Information Security Office Service Catalog
Business Service Catalog
ISO services that are for use by all colleagues and students.
Service Name |
Audience | Abstract Description (link) (Service Level Target | System Name and/or Type) |
---|---|---|
Email Security |
Students and Colleagues with a Personal Email address |
Protects the University community from Spam, Phishing, and email-borne Malware.
|
Secure Attachments |
Students, Faculty, and Staff, as well as outside contractors |
Allows the sending of RESTRICTED information securely, as well as transmitting files
too large to be carried in normal emails.
|
SecureConnect Powered by DUO |
Students, Faculty, and Staff, as well as outside contractors |
Protects Students, Faculty, Staff, and Person of Interest accounts from unauthorized access by requiring a second factor of authentication in addition to a password. SecureConnect adds an additional layer of security by requiring additional confirmation from a personal device when logging into Pepperdine resources from off campus.
Students, Faculty, and Staff are auto-enrolled in SecureConnect. |
WavesConnect Computer Registration |
Students and Colleagues accessing the University network |
Computer Registration is used to block and inform users and provide appropriate access.
(Registration: Self-service with local technician or Tech Central troubleshooting | WavesConnect is hosted on a virtual appliance). |
Whole Disk Encryption |
Colleagues with RESTRICTED information on their computer |
Helps users prevent financial damages or loss of trust when a University computer with RESTRICTED data is lost or stolen. Whole disk encryption and the related procedures and signed agreement allow the University to secure RESTRICTED data and prevent costly compliance/litigation in the event a computer is stolen. Computers that must occasionally or regularly access or store RESTRICTED information are required to be encrypted by University policy; Information Security provides manager/end-user training on RESTRICTED information policy and technical training for IT and school technical staff that install the software. Software installation requires justification of RESTRICTED data storage and a signed security agreement per user. Information Security runs the server that manages the software to end users and which provides install/recovery tools to field technicians. In addition, backup end-user support is provided for recovery when alternate users and field technicians are unable to log into a machine (Verification of identity and lack of local resources required; call x4357).
(Client installation: Service Desk & School technicians can be scheduled. Recovery: real-time by phone call to Tech Central or local technician. | pgp.pepperdine.edu is a virtual appliance on imperator for system management only) |
Technical Service Catalog
The technical service catalog details internal services that support business services; this catalog is intended as a guide for other IT personnel.
Service Name |
Business Service Rollup | Abstract Description (link) (Service Level Target | System Name and/or Type) |
---|---|---|
Domain Name Service |
All University online services |
Maps user-friendly system names to network-friendly IP numbers. |
Dynamic Host Configuration Protocol |
All student and colleague client computers on the University network |
Automatically provides appropriate network parameters for client computers. |
Internet Firewall |
None |
The University firewalls are the first line of defense against network threats. |
Intrusion Detection System |
None |
Analyzes permitted traffic used as a vector for attacks. |
Network Time Protocol |
All servers at the University |
Provides a consistent time to all network hosts and clients. |
Node Sensors |
None |
Enables network forensics to determine how and when a machine became compromised,
and implement changes to prevent it. |
Related Definitions
- PGP is an acronym for Pretty Good Privacy, one of the most examined, proven, and widespread encryption systems in the world. IT: none. Wikipedia: Pretty Good Privacy
- Restricted Information is defined in University Policy as authentication secrets and information that makes the University liable for costs or damages for unauthorized disclosure. IT: Information Classification and Protection Policy. Google: Higher education references to "Restricted Information".
- Spam is unsolicited commercial email. IT: Spam and the Spam Filter. Wikipedia: Electronic Spam.