Services (3)

Architecture

The goal of the Information System/Data Flow Diagram is to capture the main components of an Information System, how data moves within the system, user-interaction points, and the Authorization Boundary. Think of this diagram as conceptual rather than technical, multiple systems can be abstracted together, and there's no need to detail every network connection. The Authorization Boundary describes the limits of the Information System which pieces are currently being assessed. Information Systems often depend on other Information Systems, but those other Information Systems will be assessed independently, and their risk factored into the current Information System.

Threat Management

Millions of viruses are currently circulating the Internet via e-mails, malicious websites and instant messaging. New ones are being released every day and infecting unsuspecting users who open e-mails that they thought were from a friend or visiting a website that required them to install something that said it would protect them.

Vulnerability Management

Whenever reporting a system compromise, defaced website, or some other incident, either to UF network support or another organization, please make sure to include the following information: Your name and contact info. Those you contact may need to ask you for more information. Any applicable time-stamped system log files. Detailed log files are essential for others to understand security problems and compromises.