Information and Infrastructure Assurance Services
Attack Recognition and Mitigation
IIA offers network monitoring that can provide a department, unit, or research team with information about who is using the network, the applications being used, and when the network is used. This information is useful for detecting activity that indicates potential security and policy violations and for resolving these issues.
Disaster Recovery/Business Continuity Planning
Disaster recovery planning is a service offered by IIA to assist units in planning for reasonably foreseeable business interruptions and in taking appropriate, cost justifiable actions. To support units in their disaster planning efforts, IIA offers a Disaster Recovery/Business Continuity Planning service as a Michigan IT Security Service. For units who wish to conduct disaster planning efforts on their own, IIA provides a template and additional information about disaster recovery planning.
Educational Materials and Activities
IIA develops materials and activities to help educate the campus community on IT security topics. These materials include online how-to documentation for those who manage their own computer security and various events aimed at students, faculty and staff.
IIA has established an incident response team to provide the university with rapid identification, analysis, and response to an incident.
Managed Security Services
IIA offers Managed Security Services to units needing assistance with performing information security coordination and administration activities. Through this program, one IIA Information Security Coordinator will work with the unit to provide consistent, reliable information security services, which are listed on Managed Security Services.
Michigan IT Security Services
These services, available to U-M departments, can be ordered through the Michigan IT website. Details about the services are also available there.
Network Intrusion Prevention System (IPS)
Our network IPS provides advanced threat detection and allows the university to extend protection to its wireless networks. For details, see Network IPS Implementation.
IIA provides informational publications for the U-M leaders, the IT Security Community, and interested others. For current and back issues, as well as subscription information, see IIA Publications.
Each university unit must undergo regular risk analyses of all its sensitive and mission-critical computing environments according to a four-year cycle established by ITS. The responsibility for initiating these analyses has fallen to units in the past, but ITS has begun a transition to take this work on itself. ITS will assume this responsibility gradually, unit-by-unit, with the goal of assuming responsibility for initiating and conducting all unit risk assessments by 2015.
More information about this service is available on the Michigan IT Services Portal website as part of the IT Security Essential service. U-M's risk assessment methodology and tool, RECON, is adapted from security controls developed by the National Institute of Standards and Technology (NIST) (U.S. Department of Commerce).
The ITS User Advocate works with the University of Michigan community to ensure that U-M information technology policies and guidelines are followed, and to respond to computer abuse and misuse of U-M electronic resources.
The User Advocate enforces compliance through a variety of means, including temporary denial of service or filing a formal complaint about a student with the Office of Student Conflict Resolution (OSCR).
Specifically, the User Advocate
Vulnerability scanning is a process of remotely examining hosts on a network for known, detectable vulnerabilities. IIA offers several Vulnerability Scanning Services, including a free monthly scanning service to units that would like regular scans of their networks without the cost of maintaining their own local scanning infrastructure. This service is an appropriate option for networks that are accessible from campus, or where the scanner can be allowed through a firewall. IIA also provides quarterly vulnerability scans and vulnerability scanning tools for units.
|Last modified May 17, 2016|