LogRhythm-SIEM allows the Office of Cybersecurity to monitor the network for security threats and intrusions.
Infrastructure and services that provide security, data integrity, and compliance for institutional activities.
It is designed to secure and manage all Apple OS on the domain and provides the ITS department and other divisions with hardware and software information. It is also used to deploy patches and other software updates to campus computers.
The UTHSC System Center Configuration Manager (SCCM) server monitors Windows computers on the domain and provides the ITS department and other divisions with hardware and software information. It is also used to deploy patches and other software updates to campus computers. The system can also be utilized for imaging computers in an efficient and effective… Read More
Computer forensics is the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. Forensics Analysis provides the user with detailed findings in the areas of: Intellectual property theft… Read More
Hardware can be physically sequestered by the Office of Cybersecurity upon request of authorized personnel or due to incident or threat. Sequestration involves the physical removal of said machine. The Office of Cybersecurity will review the contents of the hard drive. A copy of the hard drive will be produced. Machine can be wiped upon… Read More
What is a NetID? All students, faculty, staff, and authorized guests at the University of Tennessee are provided with a Network Identifier/NetID (username) and password when they join the university. A NetID permits secure access to a variety of applications and services, including: UT Email, Microsoft Office 365, MyUT, wireless access, Banner, Blackboard, and UT… Read More
The Office of Cybersecurity and ITS Standards and Practices are created and updated when necessary. These Standards and Practices set guidelines and rules for the campus and ITS Staff regarding Security and Technology requirements. Standards and Practices are reviewed and approved by the Office of Cybersecurity, the CISO, department heads as applicable, and the CIO.
An effective risk management process is an important component of a successful IT security program. The principal goal of UTHSC’s risk management process is to protect the organization and its ability to perform the mission. The Office of Cybersecurity offers to lead data and system owners through a risk management process of identifying, analyzing, evaluating… Read More
The UT Vault (also known as UT Secure Courier) is a secure file transfer application that allows users to easily send large files, including executables, quickly and securely. Files are uploaded and downloaded via SSL encrypted HTTP and stored in an encrypted data store. Using the UT Vault is as easy as sending an email with… Read More
The Office of Cybersecurity assists data and system owners in the assessment and measurement of current security controls, policies, and best practices in specific UTHSC departments, colleges, areas, clinics, and other UTHSC-owned entities. Assessments are reviewed by the Office of Cybersecurity. After review process is complete, the Office of Cybersecurity will make suggestions to said… Read More
Users report threats (phishing, spam, etc.) to the Office of Cybersecurity by various means such as via firstname.lastname@example.org or contacting the ITS helpdesk or the Office of Cybersecurity directly. The team researches the threat and responds appropriately.