RU Secure

Internet Technology Security for your Computing Environment

One of the most important aspects of information security is protecting critical information. Confidentiality, integrity and availability are the three predominant principles of information protection. Compromising these principles leaves systems and critical information in jeopardy.

  1. Confidentiality attacks compromise sensitive information (passwords, identifying files).
  2. Integrity attacks gain access to a system.
  3. Availability attacks neutralize alarms and defensive systems.

Faculty, staff and students are partners in creating a secure computing environment and reducing risk to these principles. The University Information Protection and Security Division has developed this web site and the Departmental Security Guide to assist in coordinating activities and policies that provide for a secure and protected computing environment.

Information For:


Not sure where to look? Try a search!