Compromised hosts may not be disturbing the network or fall into
any of the other categories. Possible attributes are:
Have a UBITName? You may also use the UBIT
Help Center Online (login required).
Since 2005, UB has been tracking and classifying information
security incidents. Information sharing and partnerships have
helped better secure UB's infrastructure.
Copyright guarantees rights to owner of a work, including
commercial gain, but copyright works can be used under Fair
The "Health Insurance Portability and Accountability Act of
1996" (HIPAA) provides protection of our medical information. UB
needs to be aware of how HIPAA affects the information we
Transport Layer Security (TLS) protocol allows applications to
communicate across a network in a way designed to prevent
eavesdropping and tampering.
Many of us deal with sensitive data every day as part of our
job. We each have a responsibility to safe guard sensitive data
against unauthorized disclosure.
Mozilla Firefox offers a more secure Internet browsing