Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For

Security

Security :: Linux Fedora Disk Encryption

Fedora 11 uses dm-crypt/LUKS to perform Block Level encryption of a file system. LUKS (Linux Unified Key Setup) is a specification for block device encryption. It establishes an on-disk format for the data, as well as a passphrase/key management policy.

LUKS uses the kernel device mapper subsystem via the dm-crypt module. This arrangement provides a low-level mapping that handles encryption and decryption of the device's data. User-level operations such as creating and accessing encrypted devices are accomplished through the use of the cryptsetup utility.

Security :: Macintosh OS X Encryption

Before proceeding, seek the support of your ITC.

Do not encrypt the only copy of protected data. Mobile devices have a greater exposure to damaging environments, and data on these devices, encrypted or not, can suddenly become unrecoverable.

Encrypting your home folder with FileVault

You can turn on FileVault to encrypt the information in your home folder. Encryption scrambles the data in your home folder so that unauthorized users, applications, or utilities can’t access your data.

Security :: Encryption BitLocker :: Windows Vista

Before proceeding, seek the support of your ITC.

Do not encrypt the only copy of protected data. Mobile devices have a greater exposure to damaging environments, and data on these devices, encrypted or not, can suddenly become unrecoverable.

Requirements

A computer must meet the following requirements to support BitLocker

Security :: BitLocker Encryption for Windows 7/Windows 8/Windows Server 2012

BitLocker is included with Windows 7/Windows 8/Windows Server 2012 and provides Full Volume Encryption. By encrypting the entire hard drive, the operating system can provide a much higher level of security against offline attacks. BitLocker uses HSU's Active Directory to store keys and help manage data protection.

Security :: Data Classification Standards

 

Classification Description Examples

Level 1:
Need-to-know

 

 

Security :: Virtual Private Network

As part of the closed border firewall project, Humboldt State University deployed a Virtual Private Network (VPN) server. This ensures secure communications through a simple web interface for those staff and faculty members who use Remote Desktop or Virtual Network Computing (VNC) to connect to their office computers from off campus.

Security :: Password Expiration

To comply with Federal and State law as well as CSU security policies and standards, Humboldt State University requires all staff, faculty, and students to change their passwords on a regular basis. If you receive an email informing you that your HSU Password is scheduled to expire, you MUST go to the Account Center and change your password BEFORE the expiration date. Once you have logged in, select Account Tools, then Change Password.

Security :: Campus Border Firewall

A firewall is a hardware or software network security device that sits at the juncture between two networks to control what information is allowed to pass between those networks. Usually, the two networks are an organization's internal network and the Internet. A firewall's primary role in information security is to protect computers on the internal network from intentional attacks that aim to:

Security :: Virus Protection

Computer viruses used to be very obvious - you'd know that your computer was infected because threatening messages would appear on your screen, or applications stopped working. Today's malware instead tries to be as secretive as possible - the goal is to get onto your machine and start stealing valuable information, not to show off programming tricks. Many of today's attacks come wrapped in a cloak of pseudo-legitimacy, appearing as a message or request for information from an official source, such as your bank, eBay, even the Humboldt State University Technology Help Desk.

Blocked Email Attachments

Email attachments using the following file extensions are blocked by GMail and Outlook. This list is subject to change as needed for security.