Security Computing and Student Privacy and Identity Theft There are important things that you can do to protect your own personal identity and there are critical tasks that anyone who works with university data must be aware of. Privacy and Identity Theft Social Networking Social networking sites, sometimes referred to as "friend-of-a-friend" sites, build upon the concept of traditional social networks where you are connected to new people through people you already know. Social Networking Spam and Scams Everyone hates spam. About 90% of the email sent around the world is classified as spam. Spam and Scams Cyber Security and Safety Tips Links to US-CERT publications. These are excellent resources for anyone who is concerned about cyber security. Cyber Security and Safety Tips Cyber Awareness Cyber security involves protecting that information by preventing, detecting, and responding to attacks. Cyber Awareness
Privacy and Identity Theft There are important things that you can do to protect your own personal identity and there are critical tasks that anyone who works with university data must be aware of. Privacy and Identity Theft
Social Networking Social networking sites, sometimes referred to as "friend-of-a-friend" sites, build upon the concept of traditional social networks where you are connected to new people through people you already know. Social Networking
Spam and Scams Everyone hates spam. About 90% of the email sent around the world is classified as spam. Spam and Scams
Cyber Security and Safety Tips Links to US-CERT publications. These are excellent resources for anyone who is concerned about cyber security. Cyber Security and Safety Tips
Cyber Awareness Cyber security involves protecting that information by preventing, detecting, and responding to attacks. Cyber Awareness