archive-edu.com » EDU » C » COLUMBIA.EDU

Total: 400

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Keeping Third Party Applications Up to Date | Columbia University Information Technology
    Player A few links are included below for common applications that require regular updates but it is very important that you check all of the programs that you use for built in updating options It s also a good idea to make sure that you have the most recent version of the software as long as it can run on your machine Checking the vendor s website is typically the best first step It can be difficult to manage updates for all of the applications we use online The Secunia PSI is a free security tool designed to detect vulnerable and out dated programs and plug ins which expose your PC to attacks You can download PSI from Secunia s website Instructions for keeping your operating system up to date Secunia Personal Software Inspector Security updates and announcements for Mozilla products including Firefox Security issues affecting Real products Office Update for Microsoft Office To reach this page quickly in the future use the keyword thirdparty Reporting Security Problems Send reports of security incidents attacks or questions to security columbia edu myUNI Service Desk myColumbia FAQ A Z Services About Us Give Us Feedback Computing Support About CUIT CUIT Careers CUIT Email Services Research Computing Services Teaching Learning Applications CUIT Public Computing Facilities IT Policies IT Security Resources Anti virus Backing Up CUIT Security Downloads CUIT Security How To s CUMC IT Security Filesharing Networks Handling Personally Identifying Information Information Security Tips and Tricks Keep Your Operating System Up To Date Phishing Scams and Spam Physical Security Protecting Your Passwords Social Networking Do s and Don ts Students Getting Started with Computer Security Symantec Security Response Using Strong Passwords Windows Update Manage my UNI Security Awareness Training Software and Downloads Search CUIT Go Text Size a a Other Columbia IT Groups

    Original URL path: http://cuit.columbia.edu/cuit/it-security-practices/keep-your-operating-system-date/keeping-third-party-applications-date (2016-05-01)
    Open archived version from archive


  • Turning On the Macintosh OS X Firewall | Columbia University Information Technology
    Getting Started with Computer Security Symantec Security Response Using Strong Passwords Windows Update If you use Macintosh OS X CUIT recommends that you use the built in OS X firewall to help protect your computer from viruses and worms Open System Preferences by selecting it from the Apple menu or clicking it in your Dock Select Sharing from the Internet Network preferences section Click the Firewall tab and click Start It will say Firewall On above the button once you ve activated the firewall You may allow access to your Mac on a service by service basis by selecting the individual services in the Allow box If you don t understand what any of this means you should make sure that NONE of the services are allowed Quit System Preferences Apple Article on Mac OS X Firewall To reach this page quickly in the future use the keyword macfirewall Reporting Security Problems Send reports of security incidents attacks or questions to security columbia edu myUNI Service Desk myColumbia FAQ A Z Services About Us Give Us Feedback Computing Support About CUIT CUIT Careers CUIT Email Services Research Computing Services Teaching Learning Applications CUIT Public Computing Facilities IT Policies IT Security Resources Anti virus Backing Up CUIT Security Downloads CUIT Security How To s CUMC IT Security Filesharing Networks Handling Personally Identifying Information Information Security Tips and Tricks Keep Your Operating System Up To Date Phishing Scams and Spam Physical Security Protecting Your Passwords Social Networking Do s and Don ts Students Getting Started with Computer Security Symantec Security Response Using Strong Passwords Windows Update Manage my UNI Security Awareness Training Software and Downloads Search CUIT Go Text Size a a Other Columbia IT Groups Columbia University Medical Center Information Technology CUMC IT Center for Digital Research and Scholarship CDRS Business

    Original URL path: http://cuit.columbia.edu/cuit/it-security-practices/built-firewalls/turning-macintosh-os-x-firewall (2016-05-01)
    Open archived version from archive

  • Rebuilding a Windows XP PC with an Updates CD | Columbia University Information Technology
    to http windowsupdate microsoft com and install all remaining critical updates You may have to reboot your machine multiple times and go back to the Windows Update page before the process is complete As soon as it tells you that there are no remaining critical updates to install you are finished Set Windows Update to download future updates automatically Install Symantec Anti Virus from the CUIT Security Downloads page Reinstall programs and all files you backed up myUNI Service Desk myColumbia FAQ A Z Services About Us Give Us Feedback Computing Support About CUIT CUIT Careers CUIT Email Services Research Computing Services Teaching Learning Applications CUIT Public Computing Facilities IT Policies IT Security Resources Anti virus Backing Up CUIT Security Downloads CUIT Security How To s CUMC IT Security Filesharing Networks Handling Personally Identifying Information Information Security Tips and Tricks Keep Your Operating System Up To Date Phishing Scams and Spam Physical Security Protecting Your Passwords Social Networking Do s and Don ts Students Getting Started with Computer Security Symantec Security Response Using Strong Passwords Windows Update Manage my UNI Security Awareness Training Software and Downloads Search CUIT Go Text Size a a Other Columbia IT Groups Columbia University Medical

