Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Identification | 4 |
Higher Education | 3 |
Information Technology | 3 |
Computer System Design | 2 |
Internet | 2 |
Campuses | 1 |
Computer Interfaces | 1 |
Computer Networks | 1 |
Computer Software | 1 |
Cost Effectiveness | 1 |
More ▼ |
Source
Campus Technology | 4 |
Author
Gale, Doug | 2 |
Grush, Mary | 1 |
Zeltser, Lenny | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Education Level
Higher Education | 3 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Gale, Doug – Campus Technology, 2007
The basics of authentication are straightforward. One can prove his or her identity in three ways: (1) something one "has" (for example, a key or a birth certificate); (2) something one "knows" (such as a password); or (3) something one "is" (such as one's fingerprints, used in biometric technologies). In the world of computers and networks, the…
Descriptors: Computer Security, Prevention, Guidelines, Higher Education
Gale, Doug – Campus Technology, 2006
Authentication is based on something one knows (e.g., a password), something one has (e.g., a driver's license), or something one is (e.g., a fingerprint). The last of these refers to the use of biometrics for authentication. With the blink of an eye, the touch of a finger, or the uttering of a pass-phrase, colleges and schools can now get deadly…
Descriptors: Human Body, Identification, Technological Advancement, Genetics
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces