<rss version="2.0"><channel><title>Updated Security Articles</title><link>https://grok.lsu.edu/</link><description>Updated Security articles!</description><ttl>60</ttl><item><title>DMCA &amp;amp; Illegal File Sharing</title><link>https://grok.lsu.edu/article.aspx?articleid=17129</link><description>   

   

   

 WHAT MAKES FILE SHARING ILLEGAL? 

 The Digital Millennium Copyright Act (DMCA) is a piece of legislation signed into law in 1998 defining the illegal downloading and/or sharing of copyrighted material. LSU is required to investigate DMCA complaints and take action to remove </description><guid>17129 Mon, 30 Mar 2026 08:08:27 GMT</guid><pubDate>Mon, 30 Mar 2026 08:08:27 GMT</pubDate></item><item><title>Advanced: Erasing SATA Drives by using the Linux hdparm Utility</title><link>https://grok.lsu.edu/article.aspx?articleid=16716</link><description>   General Information 

 Solid State Drives (SSDs) are quickly replacing traditional, mechanical, hard disk drives due to their higher speed, lower power consumption, lighter weight, and being more shock proof.  However, traditional whole disk erasing utilities like Darik's Boot and Nuke (DBAN) d</description><guid>16716 Mon, 23 Mar 2026 09:20:26 GMT</guid><pubDate>Mon, 23 Mar 2026 09:20:26 GMT</pubDate></item><item><title>FERPA: Legislation and Confidentiality of Records</title><link>https://grok.lsu.edu/article.aspx?articleid=6644</link><description> Legislation and Confidentiality of Records   

 The Family Educational Rights and Privacy Act  (FERPA)    

 The  F amily  E ducational  R ights and  P rivacy  A ct of 1974, also known as the Buckley Amendment, is a federal law that protects the privacy of student “education records.” “Educatio</description><guid>6644 Tue, 10 Feb 2026 07:27:51 GMT</guid><pubDate>Tue, 10 Feb 2026 07:27:51 GMT</pubDate></item><item><title>Security at LSU: Finding Sensitive Data</title><link>https://grok.lsu.edu/article.aspx?articleid=8037</link><description> Security of Data Policy Statement 

 In accordance with    PS-124 Data Management   , it is essential that  confidential and/or private data  be protected. It is very important to understand that  confidential and/or private data    could exist on your computer hard drive. When there is a loss of</description><guid>8037 Tue, 03 Feb 2026 08:08:26 GMT</guid><pubDate>Tue, 03 Feb 2026 08:08:26 GMT</pubDate></item><item><title>Public Key Infrastructure (PKI) at LSU: General Information</title><link>https://grok.lsu.edu/article.aspx?articleid=194</link><description> Public Key Infrastructure (PKI): General Information 

  
What is a Public Key Infrastructure (PKI)? 

 A Public Key Infrastructure uses a chain of Certificate Authorities to create digitally signed certificates for asymmetric encryption. Signed certificates are part of a chain of trust that c</description><guid>194 Wed, 28 Jan 2026 12:04:21 GMT</guid><pubDate>Wed, 28 Jan 2026 12:04:21 GMT</pubDate></item><item><title>PKI Certificates: LSU Overview</title><link>https://grok.lsu.edu/article.aspx?articleid=17572</link><description> 
 Aliases 

 PKI, SSL, TLS, secure web, HTTPS, certs, certificates, certificate authority, web encryption 

 Description 

 Provides access to certificates signed by a Certificate Authority to support TLS encryption for internal and public hosts of LSU and LSU System Universities with whom L</description><guid>17572 Tue, 13 Jan 2026 07:11:01 GMT</guid><pubDate>Tue, 13 Jan 2026 07:11:01 GMT</pubDate></item><item><title>Recommendations: SSL/TLS Protocols and Cipher Suites</title><link>https://grok.lsu.edu/article.aspx?articleid=17596</link><description> Note: SSLv3 or older protocols as well as TLS 1.0 and 1.1 should no longer be used. Use TLS 1.2 should be used instead. 

  ? Recommendations for Microsoft Internet Information Services (IIS): 

 Changing the SSL Protocols and Cipher Suites for IIS involves making changes to the registry. It is</description><guid>17596 Tue, 06 Jan 2026 07:03:20 GMT</guid><pubDate>Tue, 06 Jan 2026 07:03:20 GMT</pubDate></item><item><title>Security Encryption: LSU Overview</title><link>https://grok.lsu.edu/article.aspx?articleid=6983</link><description> General Information 

   Disclaimer:    BEFORE  USING ANY Encryption Programs, please contact your Local TSP (Technology Support Professional) or IT Administrator / Contact.  

