results for "web"
Results 1-10 of 10
Results Per Page: 
Keep Web Browsers Up-to-Date Most Web Browser Updates address Security Vulnerabilities and Critical Issues that NEED to be resolved. It is VERY IMPORTANT that these are kept up-to-date. These instructions will show How to keep your Web Browser updated . 1. Open the Google Chrome web browser. 2. Click the ellipses menu icon, located in the top right...
Article Id: 16342

A password is a common form of authentication and is often the only barrier between you and your personal information. There are several tools that attackers use to assist in guessing or cracking a password. By creating a complex password and keeping it confidential, you make it more difficult for hackers to gain unauthorized access to your information. Why do I need a Password? ...
Article Id: 16865

Note: SSLv3 or older protocols as well as TLS 1.0 and 1.1 should no longer be used. Use TLS 1.2 should be used instead. ? Recommendations for Microsoft Internet Information Services (IIS): Changing the SSL Protocols and Cipher Suites for IIS involves making changes to the registry. It is not direct or intuitive. Therefore, instead of repeating already published information, please...
Article Id: 17596

Report Phishing E-mails Phishing emails are malicious messages that attempt to trick recipients into providing sensitive information or performing fraudulent tasks. Users can report any suspicious or malicious message to LSU IT Security and Policy (ITSP) for review through the Report options in Outlook. Phishing emails may Request information like passwords or...
Article Id: 19636

Aliases PKI, SSL, TLS, secure web, HTTPS, certs, certificates, certificate authority, web encryption Description Provides access to certificates signed by a Certificate Authority to support TLS encryption for internal and public hosts of LSU and LSU System Universities with whom LSU has a MOU. Eligibility LSU Faculty & Staff Ordering & Request Procedures Forms...
Article Id: 17572

E-mail: Obtain the E-mail Headers Email headers contain important diagnostic information about the route an email message takes and the results of different security and authenticity checks. When reporting a message through the Report Phishing option in Outlook , the message and all of its header information are provided to the LSU IT Security and Policy (ITSP) team for evaluation.
Article Id: 14922


Article Id: 20163

Public Key Infrastructure (PKI): General Information What is a Public Key Infrastructure (PKI)? A Public Key Infrastructure uses a chain of Certificate Authorities to create digitally signed certificates for asymmetric encryption. Signed certificates are part of a chain of trust that can be validated up from the issued certificate at the bottom of the chain up to the Certificate...
Article Id: 194

WHAT MAKES FILE SHARING ILLEGAL? The Digital Millennium Copyright Act (DMCA) is a piece of legislation signed into law in 1998 defining the illegal downloading and/or sharing of copyrighted material. LSU is required to investigate DMCA complaints and take action to remove infringing content. HOW DOES THIS APPLY TO ME? Copyright holders (or organizations...
Article Id: 17129

Provide Search Feedback Logo
Search Google Logo