    Original URL path: http://cuit.columbia.edu/it-security-practices/information-security-tips-tricks/rebuilding-windows-computers/rebuilding-windows-xp-pc-updates-cd (2016-05-01)
    Open archived version from archive

  • Rebuilding a Windows 2000 PC without an Updates CD | Columbia University Information Technology
    bring it into the CUIT Computing Support Center at 202 Philosophy Hall for assistance If you own a desktop computer you will need to contact CUIT at x4 1919 in order to make other arrangements Once you have managed to install the updates in a secure fashion the remaining steps are Print out this page if possible Contact CUIT to have your network access restored Now you may reconnect to the network safely Go to http windowsupdate microsoft com and install all remaining critical updates You may have to reboot your machine multiple times and go back to the Windows Update page before the process is complete As soon as it tells you that there are no remaining critical updates to install you are finished Set Windows Update to download future updates automatically Install Norton Anti Virus from the CUIT Security Downloads page Reinstall programs and all files you backed up Reporting Security Problems Send reports of security incidents attacks or questions to security columbia edu myUNI Service Desk myColumbia FAQ A Z Services About Us Give Us Feedback Computing Support About CUIT CUIT Careers CUIT Email Services Research Computing Services Teaching Learning Applications CUIT Public Computing Facilities IT Policies IT Security Resources Anti virus Backing Up CUIT Security Downloads CUIT Security How To s CUMC IT Security Filesharing Networks Handling Personally Identifying Information Information Security Tips and Tricks Keep Your Operating System Up To Date Phishing Scams and Spam Physical Security Protecting Your Passwords Social Networking Do s and Don ts Students Getting Started with Computer Security Symantec Security Response Using Strong Passwords Windows Update Manage my UNI Security Awareness Training Software and Downloads Search CUIT Go Text Size a a Other Columbia IT Groups Columbia University Medical Center Information Technology CUMC IT Center for Digital Research and Scholarship

    Original URL path: http://cuit.columbia.edu/it-security-practices/information-security-tips-tricks/rebuilding-windows-computers/rebuilding-windows-2000-pc-without-updates (2016-05-01)
    Open archived version from archive

  • RSAM System Registration Walkthrough | Columbia University Information Technology
    on their own This is useful if you don t know all the answers yourself You can ask fellow stakeholders to log in and answer questions related to their expertise Please refer to Sharing Worksheets with Other Stakeholders for instructions on how other stakeholders can access answer or edit existing registration worksheets To choose the appropriate persons for each field Click on the Magnifying Glass to open the System Owner Dialog Box Click on Add Type in the UNI or name of the person you are searching for Check off eMail if you are searching by UNI or Name if you are searching by name Click on Validate If the validation went through then the person s full name should appear with their UNI in parentheses Ex John Doe jd001 If it did not modify your search text and try again Click OK You will return to the System Owner Dialog Box Click on Add to add another owner or OK to complete this assignment I T Implementation In this section you will be asked information about how your system is implemented This includes questions about it s physical location the software running on it and it s IP addresses While this walkthrough will not cover every question on this page some fields of note such are Server IP Address Click on the Magnifying Glass to open the Server IP Addresses dialog box When you find your IP s click the check box on the left hand column When you are done click Update on the lower right hand corner If your server s IP is not in the table close the dialog by clicking Cancel and leave the entry blank Additional IT Implemention Information In this field please describe your system architecture to the best of your ability This should include how data travels between users the interaction of any subsystems or components and a general understanding how the system functions Please also list the following stats for your system If you left the Server IP Addresses question blank please also provide the proper IP here Operating System Webserver Software Any relational databases used by the system Third Party IT Services If your system uses any 3rd party services to function or were used in development of this system please fill out this section Data Flow and System Information If your system exchanges information with any other systems please fill out this section Risk Assessment Administration and WIP These sections are for CU CUMC Infosec Staff only Do not fill out any fields in these pages Step 7 Fill out the Criticality Factors next The Criticality section includes questions about the type of data the system processes and stores the purpose of the data how many users it affects and questions about its security These are used to determine the risk of your system Business Function Check off any and all functions that the system fulfills Click Next Unanswered when done Information Classification Check off all the types of

