Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For

Search

Search results

Can I encrypt my my hard drive myself?

We wouldn't advise it. Encryption is a complex process that involves scrambling data in such a way ... with a special key that you create as part of the encryption process. If you lose that key, your data is likely gone for good. An experienced computer technician can handle the encryption and ensure that there is fall-back way to access your data if you ...

FAQ - Anonymous - Sep 12 2011 - 10:50am - 0 comments - 0 attachments

What are the requirements for storage of Level 1 data?

... implemented to protect the data. Campuses must use encryption , or equally effective measures, on all mobile devices that store ... in the CSU Data Classification Standard. Alternatives to encryption must be reviewed on a case-by-case basis and approved in writing by ...

FAQ - Anonymous - Jul 26 2013 - 12:22pm - 0 comments - 0 attachments

Security :: Tools and Resources

... in hardware, software, or a combination of both. Encryption . Encryption converts data into a secure form that can be safely moved around ...

Page - bjt7001 - Apr 17 2015 - 2:05pm - 0 comments - 0 attachments

Secure Wireless :: How to Connect :: HSU-Owned Windows 7/Vista Systems

... for Security type. Select AES for Encryption type. Check Start this connection automatically . ... WPA2-Enterprise for Security type. Select AES for Encryption type. Select Microsoft: Protected EAP (PEAP) as the ...

Page - Anonymous - Nov 26 2014 - 3:13pm - 0 comments - 0 attachments

Secure Wireless :: How to Connect :: Windows 7/Vista

... for Security type. Select AES for Encryption type. Check Start this connection automatically . ... for Security type. Select AES for Encryption type. Select Microsoft: Protected EAP (PEAP) as the network ...

Page - bjt7001 - Nov 26 2014 - 3:26pm - 0 comments - 0 attachments

Data Protection

... can be taken to protect it. This will usually involve encryption , and should only be undertaken by experienced technical personnel; if encryption goes wrong, the data will likely be lost forever. ...

ITS Service - Anonymous - Oct 10 2014 - 2:57pm - 0 comments

Summary of CSU and HSU Requirements for Storage of Level 1 Data

... implemented to protect the data. Campuses must use encryption , or equally effective measures, on all mobile devices that store ... in the CSU Data Classification Standard. Alternatives to encryption must be reviewed on a case-by-case basis and approved in writing by ...

Page - Anonymous - Jun 16 2015 - 9:47am - 0 comments - 0 attachments

Secure Wireless :: Security Requirements

... 3) Your device must be capable of decoding AES encryption . 4) Your HSU User Name and Password must not be ...

Page - bjt7001 - Sep 22 2014 - 3:16pm - 0 comments - 0 attachments

What is a Virtual Private Network?

... (confirming that you are who you say you are) and encryption to ensure only authorized users can read data transmitted ...

FAQ - Anonymous - Sep 12 2011 - 10:52am - 0 comments - 0 attachments

Can I send sensitive information through email?

... that data has been encrypted using HSU-approved strong encryption . Alternatively, you can store the sensitive data in a system ...

FAQ - bjt7001 - Feb 12 2013 - 3:14pm - 0 comments - 0 attachments

feedback