Some Helpful Links



UF Net Services





I hope you've learned enough about what involves securing your personal information on university networks and what kinds of security are out there. For more information on the topics discussed, here are some sources used on this Web site.

1. Barrett, Neil. Digital Crime: Policing the Cybernation. London: Kogan Page Limited, 1997.

In this book, Barrett details the history and presence of digital crime on the Internet. Barrett outlines the Information Age, crimes against and supported by computers, digital crime and the law and prosecution of digital crimes. The book also gives examples of how a person can protect their computer and computer network by using firewalls. Barrett goes into detail about viruses and how to protect against them.

2. Curtin, Matt and Marcus J. Ranum. “Internet Firewalls” 12 January 2000.

Curtin and Ranum describe how firewalls work to protect against hackers and viruses.

3. “Information Technology Security”.

This site outlines the policy and guidelines of the Office of Information Technology at UF. The site shows how to protect and secure the university network.

4. Leyden, John. “Police raids follow Texas University ID cyber-heist.” The Register. 31 March 2003

In this article, Leyden gives the facts about the attack on the university network at the University of Texas where a student illegally accessed 55,000 students and faculty information.

5. Mowbray, Miranda and Chris Werry. Online Communities: Commerce, Community Action, and the Virtual University. Upper Saddle River: Prentice Hall, 2001

Mowbray and Werry give details of common university networks and how they work.

6. Ohlson, Kathleen. “Hackers target university users’ passwords.” "

This article covers a security breach that occurred at Boston University.

7. Wilder, Suzanne. “OU network vulnerable: student accesses private information” 30 January 2003

This article shows how a student, who was responsible for overseeing the security of a university network, hacked into the system and stole information on the members of the University Senate.

Leah feels real secure now with her bodyguard on hand to protect her from hackers and security breaches.


Security Breaches|Types of Security|Information Technology|Bibliography|Home

By: Patrick Lombard
MMC 3260 Semester Project