Stevens Information Security

Internet Technology Security for your Computing Environment

One of the most important aspects of information security is protecting critical information. Confidentiality, integrity and availability are the three predominant principles of information protection. Compromising these principles leaves systems and critical information in jeopardy.

  1. Confidentiality attacks compromise sensitive information (passwords, identifying files).
  2. Integrity attacks gain access to a system.
  3. Availability attacks neutralize alarms and defensive systems.

Faculty, staff and students are partners in creating a secure computing environment and reducing risk to these principles. Information Technology has developed this web site to assist in coordinating activities and policies that provide for a secure and protected computing environment.