I hope you've learned enough about what involves securing
your personal information on university networks and what kinds of security
are out there. For more information on the topics discussed, here are
some sources used on this Web site.
1. Barrett, Neil. Digital Crime: Policing the Cybernation.
London: Kogan Page Limited, 1997.
In this book, Barrett details the history and presence of digital crime
on the Internet. Barrett outlines the Information Age, crimes against
and supported by computers, digital crime and the law and prosecution
of digital crimes. The book also gives examples of how a person can
protect their computer and computer network by using firewalls. Barrett
goes into detail about viruses and how to protect against them.
2. Curtin, Matt and Marcus J. Ranum. “Internet Firewalls”
12 January 2000.
Curtin and Ranum describe how firewalls work to protect against hackers
3. “Information Technology Security”. http://www.it.ufl.edu/policies/security
This site outlines the policy and guidelines of the Office of Information
Technology at UF. The site shows how to protect and secure the university
4. Leyden, John. “Police raids follow Texas University ID cyber-heist.”
The Register. 31 March 2003
In this article, Leyden gives the facts about the attack on the university
network at the University of Texas where a student illegally accessed
55,000 students and faculty information.
5. Mowbray, Miranda and Chris Werry. Online Communities: Commerce,
Community Action, and the Virtual University. Upper Saddle River:
Prentice Hall, 2001
Mowbray and Werry give details of common university networks and how
6. Ohlson, Kathleen. “Hackers target university users’
passwords.” CNN.com "http://www.cnn.com/TECH/computing/9811/06/unahacker.idg
This article covers a security breach that occurred at Boston University.
7. Wilder, Suzanne. “OU network vulnerable: student accesses
private information” http://thepost.baker.ohiou.edu/archives3/jan03/013003/n2.html.
30 January 2003
This article shows how a student, who was responsible for overseeing
the security of a university network, hacked into the system and stole
information on the members of the University Senate.