    Original URL path: http://cuit.columbia.edu/cuit/information-security-risk-management-program/rsam-users-guide-home/rsam-system-registration-walkthrough (2016-05-01)
    Open archived version from archive

  • Start your RSAM System Assessment | Columbia University Information Technology
    you will be required to answer about your system Access The Assessment Questionnaire 1 Click on Home on the upper toolbar and then on the Home Tab 2 The middle section of the Home Tab screen separates out Questionnaires by your role in them a If you are the original registrant of the system you are going to be working on click System Self Registration b If you are another stakeholder System Owner IT Custodian click on System Stakeholder 3 Click on Open in the rightmost column of the Assessments table 4 The Assessment Questionnaire will open on the first page of the original registration 5 To begin answering the new questions click on Next Unanswered Question on the navigation bar on the left hand side myUNI Service Desk myColumbia FAQ A Z Services About Us Give Us Feedback Computing Support About CUIT CUIT Careers CUIT Email Services Research Computing Services Teaching Learning Applications CUIT Public Computing Facilities IT Policies IT Security Resources Manage my UNI Security Awareness Training Software and Downloads Search CUIT Go Text Size a a Other Columbia IT Groups Columbia University Medical Center Information Technology CUMC IT Center for Digital Research and Scholarship CDRS Business School

    Original URL path: http://cuit.columbia.edu/cuit/information-security-risk-management-program/rsam-users-guide-home/rsam-start-system-assessment (2016-05-01)
    Open archived version from archive

  • Saving or Submitting Questionnaires | Columbia University Information Technology
    sends it to an Risk Analyst for review Saving it leaves it unlocked allowing you or other stakeholders to return to it at any time to add or amend your answers To Save or Submit Your Questionnaire 1 When in the Questionnaire click on Goto End on the left hand pane It is the third button from the top 2 You have two options a If the Questionnaire is incomplete and you wish to leave it unlocked for further amendment click Save b If the Questionnaire is complete and you want to submit it for Analyst review click Save Submit Registration to Infosec myUNI Service Desk myColumbia FAQ A Z Services About Us Give Us Feedback Computing Support About CUIT CUIT Careers CUIT Email Services Research Computing Services Teaching Learning Applications CUIT Public Computing Facilities IT Policies IT Security Resources Manage my UNI Security Awareness Training Software and Downloads Search CUIT Go Text Size a a Other Columbia IT Groups Columbia University Medical Center Information Technology CUMC IT Center for Digital Research and Scholarship CDRS Business School Information Services ITG Law School Information Technology SIPA Computer Facilities Social Work Computing and Instructional Technology Columbia College Information Technology CCIT Columbia Center

    Original URL path: http://cuit.columbia.edu/cuit/information-security-risk-management-program/rsam-users-guide-home/saving-or-submitting-questionnaires (2016-05-01)
    Open archived version from archive

  • Sharing Questionnaires with Other Stakeholders | Columbia University Information Technology
    defined role 2 This opens the System Owner Dialog Box 3 Click on Add 4 Type in the UNI or name of the person you are searching for Note Check off eMail if you are searching by UNI or Name if you are searching by name 5 Click on Validate 6 If the Validation went though then the person s full name should appear with their UNI in parenthesis Ex John Doe jd001 7 If it did not modify your search text and try again 8 Click OK 9 You will return to the System Owner Dialog Box Click on Add to add another owner Click on OK to finish To access answer or edit a Questionnaire as a stakeholder 1 Click on the HOME button on the upper left corner of the toolbar Click on the Home Tab 2 The middle section of the Home Tab screen separates out Questionnaires by your role in them a If you are the original registrant of the system you are going to be working on click System Self Registration b If you are another stakeholder System Owner IT Custodian click on System Stakeholder 3 Click on the Open link in the rightmost column of the Assessments table 4 The Assessment Questionnaire will open on the first page of the original registration 5 Use the navigation pane on the left hand side to navigate to the question you wish you answer You can click on Next Unanswered Question to skip to the first unanswered question You can also click on the pull down menu at the top of the navigation pane to navigate by question type or even question text 6 When you re done you can click on Goto End to Save or Submit your Questionnaire myUNI Service Desk myColumbia FAQ A

    Original URL path: http://cuit.columbia.edu/cuit/information-security-risk-management-program/rsam-users-guide-home/sharing-questionnaires-other-users (2016-05-01)
    Open archived version from archive