Information Security

Articles (53)

After an Incident

This guide is for the cybersecurity incident response team after incident recovery of an OU computer which has been involved in a cyber incident (for example, a malware infection or unauthorized access).

Controlled Unclassified Information (CUI)

This article provides insights into CUI @OU, what you need to do to protect CUI, and what OU IT is doing to protect CUI @OU.

CUI Marking

This guideline provides practical guidance and examples of proper CUI marking.

During an Incident Checklist

This guide is for the cybersecurity incident response team who is investigating an OU computer which has been involved in a cyber incident (for example, a malware infection or unauthorized access).

How to read an IT Security Assessment Report

Starting July 1, 2024, the OU IT Security Profile Summary, shared when a security assessment has been completed, is changing it’s look and feel.

How to request a Security Consultation

This article provides an overview of the Security Consultation - Security Assessment Request form and provides guidance for filling out the form.

Managing Cybersecurity Risks

OU IT offers a variety of services that can be used by researchers. Use this article to help you select the appropriate level of security needed for your project, based on the sensitivity of the data, and then use this document to help you select IT services that will enable your research project.

NDAA 889 Guideline

The National Defense Authorization Act Section 889 (NDAA 889) prohibits executive agencies from entering into, or extending or renewing, a contract with an entity that uses any equipment, system, or service that uses covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system, on or after August 13, 2020, unless an exception applies or a waiver is granted.

Report Security Incident Checklist

This guide is for the user or owner of a OU computer which has been involved in a cyber incident (for example, a malware infection or unauthorized access).

System Log Review Guideline

This guideline provides guidance for implementing the minimum processes that should be in place to ensure all access and activity is reviewed by Asset Administrators.