Encryption plays a key role in keeping information safe by ensuring that it can't be obtained through theft or eavesdropping. As part of its overall program to ensure appropriate measures to protect PII and other sensitive data in a robust and least-intrusive manner, Arizona State University provides requirements for encrypting data in transit and storage.
ASU’s data and applications are stored and deployed in increasingly complex IT environments. Based on the data classification type (Public, Internal, Sensitive, Highly Sensitive), Arizona State University implements encryption with various data storage strategies.
ASU provided recommendations and step-by-step instructions to achieve a given goal or mandate.
The most effective and efficient proven techniques, procedures and methods to protect the ASU network and the university community on your remote devices.
Routine things we do every day put us at risk of identity theft. Students are often especially vulnerable because their personal information is more available and they may not be as aware of the need to protect it.
ASU continues to drive forward into the globalization of IT and respective support. The following documents are tools that are available to units that wish to establish international remote workers, while carefully assessing the associated risks.
To prevent hacking of devices connected over the internet, known as Internet of Things(IoTs), ASU provides various security measures.
Arizona State University advocated tactics, techniques and procedures to protect against attacks over the internet on your devices.
ASU leverages the Splunk enterprise logging management tool for collecting system logs across the organization. System logging is ingested into Splunk from each endpoint that is running the Splunk Universal Forwarder.
Physical Security is essential to protect the organization’s assets and facilities. Arizona State University recommends various measures to prevent potential physical security threats.
A library of policies to elevate development standards, protect information, and secure data infrastructure.
Arizona State University cyber security tips on Do’s and Don’ts.
Telecommuting, mobile and travel security guidance ensure protection of ASU’s information assets and technology infrastructure.