Print Friendly
1
Yes
None
1
Enter service name...
/services/
Thumbnail
Filter

Categories:

Eligibility:

Location:

Supporting Area:

Information Security
Awareness and Education
Awareness and Education Image

IT will share information and training material to help you secure your computer, devices and make you aware of cyber security threats.

Incident Response
Incident Response Image

Use this service to report a computer security incident that you suspect or discover. The purpose of Information security incident response is to protect the information resources and mitigate the effects caused by an incident.

Data Encryption
Data Encryption Image

Data encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions. Data on an encrypted hard drive cannot be read by anyone who does not have access to the appropriate key or password.  IT can assist users encrypt their computers using common tools such as BitLocker for Windows, and FileVault for macOS. Linux option are available too.

Data Access Control
Data Access Control Image

In the area of information security, access control (AC) is the selective restriction of access to a network resource such as files and directories. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.  IT carries out routine audits to ensure that your data stays secure and protected against unauthorized access.

Web Site Certificates
Web Site Certificates Image

The Carnegie Mellon University Certificate Authority (CA) issues and manages security credentials and public keys for the encryption of Internet network traffic. Qualifying community members conducting University business or research may take advantage of the University’s partnership with a commercial vendor to receive digital certificates signed by a certificate authority that ships pre-installed in common web browsers and platforms.

Antivirus and Anti-Malware
Antivirus and Anti-Malware Image

With the expansion of the internet and the rise in malicious computer programs and malware, IT strives to ensure that all managed computers, servers and devices physical and virtual are provisioned with the best in anti-virus and anti-malware solutions available, to detect, prevent and clean harmful infections.  If you are using a an unmanaged computer for work, please contact the Service Desk to discuss what options are available to you.

Data Classification Consulting
Data Classification Consulting Image

Data classification, in the context of information security, is the classification of data based on its level of sensitivity and the impact to the University should that data be disclosed, altered or destroyed without authorization. The classification of data helps determine what baseline security controls are appropriate for safeguarding that data.

Information Security
Awareness and Education Image
Awareness and Education
IT will share information and training material to help you secure your computer, devices and make you aware of cyber secu... Read More
Eligibility:Faculty,Pittsburgh Visitors,Researcher,Staff,Students
Location:Classrooms,Computer Clusters,Conference Rooms,Employee Spaces,Home,Laborotories,Lecture Halls,Library,Office,Open Areas,Student Spaces,Web
Supporting Area:Administration,Research,Teaching
Request Service Through:Automatically Provided
Support Availability:University Business Hours
User Guide:https://it.qatar.cmu.edu/support/
Policies:https://it.qatar.cmu.edu/policies/
Incident Response Image
Incident Response
Use this service to report a computer security incident that you suspect or discover. The purpose of Information security ... Read More
Eligibility:EC Visitors,Faculty,Pittsburgh Visitors,Researcher,Staff,Students
Location:Classrooms,Computer Clusters,Conference Rooms,Employee Spaces,Home,Laborotories,Lecture Halls,Library,Office,Open Areas,Student Spaces,Web
Supporting Area:Administration,Outrech,Research,Teaching
Request Service Through:IT Service Desk
Support Availability:24 Hours
User Guide:https://it.qatar.cmu.edu/support/information-security/
Policies:https://it.qatar.cmu.edu/policies/information-security/
Data Encryption Image
Data Encryption
Data encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions. D... Read More
Eligibility:Faculty,Researcher,Staff
Supporting Area:Administration,Research,Teaching
Request Service Through:IT Service Desk
Support Availability:University Business Hours
Data Access Control Image
Data Access Control
In the area of information security, access control (AC) is the selective restriction of access to a network resource such ... Read More
Eligibility:Faculty,Researcher,Staff,Students
Supporting Area:Administration,Research,Teaching
Request Service Through:Automatically Provided,IT Service Desk
Support Availability:University Business Hours
Web Site Certificates Image
Web Site Certificates
The Carnegie Mellon University Certificate Authority (CA) issues and manages security credentials and public keys for the e... Read More
Eligibility:Faculty,Researcher,Staff,Students
Supporting Area:Administration,Research,Teaching
Request Service Through:IT Service Desk
Support Availability:University Business Hours
Antivirus and Anti-Malware Image
Antivirus and Anti-Malware
With the expansion of the internet and the rise in malicious computer programs and malware, IT strives to ensure that all ... Read More
Eligibility:Faculty,Pittsburgh Visitors,Researcher,Staff,Students
Supporting Area:Administration,Research,Teaching
Request Service Through:Automatically Provided,IT Service Desk
Support Availability:University Business Hours
Data Classification Consulting Image
Data Classification Consulting
Data classification, in the context of information security, is the classification of data based on its level of sensitivit... Read More
Eligibility:Faculty,Researcher,Staff
Supporting Area:Administration,Research,Teaching
Request Service Through:Automatically Provided,IT Service Desk
Support Availability:University Business Hours