Vulnerability Scanning
Vulnerability Scanning
Information Technology Services uses vulnerability scanning to help identify and prevent malicious activity on computers connected to a network.
Features
These tools focus on identifying possible incidents (such as personal data release), then log information about the incidents and attempt to stop them.
In today's environment, where anti-virus software does not stop all threats and even legitimate Web browsing can lead to a compromise, utilizing IPS are an important part of securing the University's IT infrastructure.
IPS incident focus includes:
• controllers of botnets, trojans, and rootkits (advanced viruses)
• providers of malware (e.g., malicious advertisements on legitimate websites)
• scans or exploits typically not blocked by firewalls
• adware on spyware that may leak information
• Denial of Service (DOS) attacks Best Practices Provided for all of campus for all network traffic entering and leaving campus.
Service News
More ITS service news
Customer Relations Manager
Ricky KeimDidn't find what you were looking for? Visit the full services catalog.