results for "overview"
Results 1-7 of 7
Results Per Page: 
General Information Disclaimer: BEFORE USING ANY Encryption Programs, please contact your Local TSP (Technology Support Professional) or IT Administrator / Contact. If you are required to or you do store sensitive information on an electronic device, you should protect yourself and the University by encrypting the data. You are able to ENCRYPT the Data ONLY WHEN...
Article Id: 6983

General Information Departments on LSU's campus have to abide by LSU policies, and various State and Federal laws and regulations. Departments may also be required to comply with industry regulations (e.g., Payment Card Industry) or contractual obligations for research and/or collaboration. There are various challenges that may be encountered while determining the level of...
Article Id: 12967

Data Classification Data at LSU can be classified into three categories (Confidential, Private or Public). Confidential data has a high level of sensitivity. Private data has a moderate level of sensitivity. Public data has a low level of sensitivity. Each category carries a different level of access and reputation risk. PS-124 Data Management outlines the security of data at LSU.
Article Id: 14852

Aliases PKI, SSL, secure web, HTTPS, certs, certificate authority, secure Email, Email encryption, web encryption Description Maintains a Certificate Authority at LSU to support SSL encryption for internal and public hosts of LSU and LSU System Universities with whom LSU has a MOU. Eligibility LSU Faculty & Staff Ordering & Request Procedures Forms or...
Article Id: 17572

The following article gives a brief overview of LSU's Public Key Infrastructure (PKI) system. What is a Public Key Infrastructure (PKI)? A PKI is a secure method for exchanging information over the Web. PKI's use a public and/or private key to encrypt IDs, documents, or messages. It starts with a Certificate Authority (CA), which issues digital certificates to users within the system....
Article Id: 194

Email headers: Fraudulent or Legitimate? Overview: Email is a quick and convenient method for communication, but it was never designed to be secure. When you receive a message, email clients and web services by default display information like who it is from, who it was sent to, etc. However, it is trivial for potential attackers to 'spoof' or 'forge' this information to make it...
Article Id: 16564

Most phishing scams can be avoided by sticking to these basic principles: 1. Treat ALL LINKS as if they are suspicious. (Links include Web Addresses & URLs) 2. Log in with your LSU PAWS ID at official lsu.edu...
Article Id: 17107

Provide Search Feedback Logo
Search Google Logo