 If you are required to or you do store sensitive information on an electronic device, you should protect yourself and</description><guid>6983 Tue, 06 Jan 2026 07:02:17 GMT</guid><pubDate>Tue, 06 Jan 2026 07:02:17 GMT</pubDate></item><item><title>Web Browsers: Update Browsers &amp;amp; Manage Add-ons</title><link>https://grok.lsu.edu/article.aspx?articleid=16342</link><description> Keep Web Browsers Up-to-Date 

 Most  Web Browser Updates  address  Security Vulnerabilities  and  Critical Issues  that  NEED  to be resolved.  It is   VERY IMPORTANT   that these are kept up-to-date.  These instructions will show  How to   keep your Web Browser updated . 
  

   

 1. Open</description><guid>16342 Tue, 02 Dec 2025 09:41:31 GMT</guid><pubDate>Tue, 02 Dec 2025 09:41:31 GMT</pubDate></item><item><title>Securing Your Home Network</title><link>https://grok.lsu.edu/article.aspx?articleid=20095</link><description> The following are some basic recommendations from LSU ITS regarding how to secure your home network. 

 Turn On Your Firewall 

 
	 Firewalls can be hardware or software 
	 Hardware firewalls plug directly into your modem and can be used to protect multiple computers. These are used more freq</description><guid>20095 Mon, 22 Sep 2025 07:51:31 GMT</guid><pubDate>Mon, 22 Sep 2025 07:51:31 GMT</pubDate></item><item><title>Report Phishing E-mail</title><link>https://grok.lsu.edu/article.aspx?articleid=19636</link><description>  Report Phishing E-mails  

 Phishing emails are malicious messages that attempt to trick recipients into providing sensitive information or performing fraudulent tasks. Users can report any suspicious or malicious message to LSU IT Security and Policy (ITSP) for review through the  Report  optio</description><guid>19636 Mon, 22 Sep 2025 07:50:45 GMT</guid><pubDate>Mon, 22 Sep 2025 07:50:45 GMT</pubDate></item><item><title>PKI - Import AAA Certificate Services on Windows Systems</title><link>https://grok.lsu.edu/article.aspx?articleid=16562</link><description>   This article is intended for Windows 10 and Windows Server 2012 and up. There may be slight graphical or interface differences between different versions of Windows 10 or Windows Server, but the steps should remain mostly the same. 

 Import CA Certificate 

 The root Certificate Authority(CA</description><guid>16562 Mon, 08 Sep 2025 12:03:23 GMT</guid><pubDate>Mon, 08 Sep 2025 12:03:23 GMT</pubDate></item><item><title>Security Access Detail - Database Objects Needed</title><link>https://grok.lsu.edu/article.aspx?articleid=17434</link><description> Security Access Detail - Database Objects Needed 

  Tables:  
Current_* (move data from MAPP01) 
Security_Access_Detail 
Security_Access_SODetai 
SecurityMap* (move data from MAPP01) 

  Stored Procs:  
All common to Security Access Detail 

  View:  
Security* </description><guid>17434 Thu, 04 Sep 2025 08:19:49 GMT</guid><pubDate>Thu, 04 Sep 2025 08:19:49 GMT</pubDate></item><item><title>E-mail: Obtain the E-mail Header Message (By Client)</title><link>https://grok.lsu.edu/article.aspx?articleid=14922</link><description>  E-mail: Obtain the E-mail Headers  

 Email headers contain important diagnostic information about the route an email message takes and the results of different security and authenticity checks. 

 When reporting a message through the   Report Phishing option in Outlook  , the message and all </description><guid>14922 Thu, 28 Aug 2025 08:11:49 GMT</guid><pubDate>Thu, 28 Aug 2025 08:11:49 GMT</pubDate></item><item><title>UECM PXE Image Deployment</title><link>https://grok.lsu.edu/article.aspx?articleid=20488</link><description> Imaging through System Center: PXE Booting 

