- » Account Request
- » Alumni Account Request
- » Calendar Request
- » Access Request
- » Disk Quota Increase
- » Exiting Employee
- » Request Forms and Processes
(ITS Staff only)
Spider is an open source network forensics tool developed at Cornell University to identify the presence of Personally-Identifiable Information (PII) on a computer. It scans for data such as Social Security, credit card, or bank account and routing numbers, and produces a list of files that may contain confidential data. Spider can then be used to:
Spider is an open source network forensics tool developed at Cornell University to identify the presence of Personally Identifiable Information (PII) on a computer. It scans for data such as Social Security, credit card, or bank account and routing numbers and produces a list of files that may contain PII.
Identity Finder Professional is HSU's preferred solution for protected information scans. It is a commercial product that requires an annual subscription fee; there is no campus contract for Identity Finder licenses, so units wishing to use the software will need to purchase their own licenses. More information is available on the Identity Finder website.
Encryption is the transformation of data into a form unreadable by anyone without the secret decryption key. Its purpose is to ensure confidentiality and privacy by keeping the information hidden from anyone for whom it is not intended. When an entire hard drive is encrypted, all the data on the drive is protected from unauthorized access if the computer is lost or stolen. Encryption can also be used to protect sensitive files that are sent through email or sensitive communications sent over the network.
Computer viruses used to be very obvious - you'd know that your computer was infected because threatening messages would appear on your screen, or applications stopped working. Today's malware instead tries to be as secretive as possible - the goal is to get onto your machine and start stealing valuable information, not to show off programming tricks. Many of today's attacks come wrapped in a cloak of pseudo-legitimacy, appearing as a message or request for information from an official source, such as your bank, eBay, even the Humboldt State University Technology Help Desk.