preview

The Impact Of Security Management System On The University Of Michigan

Better Essays

University of Michigan has an open network architecture that is extensively used for student access, faculty research, and university collaboration. But this architecture makes it vulnerable to many attacks.
There are thousands of student/staff computers and handheld devices on the wireless and wired segments which might be either compromised or infected. Furthermore, since the computing environment is decentralized and the philosophy of academic freedom is followed, establishing an effective information security management system is deemed necessary though it is a difficult task.
Mission: University of Michigan is committed to providing a secure and accessible data and networking infrastructure that protects the confidentiality, …show more content…

Examples: Social
Security Numbers, payment card numbers, medical records, student data that is not considered directory information, information protected by non-disclosure agreements, confidential research data.
Sensitive Data is University Data for which unauthorized disclosure or modification would not result in direct financial loss or legal violations, but may otherwise adversely impact the University. Examples: Budget, salary information, cell phone numbers, departmental policies/procedures, internal memos, incomplete research.
Public Data is University Data that no authorization and may be freely disseminated without potential harm to the University. Examples: Advertising, product and service information, directory listings, published research, presentations or papers, job postings, press releases.
The people related to the data can be classified based on who use the data, who create the data and who have access to the data. Information Custodians/Managers (including Vice-Presidents, Deans, Associate
Deans, Managers of Academic Resources, Department Chairs, Directors and Managers) are typically the managers responsible for ensuring the quality of and control over the University Data in their custody.
Information Users include all persons who have been authorized to

Get Access