The LSA Infrastructure group provides the following security-related services for the College of LSA. In the near future, we will be providing security best practices and how-to documentation on this site. In the meantime, if you need immediate assistance, please send an email request to email@example.com and one of our data security analysts will respond within 4 hours.
Audit Logs and Monitoring
Configure servers, firewalls, networks, and other computer devices to ensure that audit logs are appropriately configured and maintained. Analyze, monitor, and respond to events indicating potential misuse and/or intrusion of LSA computing resources.
Education, User Awareness and Consulting
We provide documentation, face-to-face consultation and training regarding safe computing and data protection.
Serves as a point of contact between LSA and IIA in the evaluation, investigation, and recording of information security incidents. Participates in auditing, reviewing, reporting and containing IT security events.
Scanning, identifying, reporting and remediating security vulnerabilities allows us to provide high-level of security support for the College. This includes patching operating systems and applications, scanning web sites to detect vulnerable code, and coordinating risk assessments and risk treatment plans.