results for "security"
Results 21-30 of 195
Results Per Page: 
General Information Disclaimer: BEFORE USING ANY Encryption Programs, please contact your Local TSP (Technology Support Professional) or IT Administrator / Contact. If you are required to or you do store sensitive information on an electronic device, you should protect yourself and the University by encrypting the data. You are able to ENCRYPT the Data ONLY WHEN...
Article Id: 6983



A password is a common form of authentication and is often the only barrier between you and your personal information. There are several tools that attackers use to assist in guessing or cracking a password. By creating a complex password and keeping it confidential, you make it more difficult for hackers to gain unauthorized access to your information. Why do I need a Password? ...
Article Id: 16865

Networking Resources: Use Of Computing Resources This is LSU's General Policy for Computer Users' Responsibilities. GENERAL POLICY Use of the University’s computing resources and network capacity is a privilege, not a right. LSU may limit access to and/or review and monitor its computing resources and the use of computing resources, without notice to or authorization from the...
Article Id: 7102

Data Classification Data at LSU can be classified into three categories (Confidential, Private or Public). Confidential data has a high level of sensitivity. Private data has a moderate level of sensitivity. Public data has a low level of sensitivity. Each category carries a different level of access and reputation risk. PS-124 Data Management outlines the security of data at LSU.
Article Id: 14852

Connect an Android Device to LSU's eduroam Wireless Network 1. Open Settings and tap Wi-Fi if it is not already toggled on. 2. Under Wi-Fi networks you will see a list of available networks. Tap eduroam if it is listed. ( NOTE : If you do not see eduroam in your list, Manually Configure your Device ) 3. In the dropdown menu...
Article Id: 17396

General Information Solid State Drives (SSDs) are quickly replacing traditional, mechanical, hard disk drives due to their higher speed, lower power consumption, lighter weight, and being more shock proof. However, traditional whole disk erasing utilities like Darik's Boot and Nuke (DBAN) do not work well with SSDs because the placement of data blocks is not as predictable as...
Article Id: 16716

General Information The Office of Finance and Administrative Services is responsible for the implementation of PS-113 (Social Security Policy) with respect to personnel and payroll records. Here are some of the current Frequently Asked Questions. Frequently Asked Questions When appointing student assistants do the departments need to keep copies of the I-9 forms, tax...
Article Id: 13485

Email headers: Fraudulent or Legitimate? Overview: Email is a quick and convenient method for communication, but it was never designed to be secure. When you receive a message, email clients and web services by default display information like who it is from, who it was sent to, etc. However, it is trivial for potential attackers to 'spoof' or 'forge' this information to make it...
Article Id: 16564

Provide Search Feedback Logo
Search Google Logo