Information and Infrastructure Assurance Services
Attack Recognition and Mitigation
IIA offers network monitoring that can provide a department, unit, or research team with information about who is using the network, the applications being used, and when the network is used. This information is useful for detecting activity that indicates potential security and policy violations and for resolving these issues.
Educational Materials and Activities
IIA develops materials and activities to help educate the campus community on IT security topics. These materials include online how-to documentation for those who manage their own computer security and various events aimed at students, faculty and staff.
IIA has established an incident response team to provide the university with rapid identification, analysis, and response to an incident. Please report all incidents to the unit security coordinator designated by your school, college, or department or to your IT department. If you don't know where to report an incident, please contact email@example.com. For more information, see Report an IT Incident.
The ITS Listserv Service was retired on June 21, 2013. The Retirement of ITS Listserver Service (Lyris) page will remain available for a time for those who are interested in the retirement timeline and communication, as well as information about listserv alternatives.
Managed Security Services
IIA offers Managed Security Services to units needing assistance with performing information security coordination and administration activities. Through this program, one IIA Information Security Coordinator will work with the unit to provide consistent, reliable information security services, which are listed on Managed Security Services.
Network Intrusion Prevention System (IPS)—Planned for 2014
A network IPS will provide advanced threat detection and allow the university to extend protection to its wireless networks. For information about the status of this effort and more, see Network IPS Planned for 2014.
The ITS User Advocate works with the University of Michigan community to ensure that U-M information technology policies and guidelines are followed, and to respond to computer abuse and misuse of U-M electronic resources.
The User Advocate enforces compliance through a variety of means, including temporary denial of service or filing a formal complaint about a student with the Office of Student Conflict Resolution (OSCR).
Specifically, the User Advocate
Vulnerability scanning is a process of remotely examining hosts on a network for known, detectable vulnerabilities. IIA offers a free monthly scanning service to units that would like regular scans of their networks without the cost of maintaining their own local scanning infrastructure. This service is an appropriate option for networks that are accessible from campus, or where the scanner can be allowed through a firewall.
|Last modified July 30, 2013|