{"id":2337,"date":"2012-03-28T12:49:11","date_gmt":"2012-03-28T16:49:11","guid":{"rendered":"https:\/\/www.bumc.bu.edu\/it\/?page_id=2337"},"modified":"2012-05-01T10:44:05","modified_gmt":"2012-05-01T14:44:05","slug":"services","status":"publish","type":"page","link":"https:\/\/www.bumc.bu.edu\/it\/infosec\/services\/","title":{"rendered":"Security Services"},"content":{"rendered":"<p><a title=\"About Information Technology\" href=\"https:\/\/www.bumc.bu.edu\/it\/support\/bumc-it\/about\/\">BUMC IT<\/a> and <a href=\"http:\/\/www.bu.edu\/tech\">BU IS&amp;T<\/a> work together to offer a wide range of services to ensure the security of Boston University&#8217;s information and technology resources. We offer you a wide variety of resources and tools as well as free consulting services and help with your questions about security.\u00a0While some of our services are provided behind the scenes, your\u00a0<a title=\"Login Name &amp; Kerberos Password\" href=\"https:\/\/www.bumc.bu.edu\/it\/comm-collab\/accounts\/login\/\">BU login name and Kerberos password<\/a> provide you access to many services, resources, and tools you can use to protect your valuable information and computers from compromise. <em>(<strong>Note<\/strong>:\u00a0All links will open in a new window.)<\/em><\/p>\n<table border=\"0\">\n<tbody>\n<tr>\n<td>\n<h5 style=\"font-size: 13px; line-height: 19px;\"><a title=\"Safe Computing\" href=\"https:\/\/www.bumc.bu.edu\/it\/infosec\/safe-computing\/\"><strong>Safe Computing<\/strong><\/a><\/h5>\n<ul style=\"font-size: 13px; line-height: 19px;\">\n<li><a title=\"Safe Computing Essentials\" href=\"https:\/\/www.bumc.bu.edu\/it\/infosec\/safe-computing\/essentials\/\" target=\"_blank\">Safe Computing Essentials<\/a><\/li>\n<li><a title=\"Computer Security Recommendations\" href=\"https:\/\/www.bumc.bu.edu\/it\/infosec\/safe-computing\/recommendations\/\">Computer Security Recommendations<\/a><\/li>\n<li><a title=\"Spoofed Messages &amp; Phishing\" href=\"https:\/\/www.bumc.bu.edu\/it\/comm-collab\/e-mail\/unwanted-email\/phishing\/\">Spoofed E-mails &amp; Phishing<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/desktop\/virus-protection-security\/safe-computing\/firewall\/\" target=\"_blank\">Personal Firewalls<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/desktop\/virus-protection-security\/safe-computing\/autoupdate\/\">Windows Update<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/police\/safety\/laptop\/index.shtml\">Register your Laptop with the BUPD<\/a><\/li>\n<\/ul>\n<\/td>\n<td>\n<h5 style=\"font-size: 13px; line-height: 19px;\"><strong><a title=\"Virus Protection &amp; Security\" href=\"https:\/\/www.bumc.bu.edu\/it\/infosec\/prevention\/\">Virus Protection &amp; Security<\/a><\/strong><\/h5>\n<ul style=\"font-size: 13px; line-height: 19px;\">\n<li><a title=\"What is Malware?\" href=\"https:\/\/www.bumc.bu.edu\/it\/infosec\/prevention\/malware\/\">What is Malware?<\/a><\/li>\n<li><a title=\"Virus, Spyware and Malware Removal\" href=\"https:\/\/www.bumc.bu.edu\/it\/infosec\/prevention\/removal\/\" target=\"_blank\">Virus, Spyware and Malware Removal<\/a><\/li>\n<li><a title=\"Additional Prevention Tools\" href=\"https:\/\/www.bumc.bu.edu\/it\/infosec\/prevention\/tools\/\">Additional Prevention Tools<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/desktop\/virus-protection-security\/mcafee\/\">McAfee VirusScan (free download)<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h5 style=\"font-size: 13px; line-height: 19px;\"><a href=\"http:\/\/www.bu.edu\/tech\/security\/advisories\/\"><strong>Advisories &amp; Alerts<\/strong><\/a><\/h5>\n<ul style=\"font-size: 13px; line-height: 19px;\">\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/advisories\/internal\/\">BU Security Advisories<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/advisories\/external\/\">External Advisories &amp; Resources<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/advisories\/email\/\">Security Mailing Lists<\/a><\/li>\n<\/ul>\n<\/td>\n<td>\n<h5 style=\"font-size: 13px; line-height: 19px;\"><a href=\"http:\/\/www.bu.edu\/tech\/security\/incidents\/\"><strong>Incident Detection &amp; Response<\/strong><\/a><\/h5>\n<ul style=\"font-size: 13px; line-height: 19px;\">\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/incidents\/reporting\/\" target=\"_blank\">Reporting an Incident<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/incidents\/copyright\/\">Digital Millennium Copyright Act<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/incidents\/forensics\/\">Digital Forensics<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/incidents\/ids\/\">Intrusion Detection<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h5 style=\"font-size: 13px; line-height: 19px;\"><a href=\"http:\/\/www.bu.edu\/tech\/security\/protect\/\"><strong>Protecting Computing Resources<\/strong><\/a><\/h5>\n<ul style=\"font-size: 13px; line-height: 19px;\">\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/protect\/bestpractice\/\">Best Practices<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/protect\/auditing\/\">Vulnerability Management<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/protect\/server-security\/\">Server Security<\/a><\/li>\n<li><a title=\"Backup and Restore\" href=\"https:\/\/www.bumc.bu.edu\/it\/tech\/services\/support\/storage-backup\/server-backup\/\">Backup