ File Drop
SEAR the Phish Resources

 

 

Security of Mobile Devices

Best Practices for Laptop Users
Securing Your Smartphones
Securing your iPad or Tablet Device
Mobile Phishing Tips
Mobile Device Security

 

             

SSH/SSL

Secure Logins using SSH/SSL
Secure Email Configurations

 

Policies

EP 2.210: Use and Management of Information Technology Resources Policy
EP 2.214: أغجاض±²¥ Information Security Policy
EP 2.215: أغجاض±²¥ Institutional Data Governance Policy
EP 7.208: Student Conduct Code
AP 7.022: Procedures Relating to Protection of the Educational Rights and Privacy of Students
AP 8.710: Credit Card Program
EP 8.200: Policy on Contracts and Signing Authority

 

Other Resources

University of Hawaii Information Security Web Site



 

 

 

   

 

Please rate the quality of this answer: Poor Fair Okay Good Excellent
Not the answer you were looking for? Try different keyword combinations and if you still can’t find your answer, please .
Article ID: 729
Created: Tue, 06 Mar 2007 9:16am
Modified: Fri, 17 Feb 2023 4:52pm