Server Security Standard
Server Security StandardThe Server Standard provides requirements for server configuration and use at RIT.A list of ISO-approved security assessment tools, HIPS programs, secure protocols, and a sample...
View ArticleKeeping Safe
Keeping Safe: Guidelines and Best Practices Not sure how to keep yourself, your information, and your devices safe? Click on the headings below for best practices, resources, and more; also be sure to...
View ArticleEncryption at RIT
Encryption at RITSeveral RIT Security Standards refer to ISO-approved encryption. ISO-approved encryption is divided into two categories: Preferred and Acceptable. Preferred encryption methods were...
View ArticleHost Intrusion Prevention (RIT-owned/leased computers only)
Host Intrusion Prevention (RIT-owned/leased computers only) Note:This requirement applies only to RIT-owned and leased computers. There is currently no requirement for personally-owned machines to run...
View ArticleForms, Checklists, and Templates
Forms, Checklists, and TemplatesMany forms and checklists below are provided as Adobe PDF Fill-in forms and can be filled in and printed from Acrobat Reader. NOTE: these forms may contain Javascript....
View ArticleRequirements for Students
Requirements for Students Read and understand the RIT Code of Conduct for Computer and Network Use and the RIT policy regarding Digital Copyright. Make sure you understand and comply with all...
View ArticleClient Input Filtering Practices
Client Input Filtering Practices Client input filtering is needed to prevent specific attacks Cross Site Scripting (XSS) Cross-site scripting vulnerabilities allow malicious attackers to take advantage...
View ArticleSecuring Your Computer
Securing Your ComputerThis section provides information about all the software and instruction necessary to comply with the Desktop and Portable Computer Standard. The software on this page is intended...
View Article