and Restore<\/a><\/li>\n<\/ul>\n<\/td>\n<td>\n<h5 style=\"font-size: 13px; line-height: 19px;\"><a title=\"Data Protection\" href=\"https:\/\/www.bumc.bu.edu\/it\/infosec\/data-protection\/\"><strong>Data Protection<\/strong><\/a><\/h5>\n<ul style=\"font-size: 13px; line-height: 19px;\">\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/data-protection\/hipaa\/\">Health Insurance Portability &amp; Accountability Act (HIPAA)<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/data-protection\/pci-dss\/\">Payment Card Industry Data Security Standard (PCI-DSS)<\/a><\/li>\n<li><a title=\"Media Destruction\" href=\"https:\/\/www.bumc.bu.edu\/it\/infosec\/data-protection\/media-destruction\/\">Media Destruction<\/a><\/li>\n<li><a title=\"Policies\" href=\"https:\/\/www.bumc.bu.edu\/it\/tech\/about\/policies\/\">Policies<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h5><a href=\"http:\/\/www.bu.edu\/tech\/security\/firewalls\/\"><strong>Firewalls<\/strong><\/a><\/h5>\n<ul>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/firewalls\/campus\/\">The Campus Firewall<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/firewalls\/host\/\">Host-based Firewalls<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/firewalls\/departmental\/\">Departmental Firewalls<\/a><\/li>\n<\/ul>\n<\/td>\n<td>\n<h5><a href=\"http:\/\/www.bu.edu\/tech\/security\/encryption\/\"><strong>Encryption<\/strong><\/a><\/h5>\n<ul>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/encryption\/ssl-certificates\/\">SSL Certificates<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/accounts\/special\/datamotion-securemail\/\">DataMotion SecureMail<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h5><a href=\"http:\/\/www.bu.edu\/tech\/security\/consulting\/\"><strong>Security Consulting<\/strong><\/a><\/h5>\n<ul>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/consulting\/projects-and-systems\/\">Client Projects and Systems<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/consulting\/design\/\">Secure Network Design<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/consulting\/third-party-software\/\">Third-party Software<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/consulting\/policy-compliance\/\">Policy Compliance<\/a><\/li>\n<\/ul>\n<\/td>\n<td>\n<h5><a href=\"http:\/\/www.bu.edu\/tech\/security\/software\/\"><strong>Software<\/strong><\/a><\/h5>\n<ul>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/desktop\/virus-protection-security\/\">Antivirus Software<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/desktop\/virus-protection-security\/removal\/buvs\/\">BU Virus &amp; Security Tool (BUVS)<\/a> (Windows XP)<\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/infrastructure\/monitoring\/baseline\/\">File Integrity Monitoring (Baseline)<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/infrastructure\/networks\/ntp\/\">Time Synchronization Service (NTP)<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/infrastructure\/monitoring\/logging\/\">Central Log Repository (log-srv)<\/a><\/li>\n<li><a href=\"https:\/\/netreg.bu.edu\/faq.cgi\">Network Registration (NetReg)<\/a><\/li>\n<li><a title=\"VPN\" href=\"https:\/\/www.bumc.bu.edu\/it\/support\/network\/remote\/vpn2\/\">Virtual Private Networking (VPN) Client<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h5><a href=\"http:\/\/www.bu.edu\/tech\/security\/events-and-training\/\"><strong>Events &amp; Training<\/strong><\/a><\/h5>\n<ul>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/events-and-training\/dsa-training\/\">DSA Training<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/events-and-training\/data-trustee-training\/\">Data Trustee Training<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/files\/2010\/06\/Security-Awareness-Training-Slides.pdf\">Security Awareness Training<\/a><\/li>\n<li><a href=\"http:\/\/www.bu.edu\/tech\/security\/events-and-training\/camp\/\">Security Camp<\/a><\/li>\n<\/ul>\n<\/td>\n<td><strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><br \/>\n<\/strong><\/p>\n<p><strong><br \/>\n<\/strong><\/p>\n<p><strong><br \/>\n<\/strong><\/p>\n<p><strong><br \/>\n<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>BUMC IT and BU IS&amp;T work together to offer a wide range of services to ensure the security of Boston University&#8217;s information and technology resources. We offer you a wide variety of resources and tools as well as free consulting services and help with your questions about security.\u00a0While some of our services are provided behind [&hellip;]<\/p>\n","protected":false},"author":5559,"featured_media":0,"parent":27,"menu_order":7,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/pages\/2337"}],"collection":[{"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/users\/5559"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/comments?post=2337"}],"version-history":[{"count":17,"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/pages\/2337\/revisions"}],"predecessor-version":[{"id":3446,"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/pages\/2337\/revisions\/3446"}],"up":[{"embeddable":true,"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/pages\/27"}],"wp:attachment":[{"href":"https:\/\/www.bumc.bu.edu\/it\/wp-json\/wp\/v2\/media?parent=2337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}