 1. Before attempting to PXE boot, verify that network stack boot options are enabled in the BIOS. This may look different depending on the manufacturer and age of the machine. Picture below is the BIOS option for a Dell from the year 2019, where the s</description><guid>20488 Mon, 18 Aug 2025 13:37:28 GMT</guid><pubDate>Mon, 18 Aug 2025 13:37:28 GMT</pubDate></item><item><title>Security: Passphrases &amp;amp; Passwords</title><link>https://grok.lsu.edu/article.aspx?articleid=16865</link><description>  
A password is a common form of authentication and is often the only barrier between you and your personal information. There are several tools that attackers use to assist in guessing or cracking a password. By creating a complex password and keeping it confidential, you make it more difficult f</description><guid>16865 Mon, 18 Aug 2025 12:38:36 GMT</guid><pubDate>Mon, 18 Aug 2025 12:38:36 GMT</pubDate></item><item><title>Security Reviews: LSU Overview</title><link>https://grok.lsu.edu/article.aspx?articleid=12967</link><description> 
 General Information 

 Departments on LSU's campus have to abide by LSU policies, and various State and Federal laws and regulations. Departments may also be required to comply with industry regulations (e.g., Payment Card Industry) or contractual obligations for research and/or collaboration.</description><guid>12967 Mon, 11 Aug 2025 11:16:43 GMT</guid><pubDate>Mon, 11 Aug 2025 11:16:43 GMT</pubDate></item><item><title>Training - Security Education and Awareness</title><link>https://grok.lsu.edu/article.aspx?articleid=12123</link><description> Promotes IT security and policy awareness through training seminars, forums, publications, notifications, articles and other instructional/informational resources. 

 
 Service Name 

 Training - Security Education and Awareness 

 Service Type 

 Service 

 Internal/External/Both 

 B</description><guid>12123 Mon, 04 Aug 2025 09:53:44 GMT</guid><pubDate>Mon, 04 Aug 2025 09:53:44 GMT</pubDate></item><item><title>Data Management: Overview</title><link>https://grok.lsu.edu/article.aspx?articleid=14852</link><description>  Data Classification  

 Data at LSU can be classified into three categories (Confidential, Private or Public). Confidential data has a high level of sensitivity. Private data has a moderate level of sensitivity. Public data has a low level of sensitivity. Each category carries a different level </description><guid>14852 Tue, 22 Jul 2025 15:28:21 GMT</guid><pubDate>Tue, 22 Jul 2025 15:28:21 GMT</pubDate></item><item><title>Louisiana Database Security Breach Notification Law (Act 499 of 2005 Regular Session)</title><link>https://grok.lsu.edu/article.aspx?articleid=17089</link><description> Louisiana Database Security Breach Notification Law (Act 499 of 2005 Regular Session) 

 The privacy and financial security of individuals are increasingly at risk due to the widespread collection of personal information. As a result, over 30 states, including Louisiana, have passed laws that req</description><guid>17089 Thu, 17 Jul 2025 13:25:55 GMT</guid><pubDate>Thu, 17 Jul 2025 13:25:55 GMT</pubDate></item><item><title>PKI - Import USERTrust Intermediate Certificate on Windows Systems</title><link>https://grok.lsu.edu/article.aspx?articleid=16563</link><description> Import USERTrust Intermediate Certificate: 

  This article is intended for Windows 10 and Windows Server 2012 and up.  There may be slight graphical or interface differences between different versions of Windows 10 or Windows Server, but the steps should remain mostly the same.  

 USERTrust i</description><guid>16563 Mon, 14 Jul 2025 13:56:48 GMT</guid><pubDate>Mon, 14 Jul 2025 13:56:48 GMT</pubDate></item><item><title>Health Insurance Portability and Accountability Act of 1996 (HIPAA)</title><link>https://grok.lsu.edu/article.aspx?articleid=17088</link><description> Health Insurance Portability and Accountability Act of 1996 (HIPAA) 

 The Health Insurance Portability and Accountability Act, enacted by Congress in 1996, was intended to create a national standard for the protection of personally identifiable information relating to health care. HIPAA requires</description><guid>17088 Mon, 14 Jul 2025 13:55:29 GMT</guid><pubDate>Mon, 14 Jul 2025 13:55:29 GMT</pubDate></item><item><title>Linux IAAS SLA</title><link>https://grok.lsu.edu/article.aspx?articleid=17667</link><description>   

 Linux IAAS SLA 

   Introduction   

  This document is to establish the Service Level Agreement for LSU’s Linux-based IAAS (Infrastructure as a Service).   
  

   Service Availability   

  ITS does not currently guarantee a service availability target but strives to maintain 99.9</description><guid>17667 Mon, 30 Sep 2024 08:39:33 GMT</guid><pubDate>Mon, 30 Sep 2024 08:39:33 GMT</pubDate></item></channel></rss>